• NET代码注入我们看到在下面的两个例子

    NET code injection, as we will see in the following two examples.

    youdao

  • 动态代码注入

    Dynamic code injection.

    youdao

  • 本文主要介绍代码注入攻击一种特殊类型XPath

    The focus of this article is a specific type of code injection attack: the Blind XPath injection.

    youdao

  • 注意这方面上,代码注入不同依赖关系注入

    Note that in this regard, code injection is different from dependency injection.

    youdao

  • 代码录入保护:开启这个功能自动防范任何代码注入

    Enable protection against code injection: Having this enabled will automatically prevent any code injection.

    youdao

  • 这些预防方法多数可以类似应用预防其他类型代码注入攻击

    Not surprisingly most of these preventative methods are the same methods you can and should use to prevent other typical code injection attacks.

    youdao

  • 提供这些代码注入因素整个食品基本要素机构蓬勃发展。

    Providing these Code Factors infuses the essential elements of whole foods that the body thrives upon.

    youdao

  • 非常长的描述会引起PS3缓存溢出,导致允许代码注入被执行

    Very long descriptors cause buffer overflows on the PS3, allowing code to be injected onto the stack and executed.

    youdao

  • 用户能够HTML代码注入web页面中时,就是出现xss漏洞

    An XSS vulnerability occurs when a user has the ability to inject HTML code into your Web pages.

    youdao

  • Feschotte提议将少量病毒代码注入禽类基因里,可能产生同类病毒的抗体。

    Feschotte suggests that it is likely having a bit of the virus's code integrated in a bird's genome might have conferred immune protection against similar viruses.

    youdao

  • 我们已经知道攻击是如何代码注入应用程序接下来再看看一些常见攻击所带来的影响

    Now that you know how attackers get their code into applications, look at the implications of some common attacks.

    youdao

  • 防止XPath注入其他形式代码注入应该检查所有Web服务器传到后端服务数据

    To protect against both XPath injection and other forms of code injection, you should check all data passed from your Web server to your backend services.

    youdao

  • 一种常见Web应用程序攻击威胁某种形式代码注入Wikipedia将其定义为。

    One of the more common attacks or threats to Web applications is some form of code injection, which Wikipedia defines as.

    youdao

  • mashup中的某些部分出于恶意目的编写的(或者攻击了),可以将恶意代码注入应用程序中。

    When some part of the mashup is written under malicious intent (or has been hacked), it can inject malicious code into the application.

    youdao

  • 代码注入有限的:字段雇主祖先类型不同原来的方法定义方法可能的。

    Code injection is limited: it is not possible to refer either to the fields or to the methods defined in ancestral types of the owner type of the original method.

    youdao

  • SQL攻击一种为人熟知代码注入攻击形式但是很多其他形式有些尚未得到很好的记载了解

    Blind SQL injection attacks are a well know and recognized form of code injection attack, but there are many other forms, some not so well documented or understood.

    youdao

  • AjaxChat还具有安全性能够防止代码注入SQL注入跨站点脚本攻击会话偷窃以及其他攻击

    Ajax Chat has security in mind to prevent code injections, SQL injections, cross-site scripting, session stealing, and other attacks.

    youdao

  • 通过使用IronPython脚本开发者可以代码注入运行着应用中增加他们想要的任何特性

    With IronPython scripts, developers can inject code into running applications to add whatever features they see as missing.

    youdao

  • 总之方面描述段可重用代码希望可重用代码注入现有中,而不接触这些类的原始程序

    In summary, an aspect describes a reusable piece of code that you want to inject in existing classes without touching the source code of those classes.

    youdao

  • 例如攻击可能通过堆栈溢出(stackcorruption)代码注入进程从而执行攻击选定代码

    For example, attackers could be trying to inject code into the process via stack corruption, resulting in the ability to execute code of the attacker's choice.

    youdao

  • 比特梵德检测阻止试图改变计算机重要系统文件注册表的行为,并代码注入(DLL注入)攻击进行警告。

    BitDefender detects and blocks attempts to change critical system files or registry entries and warns about attacks performed by code injection (DLL injection).

    youdao

  • 恶劣注入攻击形式也许代码注入——代码置入正在运行进程内存空间随后指示正在运行的进程执行这些代码

    Perhaps the most malicious form of injection attack is code injection—placing new code into the memory space of the running process and then directing the running process to execute it.

    youdao

  • 这个方法中,我们可以在调用方法之前之后注入自己代码

    In this method, custom code can be injected before or after invoking the original methods.

    youdao

  • 任何授权代码可以在此注入

    Any authorization code can be injected here.

    youdao

  • 实际上横切关注点代码注入就是一种类型模式

    In fact, the injection of code for crosscutting concerns is a pattern of sorts.

    youdao

  • 意味着我们无法实体管理器注入调用代码

    This means we cannot inject the entity manager into calling code.

    youdao

  • 这种方式通过修改已经编译EXEDLL注入必要代码

    This involves modifying the compiled EXE or DLL to inject the necessary code fragments.

    youdao

  • 任何身份验证代码可以在此注入

    Any authentication code can be injected here.

    youdao

  • EJB没有使用JNDI查找而是通过注入代码定义一个资源引用

    Instead of using JNDI lookups, an EJB can define a resource reference by injecting code.

    youdao

  • 但是使用参数化sQL大大降低黑客SQL注入代码能力

    Using parameterized SQL, however, greatly reduces the hacker's ability to inject SQL into your code.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定