使用调试API动态注入代码。
可在联接点的前后和四周注入代码。
The code can be injected before, after and around the join point.
注入代码的目的通常是绕过或修改程序的最初目标功能。
The purpose of the injected code is typically to bypass or modify the originally intended functionality of the program.
EJB没有使用JNDI查找,而是通过注入代码定义一个资源引用。
Instead of using JNDI lookups, an EJB can define a resource reference by injecting code.
接下来,将看到构造函数注入的示例,以及Geronimo的部署计划定义容器注入代码的方式。
Next, you see an example of constructor injection and how Geronimo's deployment plans define how the container injects code.
很多人一边诅咒着那些需要重复实现的任务,例如安全与日志;一方面又由于注入代码在源代码中无法清晰可见,而回避AOP。
While many people swear by it for mundane tasks like security and logging, others balk at injecting code that cannot be easily viewed in the source.
在这个方法中,我们可以在调用原方法之前或之后注入自己的代码。
In this method, custom code can be injected before or after invoking the original methods.
任何授权代码都可以在此注入。
SQL盲注攻击是一种为人熟知的代码注入攻击形式,但是也有很多其他形式,有些尚未得到很好的记载和了解。
Blind SQL injection attacks are a well know and recognized form of code injection attack, but there are many other forms, some not so well documented or understood.
实际上,横切关注点代码的注入,就是一种类型的模式。
In fact, the injection of code for crosscutting concerns is a pattern of sorts.
这意味着我们无法将该实体管理器注入调用代码。
This means we cannot inject the entity manager into calling code.
这种方式通过修改已经编译的EXE或DLL注入必要的代码段。
This involves modifying the compiled EXE or DLL to inject the necessary code fragments.
任何身份验证代码都可以在此注入。
一旦主题创建成功,讨论主题的标题就会立刻显示而不会做任何特定编码,这样就给注入恶意html代码留出了空间。
Upon creation of the topic, the headline for the discussion topic will be rejected without proper encoding, thus allowing the injection of arbitrary HTML code.
但是,使用参数化sQL会大大降低黑客将SQL注入您的代码的能力。
Using parameterized SQL, however, greatly reduces the hacker's ability to inject SQL into your code.
最恶劣的注入攻击形式也许是代码注入——将新代码置入正在运行的进程的内存空间,随后指示正在运行的进程执行这些代码。
Perhaps the most malicious form of injection attack is code injection—placing new code into the memory space of the running process and then directing the running process to execute it.
我们已经知道攻击者是如何将代码注入应用程序的,接下来再看看一些常见攻击所带来的影响。
Now that you know how attackers get their code into applications, look at the implications of some common attacks.
我可不想让依赖注入框架的代码散布在我的应用当中。
I don't want [Dependency Injection] framework code smeared all through my application.
这些预防方法中,多数也可以类似地应用于预防其他类型的代码注入攻击。
Not surprisingly most of these preventative methods are the same methods you can and should use to prevent other typical code injection attacks.
使用DI,可以通过配置容器或在代码中实现注入,让容器注入适合的客户类。
With DI, you can allow the container to inject the appropriate customer class either by configuring the container or implementing the injection in the code.
同样的技术使得微软可发现注入其产品的恶意代码。
The same techniques allow Microsoft to find malicious code that may have been injected in its products.
代码作为配置:类似于驱动依赖注入框架的XML文件。
Code as Configuration: These are things such as an XML file that drives a dependency injection framework.
现在只需要调用需要这些依赖项并允许容器执行注入的代码。
Now you need merely to call the code that needs those dependencies and allow the container to perform its work.
利用系统没有对其输入进行强制执行或检查的假设向计算机系统中引入(或“注入”)代码的技术。
A technique to introduce (or "inject") code into a computer program or system by taking advantage of the unenforced and unchecked assumptions the system makes about its inputs.
一种更常见的对Web应用程序的攻击和威胁是某种形式的代码注入,Wikipedia将其定义为。
One of the more common attacks or threats to Web applications is some form of code injection, which Wikipedia defines as.
该设置决定了是否在JPAManagerBean代码中使用资源注入。
This setting determines whether to use resource injection in the JPA Manager Bean code.
我们把从依赖注入到代码覆盖所有关于测试的心得体会都写下来,然后定期粘贴在Google所有的卫生间里,全球大约有500多个……。
We write flyers about everything from dependency injection to code coverage, and then regularly plaster the bathrooms all over Google with each episode, almost 500 stalls worldwide...
第十一章在系统级别讨论了简洁代码,如依赖注入和面向方面编程技术。
Chapter 11 talks about clean code in the context of system-level techniques such as Dependency Injection and Aspect-Oriented Programming.
当用户能够把HTML代码注入到您的web页面中时,就是出现了xss漏洞。
An XSS vulnerability occurs when a user has the ability to inject HTML code into your Web pages.
当mashup中的某些部分是出于恶意目的编写的(或者被攻击了),它可以将恶意代码注入到应用程序中。
When some part of the mashup is written under malicious intent (or has been hacked), it can inject malicious code into the application.
应用推荐