• This method removes the potential for an SQL injection attack.

    这种方法消除SQL注入攻击可能性

    youdao

  • In an SQL injection attack, a program creates an SQL command and sends it to an SQL interpreter.

    SQL注入攻击中,程序会创建一个SQL命令其发送给SQL解释器。

    youdao

  • In an SQL injection attack, Mallory finds a Web site that Alice has created to sell electronics.

    SQL注入攻击中,Mallory找到Alice创建一个Web站点

    youdao

  • The SQL injection attack shown in Figure 3 resulted in the display of user names and passwords from the Users table.

    3SQL Injection攻击导致显示users中的用户密码

    youdao

  • Forever, many hackers attack means, such as phishing and SQL injection attacks, start from the identity authentication.

    目前的很多黑客攻击手段钓鱼攻击、SQL注入攻击等各种网络攻击方式都是身份认证开始的。

    youdao

  • Like the SQL injection attack, you can often easily deal with the threat if you follow best practices to develop secure applications.

    SQL注入攻击类似如果使用最佳实践开发安全应用程序通常可以轻松地处理该威胁

    youdao

  • The characteristics of SQL injection attacks is widespread, covert means, characteristics, methods and tools nonenumerative attack civilians.

    SQL注入攻击具有广泛存在手段隐蔽特征不可枚举、攻击手段工具平民化特征。

    youdao

  • While it's easy to point to one or two key measures for the prevention of the SQL injection attack, it's best to take a layered approach to the problem.

    尽管采取项关键措施预防SQL Injection攻击容易最好问题采用分层方法

    youdao

  • Blind SQL injection attacks are a well know and recognized form of code injection attack, but there are many other forms, some not so well documented or understood.

    SQL攻击一种为人熟知代码注入攻击形式但是很多其他形式有些尚未得到很好的记载和了解。

    youdao

  • The basic idea behind a SQL injection attack is this: you create a Web page that allows the user to enter text into a textbox that will be used to execute a query against a database.

    SQL Injection攻击基本原理如下创建一个网页允许用户文本框输入文本用于数据库执行查询。

    youdao

  • This attack functions almost exactly like the blind SQL injection attack but, unlike SQL injection attacks, few people know about XPath injection attacks or take precautions against them.

    这种攻击运作SQL攻击几乎完全相似,SQL注入攻击不同的是,几乎没什么了解XPath盲注攻击其进行预防。

    youdao

  • Parameterized commands guard against a SQL injection attack by guaranteeing that values received from an external source are passed as values only, and not part of the SQL statement.

    参数化命令会借保证外部来源接收数值传递SQL陈述式传递,以防范SQL投射攻击

    youdao

  • In this article, the author explains the principle and process of SQL Injection Attack, and introduces a serial interrelated solution to prevent SQL Injection Attack from the aspect of code in detail.

    介绍SQL注入攻击原理SQL注入攻击过程功能代码本身方面详细介绍SQL注入攻击的防范措施

    youdao

  • In addition to the overflow exploits, SQL injection is one other type of attack that relies on developer oversight by not testing incoming data.

    除了溢出的利用以外,SQL注入一类依赖开发人员测试输入数据疏漏攻击

    youdao

  • In the malicious attack statement, two kinds of attacks, SQL injection and middleware channel multiplexing, are hard and heavy.

    恶意攻击语句中,SQL注入中间件通道复用攻击中难,同时也是中重。

    youdao

  • The main way: password loophole attack, SQL Server extended stored procedure attack, SQL Injection (SQL Injection), steals backup, etc.

    主要手法有:口令漏洞攻击SQLServer扩展存储过程攻击、SQL注入(SQL Injection)、窃取备份

    youdao

  • The main way: password loophole attack, SQL Server extended stored procedure attack, SQL Injection (SQL Injection), steals backup, etc.

    主要手法有:口令漏洞攻击SQLServer扩展存储过程攻击、SQL注入(SQL Injection)、窃取备份

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定