• 如果程序数据浏览器或者编辑器——比如文字处理器或者图像显示器——那么那些数据可能来自攻击者,所以可信输入

    If your program is a viewer or editor of datasuch as a word processor or an image displayer—that data might be from an attacker, so it's an untrusted input.

    youdao

  • 黑客可以使用这种攻击技巧检索破坏删除数据

    A hacker could use this attack technique to retrieve, corrupt, or delete data.

    youdao

  • 消息探听——通过检查消息所有部分内容数据隐私进行直接攻击

    Message snooping — a direct attack on data privacy by examining all or part of the content of a message.

    youdao

  • 所有类型电脑容易遭受电力故障数据被盗但是细菌对于网络攻击免疫的。可以信息进行安全地保护

    All kinds of computers are vulnerable to electrical failures or data theft. But bacteria are immune from cyber attacks. You can safeguard the information.

    youdao

  • 通过诱使一个WPA发送大量数据然后无需使用字典式攻击,而是使用数学方法就可以破解掉

    This is done by tricking a WPA to send out a large amount of data, and then mathematically cracking it without using a dictionary attack.

    youdao

  • 但是查看数据时,发现那些攻击市场并不是被随意选中的。

    When you look at the data, however, it is hard to argue that the markets have been attacking at random.

    youdao

  • 保护文档透明性基础上构建敏感数据免受攻击的方法通过加密部分XML文档降低透明性。

    One way to protect sensitive data from attacks built on document transparency is to curtail the transparency by encrypting parts of XML documents.

    youdao

  • 这样使得操纵返回地址困难多了不会阻止改变调用函数数据缓冲区溢出攻击

    This makes it much harder to manipulate the return address, but it doesn't defend against buffer overflow attacks that change the data of calling functions.

    youdao

  • 除了溢出的利用以外,SQL注入一类依赖开发人员测试输入数据疏漏攻击

    In addition to the overflow exploits, SQL injection is one other type of attack that relies on developer oversight by not testing incoming data.

    youdao

  • 答案各种情况下不尽相同;实际上,程序可能通过没有想到途径得到攻击者的数据

    The answer is from a surprising number of places; in fact, your program may be getting data from an attacker in ways you weren't prepared for.

    youdao

  • 如果程序无论如何还是使用结果数据,那么攻击尝试缓冲区以便数据被截断使用希望的任何内容填充缓冲区。

    If the program USES the resulting data anyway, an attacker will try to fill up the buffer so that when the data is truncated, the attacker will fill the buffer with what the attacker wanted.

    youdao

  • 只要可能,请确保发送数据不会受到攻击者的控制

    When possible, make sure that the data you send won't be controlled by an attacker.

    youdao

  • 数据暗示肝脏肾脏可能乙苯毒性攻击目标

    Data also suggests that the liver and kidneys may be a target of toxicity for ethylbenzene.

    youdao

  • 使用看起来可信任中间媒介传输恶意数据攻击称为“交叉站点恶意内容”攻击

    Attacks that exploit an apparently trustworthy intermediary to pass on malicious data are called "cross-site malicious content" attacks.

    youdao

  • 网络传输数据容易受到各种网络攻击例如嗅探网络传输、不可抵赖性、篡改数据、欺骗、拦截捕捉回复

    The data transmitted over the network is susceptible to network attacks like snooping the network traffic, non-repudiation, tampering the data, spoofing, hijacking, and capture-replay.

    youdao

  • 不幸,将数据攻击者传递到对数据进行解释非常常见的

    Unfortunately, passing data from attackers to libraries that interpret that data is common.

    youdao

  • 然而事实上所有在线数据容易遭受数据损坏、恶意攻击甚至意外删除

    However, the fact remains that any data that is online is susceptible to data corruption, malicious attacks, and even accidental deletion.

    youdao

  • 受到攻击数据包括用户姓名电子邮箱地址介绍信个人简历及一些年前信息

    The compromised data included names and email addresses, covering letter and CVs, and some of the information was thought to be up to two years old.

    youdao

  • 难道就任由无人飞行器仅仅依据数据分析发动攻击吗?

    Does it follow that an unmanned aircraft should be allowed to fire a weapon based entirely on its own data analysis?

    youdao

  • 模糊测试中,随机数据(也称做fuzz)攻击一个程序然后等着观察哪里遭到了破坏

    In fuzz testing, you attack a program with random bad data (aka fuzz), then wait to see what breaks.

    youdao

  • 不管怎样,输入验证数据消毒(sanitation)防止XSS攻击关键因素

    In either case, input value validation and sanitization are the key to preventing XSS attacks.

    youdao

  • 数据篡改——利用访问控制机制允许攻击Web服务进行未经授权调用弱点更改数据

    Data tamperingExploiting weakness in the access control mechanism that permits the attacker to make unauthorized calls to the Web service to alter data.

    youdao

  • 追踪网络攻击时,Zone - H的数据是非常方便工具。

    When I have tracked website attacks, I've found it convenient to look at the Zone-H statistics.

    youdao

  • 这种类型攻击可能数据密码存储已经暴露的情况下进行。

    This type of attack is only possible if the database or password store is already compromised.

    youdao

  • 因此对于工作中得出的相关数据分析结果非常感兴趣,这些数据最近发表赛门铁克关于攻击工具恶意站点报告中

    So, I was especially interested in the results of some related data analysis that I worked on for on the recently released Symantec Report on Attack Kits and Malicious Websites.

    youdao

  • 应用程序可能还需要更多但是要限制它们 ——除非特别需要,否则不要接受潜在攻击数据

    Your application might need a few more, but limit them -- don't accept data from a potential attacker unless it's critically needed.

    youdao

  • 重用的组件传递数据攻击可能试图应用程序提供数据,从而一些期望的事情。

    Attackers may try to provide data to your application that, when passed on to the reused component, will do what you don't expect.

    youdao

  • 常见格式化字符串攻击来自于思想攻击可以控制显示数据所使用格式

    The often-serious format string attack is based on the idea that an attacker can control the format used to display data.

    youdao

  • 测试额外安全性攻击问题例如所部署应用程序上会间接伤害数据中心其他应用程序的恶意攻击

    Testing for additional security and vulnerability issues; for example, malicious attacks on a deployed application that can indirectly harm other applications in the data center.

    youdao

  • 测试额外安全性攻击问题例如所部署应用程序上会间接伤害数据中心其他应用程序的恶意攻击

    Testing for additional security and vulnerability issues; for example, malicious attacks on a deployed application that can indirectly harm other applications in the data center.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定