• 这种类型攻击可能数据库密码存储已经暴露的情况下进行。

    This type of attack is only possible if the database or password store is already compromised.

    youdao

  • 攻击跟踪联机数据库内容并试图获取以后用到有价值信息——例如信用卡客户信息。

    An attacker will go after content such as online databases with the intention of getting valuable information that can be used later-for example, credit card or customer information.

    youdao

  • 结构化查询语言(SQL)注入专门针对数据库攻击

    Structured Query Language (SQL) injections are attacks carried out against databases.

    youdao

  • 这样数据库记录里的第一激活用户就被查到,返回这个结果,攻击登陆了。

    And thus it found the first user in the database, returned it and logged him in.

    youdao

  • 例如如果托管联机数据库应用程序电子商务站点,则一定成为攻击目标

    For example, if you host an online database application or e-commerce site, you can expect to be squarely in the sites of an attacker at some point.

    youdao

  • 如果条件合适,则这样攻击所导致损坏程度可能仅限于黑客SQL语言知识程度数据库配置

    Given the right conditions, the extent of damage caused by such an attack may be limited only by the extent of the hacker's knowledge of the SQL language and the database configuration.

    youdao

  • MySQL默认安装特别是密码空缺缓冲区溢出潜在漏洞使得这个数据库服务器成为容易攻击目标

    The default installation of MySQL, particularly the empty root password and the potential vulnerability to buffer overflow, makes the database server an easy target for attacks.

    youdao

  • Evans由于自适应的,需要攻击特征数据库,所以技术有吸引力

    The technique is attractive because it is adaptive and requires no attack signature database, Evans says.

    youdao

  • SQLInjection攻击用于更改数据损坏数据库

    SQL injection attacks can also be used to change data or damage the database.

    youdao

  • 使用用户输入数据查询数据库任何应用程序(包括Windows窗体应用程序)都Injection攻击潜在目标

    Any application that queries a database using user-entered data, including Windows Forms applications is a potential target of an injection attack.

    youdao

  • SQLInjection攻击基本原理如下创建一个网页允许用户文本框输入文本用于数据库执行查询。

    The basic idea behind a SQL injection attack is this: you create a Web page that allows the user to enter text into a textbox that will be used to execute a query against a database.

    youdao

  • 避免数据自动存入数据库(阻止SQL注入式攻击)。

    Automatically escapes data saved to the database (to prevent SQL injection attacks).

    youdao

  • 最后是三个漏洞个是攻击MicrosoftWord的,一个是利用Microsoft's animated cursor vulnerability漏洞最后利用Microsoft's SQL数据库引擎漏洞的Slammer worm蠕虫。

    Three exploits followed: an attack on Microsoft Word, an exploit for Microsoft's animated cursor vulnerability and the Slammer worm, which exploited a flaw in Microsoft's SQL database engine.

    youdao

  • 上周在线交易公司TDAmeritradeHolding数据库黑客攻击了,而且黑客已经掌握许多TD的客户资料

    Last week Internet stock trading company TD Ameritrade Holding said that one of its databases had been hacked by a thief who obtained personal information on some of its customers.

    youdao

  • 但是值得牢记许多IPS嗅探器使用基于特征码的检测方法,这意味着攻击发现的时候才能被加入数据库

    Worth noting, however, is that many IPS sensors use signature-based detection, meaning that attacks are added to a database as they are discovered.

    youdao

  • 这些因素包括:42%的移动设备增长量安装不断增长数据库以及复杂的操作系统这些都为黑客们的攻击提供了条件。

    These elements include growing mobile vulnerabilities, which increased 42 percent, a growing installed base, and sophisticated operating systems from which hackers can launch their attacks.

    youdao

  • 容易使用上文SQL注入中所示相同技巧攻击数据存储区刚好XML文件而不是实际数据库

    They are both vulnerable to attack using the same techniques shown above with SQL injections; the data store just happens to be XML files instead of an actual database.

    youdao

  • 虽然不能详细解释这种攻击如何实施,但如果了解SQL 的话,就可以找到相关的答案。 如果您Web服务器驻留数据库的话,一定要了解这种攻击

    Although I can't get into the specifics of how to pull this type of attack off, you can look it up if you have SQL knowledge, which—if you're hosting database on your Web server—you should have.

    youdao

  • 恶意软件一种常见攻击类型所谓缓冲区溢出攻击,会使接受输入程序崩溃,web浏览器地址数据库搜索窗口

    One common type of malware, called a buffer overflow attack, overwhelms programs that accept input, like the address line in a Web browser or a search window for a database.

    youdao

  • 这种攻击中,攻击利用数据库web页面设计缺陷数据库提取信息甚至操纵数据库信息。

    In this attack, an attacker USES weaknesses in the design of the database or Web page to extract information or even manipulate information within the database.

    youdao

  • DBA或者权限账号攻击获取后虽然攻击能够得到数据库中的全部数据但是由于敏感数据被加密的,所以仍然不能获得明文

    DBA or high privilege account was acquired by the attacker, although the attacker can get all the data in the database, but because the sensitive data is encrypted, it still can not get plaintext.

    youdao

  • 由于敏感数据加密,任何直接数据库文件进行分析攻击方式,都只能看到密文

    Because the sensitive data is encrypted, any direct attack on the database file analysis, can only see the ciphertext.

    youdao

  • 通过修改url攻击可以数据库结构逆向开发有可能找到用户姓名口令甚至信用卡

    By modifying the URL, attackers can reverse-engineer the database structure and potentially find users' names, passwords, or even credit card Numbers.

    youdao

  • 结构数据库标记算法因为在标记时考虑到各种可能的攻击方式,所以其标记好的鲁棒性

    The labeling algorithm for semi structure database is relatively robust because it takes almost all possible attacks into account.

    youdao

  • 课题所研究内容,是开发一个具有网络查询录入功能合成树脂产品数据库系统基础上研究如何在网络上保护系统不被恶意攻击

    This thesis, on the basis of a synthesized resin product database system with functions of query and input from remote host, researches how to protect the system from hostile attacks.

    youdao

  • 实施功能减少数目重新启动更新数据库网络攻击应用模块释放

    Implemented functionality decreasing the number of restarts when updated databases of network attacks or application modules are released.

    youdao

  • 不管是否加密如果数据库捕获攻击者提供了一个源代码验证自己猜测速度只有有限硬件资源

    Whether encrypted or not, if the database is captured it provides an attacker with a source to verify his guesses at speeds limited only by his hardware resources.

    youdao

  • 用于防止试图破坏DHCP绑定数据库攻击进入交换机端口的DHCP流量限速。

    This can be used to prevent attacks that attempt to poison the DHCP binding database, and to rate-limit the amount of DHCP traffic that enters a switch port.

    youdao

  • 分布式拒绝服务攻击没有用来侵入后台数据库攻击多用来阻止用户正常进入某些网页,或者阻止一些功能性服务的正常使用。

    Although distributed denial of service attacks do not harm a database, they are generally carried out to prevent people having access to an Internet site or to prevent a service from functioning.

    youdao

  • 分布式拒绝服务攻击没有用来侵入后台数据库攻击多用来阻止用户正常进入某些网页,或者阻止一些功能性服务的正常使用。

    Although distributed denial of service attacks do not harm a database, they are generally carried out to prevent people having access to an Internet site or to prevent a service from functioning.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定