For example, it does not discuss the danger of XPath injection attacks.
比如没有讨论XPath注入攻击的危险性。
The code in Figure 5 employs parameterized SQL to stop injection attacks.
图5中的代码使用参数化s QL阻止Injection攻击。
SQL injection attacks are a vulnerability that tend to hurt high-value sites.
SQL注入攻击是一个可能会损害高价值站点的漏洞。
SQL injection attacks can also be used to change data or damage the database.
SQLInjection攻击还可用于更改数据或损坏数据库。
Automatically escapes data saved to the database (to prevent SQL injection attacks).
避免数据自动存入数据库(阻止SQL注入式攻击)。
Doing so makes the SQL easier to maintain and secures your application from SQL injection attacks.
这样做可使SQL更加易于维护,且可使您的应用程序免受SQL注入攻击。
The problem is that this leaves the door wide open to security issues, such as XPath injection attacks.
问题在于这样就会对安全性问题(例如XPath 注入攻击)大开方便之门。
There simply is nothing to subvert, so the application is be largely immune to SQL injection attacks.
将无法被破坏,系统应用将免疫于SQL注射攻击。
Editable Data Validation - HDIV analyzes all editable fields to remove cross-site scripting and SQL injection attacks.
可编辑数据验证——为了去除跨站点脚本和SQL注入攻击,HDIV分析所有的可编辑数据域。
Forever, many hackers attack means, such as phishing and SQL injection attacks, start from the identity authentication.
目前的很多黑客攻击手段,如钓鱼攻击、SQL注入攻击等各种网络攻击方式都是由身份认证开始的。
Following good security best practices will help you protect yourself not only from XPath injection attacks but other forms of attacks as well.
遵守良好的安全最佳实践不仅能够帮助您预防XPath注入攻击,而且可以预防其他形式的攻击。
Not surprisingly most of these preventative methods are the same methods you can and should use to prevent other typical code injection attacks.
这些预防方法中,多数也可以类似地应用于预防其他类型的代码注入攻击。
Like the last example, the page is ripe for SQL injection attacks because the executed SQL is constructed dynamically from a user-entered value.
与上一示例一样,此页也会受到SQLInjection攻击,因为执行的SQL是通过用户输入的值动态构造的。
The characteristics of SQL injection attacks is widespread, covert means, characteristics, methods and tools nonenumerative attack civilians.
而SQL注入攻击具有广泛存在、手段隐蔽、特征不可枚举、攻击手段及工具平民化的特征。
While not directly related to SQL injection attacks, BestLogin.aspx demonstrates another security best practice: the encryption of connection strings.
虽然不与SQLInjection攻击直接相关,但是 BestLogin.aspx演示了另一种安全最佳做法:对连接字符串进行加密。
Blind SQL injection attacks are a well know and recognized form of code injection attack, but there are many other forms, some not so well documented or understood.
SQL盲注攻击是一种为人熟知的代码注入攻击形式,但是也有很多其他形式,有些尚未得到很好的记载和了解。
If a less-than-careful developer entered the text from Listing 5 (in the hopes of embedding the values directly), the call would be exposed to SQL injection attacks.
如果一位粗心大意的开发人员输入了清单5中的文本(以便直接嵌入值),这个调用将面临SQL注入攻击的风险。
SQL injection attacks are a serious concern for application developers as they can be used to break into supposedly secure systems and steal, alter, or destroy data.
SQLInjection攻击与应用程序开发人员紧密相关,因为它们可用于侵入据推测是安全的系统并窃取、更改或销毁数据。
Using parameterized commands helps guard against SQL injection attacks, in which an attacker "injects" a command into a SQL statement that compromises security on the server.
使用参数化命令有助于防范SQL投射攻击,在此类攻击中,攻击者会「投射」命令到 SQL陈述式中,对伺服器的安全性造成危害。
Most developers have heard of a good example of an anti-pattern: The improper use of Structured Query Language (SQL) libraries that result in SQL injection attacks on Web sites.
大多数开发人员听说过关于反模式的一个很好的例子:结构化查询语言(Structured Query Language,SQL)的错误使用导致Web 站点受到 SQL注入攻击。
Most applications that use XML will not be vulnerable to XPath injection attacks and XML applications should not be considered more at risk just because a specific vulnerability is found.
多数使用XML的应用程序不易受到XPath注入攻击,不应该只是因为发现了一个特殊的漏洞就认为XML应用程序风险更大。
This attack functions almost exactly like the blind SQL injection attack but, unlike SQL injection attacks, few people know about XPath injection attacks or take precautions against them.
这种攻击的运作跟SQL盲注攻击几乎完全相似,与SQL注入攻击不同的是,几乎没什么人了解XPath盲注攻击或对其进行预防。
This new edition of DB2 on Rails adds an extra layer of security, thanks to the fact that these "safe" calls are translated into parameterized queries, which are immune to SQL Injection attacks.
DB 2on Rails的这个新版本添加了一层额外的安全性,这要归功于这样一个事实:这些“安全”调用将转换为参数化查询,而参数化查询对SQL注入攻击免疫。
Protection against more elaborate attacks such as SQL injection and Dictionary attacks require more customized configuration, such as user-defined dictionaries containing allowable syntax.
保护免受更复杂的攻击(如SQL注入和字典攻击)需要更多自定义的配置,如用户自定义字典所允许的语法。
One of the more common attacks or threats to Web applications is some form of code injection, which Wikipedia defines as.
一种更常见的对Web应用程序的攻击和威胁是某种形式的代码注入,Wikipedia将其定义为。
In the malicious attack statement, two kinds of attacks, SQL injection and middleware channel multiplexing, are hard and heavy.
在恶意攻击语句中,SQL注入和中间件通道复用两种攻击是难中难,同时也是重中重。
There are hidden dangers of information security in the process of network communication in smart cities, such as Trojans, denial of service attacks, spoofing attacks, SQL injection and worms.
智慧城市网络通信过程中存在信息安全隐患,主要有木马程序、拒绝服务攻击、欺骗攻击、SQL注入和蠕虫病毒等。
BitDefender detects and blocks attempts to change critical system files or registry entries and warns about attacks performed by code injection (DLL injection).
比特梵德检测并阻止试图改变计算机重要系统文件或注册表的行为,并对代码注入(DLL注入)攻击进行警告。
It includes all the currently known information about these attacks and significant insight from its contributing team of SQL injection experts.
它包括所有目前已知的对这些攻击和SQL注入其有贡献的专家团队重大洞察力的信息。
It includes all the currently known information about these attacks and significant insight from its contributing team of SQL injection experts.
它包括所有目前已知的对这些攻击和SQL注入其有贡献的专家团队重大洞察力的信息。
应用推荐