在重新分配实例资源之前,彻底清除其中的残留数据。
Purging residual data from instance resources before they are re-allocated.
黑客还可以通过发送 SQL 注入找到文件名,然后寻找这些文件中的残留数据。
The hacker can also get in by sending SQL injections to find file names and can look for residual data in those files.
黑客可以从虚拟机中重新分配的实例资源中获取还没有清除的残留数据,从中窃取敏感的信息。
The hacker can steal sensitive information from residual data that has not been purged from re-allocated instance resources within a virtual machine.
应用推荐