2007年,有60万新的恶意代码病毒。
2008年,有160万新的恶意代码病毒。
恶意代码在一个受信任的域或上下文中执行。
Execution of malicious scripts within a trusted domain or context.
是否可以更容易地欺骗浏览器以运行恶意代码?
同样的技术使得微软可发现注入其产品的恶意代码。
The same techniques allow Microsoft to find malicious code that may have been injected in its products.
例如,黑客可以利用恶意代码控制使用该软件的电脑。
For example, a hacker could use malicious code to take control of PCs using the software.
恶意代码会被在会发生任何糟糕情况的服务器上执行。
And that code executes on a server, where it can do all kinds of bad things.
而且,这个恶意代码还可能控制该mashup页面。
Also, the malicious code can gain control of the mashup page.
微软警告公众,泄露版本可能带有恶意代码,可攻击电脑。
Microsoft has warned that the leaked software may get infected with malicious codes which could then attack computers.
遗憾的是,恶意代码进入Web应用程序的方法多种多样。
Unfortunately, malicious code can find its way into a Web application in many ways.
按需脚本可能包含打算攻击XXS等安全漏洞的恶意代码。
On-demand scripts can include malicious code aimed at exploiting security vulnerabilities such as XSS.
这种不小心的解释会导致恶意代码的执行和潜在的安全侵犯。
This inadvertent interpretation can lead to malicious code execution and possible security violations.
对于链接内含有恶意代码的动态生成页面,情况也是一样的。
The same is true on a dynamically generated page if a link has malicious code in it.
因此,恶意代码就不能读取,更改或进一步损害计算机中的数据。
The malicious code therefore cannot read, alter, or further damage the data on your computer.
修改真实的恶意代码来绕开防病毒软件没能让很多安全厂商高兴。
The modification of actual malicious code to bypass antivirus has not pleased many security-software vendors.
是的,似乎如果想让恶意代码生效,用户还是得使用IE浏览器。
Yes, it seems that to get the malicious code working, a user would still need to be surfing with IE.
保护自己免于恶意代码攻击的一种方法是确保接收到预期的输入。
One way to protect yourself from malicious code is to make sure that what you expect as input is actually what you receive as input.
他可以进入邻居的虚拟机并在PaaS应用程序中添加恶意代码。
He can get inside a neighbor's virtual machine and add malicious code to PaaS applications.
正如我们已经讨论的,JVM提供了防止恶意代码进入企业系统的服务。
As we have discussed, the JVM serves to prevent malicious code from entering an enterprise system.
供电设施和私人供电公司并没有给防毒软件打补丁以应对恶意代码攻击。
Utilities and private power firms have failed to install patches in security software against malware threats.
于是浏览器会执行攻击者引入的恶意代码,数据将被传递到黑客的网站。
The malicious script introduced by the attacker is executed by the browser and the data is passed to the hacker's Web site.
这就把构建服务器置于提交给源树的 bug和恶意代码的风险之下。
This puts your build server at some risk from bugs and malicious code committed to source trees.
就算你打开一个恶意网页,浏览器的沙箱也会阻止恶意代码安装到硬盘上。
If you open a malicious web page, the browser's sandbox prevents that malicious code from leaving the browser and installing itself to your hard drive.
如果目标Web站点不检查这类恶意代码,就可能造成恶意使用用户信息。
If the targeted Web site doesn't check for this type of malicious code, misuse of the user is probable.
如果我接受了一段恶意代码,其破坏了我的计算机,那又是谁的错呢?
If I accept a malicious piece of code that wreaks havoc on my computer, whose fault is it?
如您所见,黑客将恶意代码作为其userid输入,修改了查询语句的逻辑。
As you can see, the hacker changes the query's logic by entering the malicious code as his userid.
保证Web站点的页面只有在验证了用户输入没有恶意代码之后才返回用户输入。
Guarantee that the pages in the Web site return user inputs only after validating them for any malicious code.
微软说,为了利用这个安全漏洞,黑客必须欺骗用户访问一个装载了恶意代码的网站。
To exploit the security hole, hackers must trick users into visiting a Web site loaded with malicious code, Microsoft said.
如果数据包含恶意代码,mashup页面上的敏感数据就有可能落入恶意用户手中。
If the data contains malicious code, sensitive data on the mashup page can fall into the wrong hands.
但对普通计算机用户来说,只需采取一些常识性步骤即可免受病毒和其它恶意代码的侵扰。
But for the average computer user there are some common-sense steps that can help protect against viruses and other malicious computer code.
应用推荐