• As mentioned above, a replay attack by some malicious third party is the most convenient attack.

    正如上文所提到的,来自某个恶意第三再现攻击容易遭受到的攻击。

    youdao

  • Replay attackRe-sending a previously valid message for malicious effect, possibly where only parts of the message (such as the security token) are replayed.

    应答攻击——实现恶意效果,重新发送一个以前曾经有效消息,其中可能只是部分消息(安全令牌)。

    youdao

  • Using a Padding Oracle (PO) attack a malicious user can access encrypted data such as cookies, state, membership password, etc.

    恶意用户能够使用PaddingOracle (PO)攻击方式来解密cookie加密状态认证密码等关键信息。

    youdao

  • Knowing that the cause is a malicious attack does take Twitter off the hook to some degree –it may have been assumed that the site was simply failing to scale properly, as had happened in the past.

    当人们得知twitter宕机的原因缘于恶意袭击,Twitter才得以困境中缓过气 -人们原本推测Twitter宕机的原因是twitter不能承受如此规模的服务器负担,而这种情况在以前就发生过的。

    youdao

  • Even if you update packages as quickly as you can, there will be lag between the version release and your deployment, potentially enough time for a malicious person to carry out an attack.

    即使能够尽可能快地更新软件包新版本发行更新之间一些拖延时间潜在方面,这些时间,能够足够怀有恶意执行袭击

    youdao

  • Even if you update packages as quickly as you can, there will be lag between the version release and your deployment, potentially enough time for a malicious person to carry out an attack.

    即使能够尽可能快地更新软件包新版本发行更新之间一些拖延时间潜在方面,这些时间,能够足够怀有恶意执行袭击

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定