• A malicious user can send a really long data sequence.

    恶意用户发送超长数据

    youdao

  • Provides information on guarding against malicious user input.

    提供有关防止恶意用户进行输入的信息

    youdao

  • But a malicious user could change the id via firebug or some other tool.

    但是恶意用户可以通过浏览器其他工具更改id

    youdao

  • What happens if a malicious user decides to submit the form 10,000 times in a single day?

    如果恶意用户决定一天内提交 10,000表单,会发生什么情况呢?

    youdao

  • One example is defacing a Web page, where the malicious user gets into your site and changes files.

    例如恶意用户进入站点更改文件,从而使网页变得面目全非。

    youdao

  • There is no malicious user could get the token to access the information you don't want to publish.

    没有恶意用户可以得到访问希望发布信息

    youdao

  • Consider the scenario in which a malicious user USES proxy tools to hijack data sent by the browser.

    考虑恶意用户代理工具劫持浏览器发送数据情况

    youdao

  • This brings up a few questions: What if a malicious user hacks the underlying security mechanism itself?

    这会带来几个问题如果恶意用户攻破底层安全机制本身,那么会怎么样?

    youdao

  • In such cases, if a malicious user exploits these sessions, the user can potentially disrupt the system.

    这些情况下如果恶意用户利用这些会话,用户就潜在地换系统。

    youdao

  • Any code that executes in a Web browser can be tampered with, or bypassed completely, by a malicious user.

    Web浏览器运行任何代码可能恶意用户篡改或者完全绕开

    youdao

  • The biggest potential problem is gems with dashes in them. A malicious user could go to GitHub and create a.

    严重的潜在问题莫过于带有破折号(dash)的gems了。

    youdao

  • A malicious user manages to get code (script) to execute by masking it as user input from a page or as a link.

    恶意使用者能够取得要执行程序码(指令码),方法是将伪装页面的使用者输入连结

    youdao

  • It is possible for a malicious user to use the postback script to send arbitrary post events to server controls.

    恶意用户可能使用脚本服务器控件发送任意发送事件

    youdao

  • As more malicious users target the site, the company will have to protect the user behaviors that give the site its value.

    随着更多恶意用户目标指向网站,Twitter将要保护用户行为以此该网站存在的意义。

    youdao

  • If a malicious user gets hold of this key information, then the security of that host machine can be compromised very easily.

    如果恶意用户获得了这些密钥信息那么主机安全性容易受到威胁。

    youdao

  • Using a Padding Oracle (PO) attack a malicious user can access encrypted data such as cookies, state, membership password, etc.

    恶意用户能够使用PaddingOracle (PO)攻击方式来解密cookie加密状态认证密码等关键信息。

    youdao

  • For example, a malicious user could construct a build definition to run arbitrary code to take control of the server and steal data.

    例如恶意用户可能会构建用于运行任意代码生成定义,从而控制服务器窃取数据

    youdao

  • For example, a malicious user could gain access to a user's resources if the user walks away from his machine and leaves it logged in.

    例如如果用户登录之后离开了机器恶意用户就可以访问资源

    youdao

  • A malicious user could record communication between the client and the server and then use that information to replay the transaction.

    恶意用户可以记录客户端服务器之间通信然后使用信息重播事务

    youdao

  • A malicious user can change the information returned by the role service to access components that the user does not have permission to access.

    恶意使用者可能会更改角色服务传回资讯存取无权存取的元件

    youdao

  • If you create custom error messages, make sure that you do not display information that might help a malicious user compromise your application.

    安全说明如果创建自定义错误信息确保显示信息不会帮助恶意用户损害的应用程序。

    youdao

  • When your application displays error messages, it should not give away information that a malicious user might find helpful in attacking your system.

    应用程序显示错误讯息时,有助于恶意使用者攻击系统的资讯出。

    youdao

  • If a malicious user can overwrite the buffer, then the value of the flag can be changed, thus providing the attacker with illegal access to private files.

    如果不怀好意使用者缓冲区变更标志从而指出攻击者是非法存取专用文件。

    youdao

  • Data can be stored in the session with no direct way for a malicious user to alter it. (Bugs in your code may still give an attacker an opening, of course.)

    数据可以存储会话中恶意用户无法直接修改(当然代码中的bug仍然可能产生安全漏洞)。

    youdao

  • The most security-conscious developers distrust even their own databases, on the theory that a malicious user might have found a way to tamper with the database.

    安全意识很强开发人员甚至不信任他们自己的数据库,理由是他们认为恶意用户可能办法篡改数据库。

    youdao

  • A malicious user can exploit this by supplying you with data or style sheets that when executed can cause your system to process until the computer runs low on resources.

    某个恶意用户可能利用这一点,如果执行用户提供数据样式,就会导致系统不停地进行处理直至计算机资源消耗殆尽。

    youdao

  • Unsafe arguments are ones that include database or command line escape characters that could allow a malicious user to manipulate your application into executing arbitrary commands.

    不安全参数包含数据库命令转义的参数,这些转义符可以恶意用户操纵应用程序执行任意命令。

    youdao

  • Directory traversal is another injection-style attack, wherein a malicious user tricks filesystem code into reading and/or writing files that the Web server shouldn't have access to.

    目录遍历另一注入类型攻击,攻击者欺骗文件系统服务器允许操作的文件

    youdao

  • Malicious software often infects a corporate network by exploiting security holes in web browsers to infiltrate a PC when its user visits a dodgy website.

    恶意软件经常通过嗅探网络浏览器安全漏洞感染公司网络用户访问隐藏网页时,所用电脑会感染病毒。

    youdao

  • Malicious software often infects a corporate network by exploiting security holes in web browsers to infiltrate a PC when its user visits a dodgy website.

    恶意软件经常通过嗅探网络浏览器安全漏洞感染公司网络用户访问隐藏网页时,所用电脑会感染病毒。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定