• 很多认为移动设备容易受到安全攻击

    Mobile devices are still perceived by many as being vulnerable to security attacks.

    youdao

  • 大多数使用者对于安全攻击知识匮乏。

    Most users' knowledge of security vulnerabilities of their systems is vague at best.

    youdao

  • 提供有关如何保护网站免受安全攻击信息

    Provides information about how to secure the parts of your application that use ADO. NET.

    youdao

  • 然而,这种随处可用性也使插件成为浏览器安全攻击主要目标

    However, that ubiquity alsomakes plug-ins prime targets for browser security attacks.

    youdao

  • 禁止程序直接访问内存,那么整整一大类安全攻击彻底清除了

    By totally disallowing any direct access to memory, an entire huge, messy class of security attacks is ruled out.

    youdao

  • 常见Web攻击防护——对常见的Web应用安全攻击进行检测

    Common web attacks protection - detecting common web application security attacks.

    youdao

  • 描述了攻击或者黑客可以使用潜在的安全攻击方法

    This section describes potential security attack methods from an attacker or hacker.

    youdao

  • 描述常见网站安全攻击类型以及如何帮助阻止这些攻击

    Describes common types of Web-site security attacks and how to help prevent them.

    youdao

  • 首先介绍网络安全攻击基本概念网络安全测试的一般方法

    First. this paper introduces the basic concepts of network security attacking and security testing methods.

    youdao

  • 当初之所以.NET中引入这个特性为了阻止网络上进行的安全攻击

    That feature was introduced in .NET from the beginning to prevent security attacks coming from network locations.

    youdao

  • 安全机制通过增加MAC认证保密防御MAC安全攻击

    Security mechanism adds authentication and encryption mechanisms to MAC frame to defense MAC layer security attacks.

    youdao

  • 检测先进安全攻击提供关键信息什么以及为什么袭击发生

    Detects Advanced Attacks provides key information on who, what, and why the attack happened.

    youdao

  • 对于分布式应用资源大量安全攻击来说,访问控制重要防范手段

    Resources access control (AC) is an essential defensive measure against a large number of security attacks.

    youdao

  • TCP会话劫持,它是在保护的网络用户的会话进行安全攻击

    Also referred to as TCP session hijacking, a security attack on a user session over a protected network.

    youdao

  • 如果运行最新插件计算机容易安全攻击因为插件没有最新安全补丁

    Your computer iseven more vulnerable to security attacks if you're running plug-ins that aren'tup to date, because out-of-date plug-ins don't contain the latest securityfixes.

    youdao

  • 基于缓冲区溢出攻击一种常见安全攻击手段也是目前惟一最重要最常见的安全威胁

    The attack, based on the buffer overflow, is a common means of security attacks and is the only most common security threats at present.

    youdao

  • 然而没有签名清单的情况下,很难确保应用程序安装程序受到中间人安全攻击被篡改

    However, without signed manifests, it is difficult to ensure that the application installer is not tampered in man-in-the-middle security attacks.

    youdao

  • 首先智能卡安全攻击主要方法进行了研究,分析了几种最新的智能卡攻击技术原理关键步骤

    At first, the main methods of smartcard security attacks are discussed, and the principle and key steps of the latest attack technologies are analysed.

    youdao

  • 方法不仅保护第一接入节点(3),而且分别保护后面网络节点(10)用户(1),免于安全攻击

    This method not just protects the first access node (3), but also the following network nodes (10) and users (1) respectively, against a security attack.

    youdao

  • 相比基本移动IP协议接入认证方法,该方法加密强度安全更高,可以更有效地抵御常见安全攻击

    Compared with access authentication mechanism based on base mobile IP protocol, security and encryption for the mechanism are enhanced, which can resist common security att...

    youdao

  • 主要工作概括如下:(1)分析传感器网络节点定位系统面临安全挑战、可能受到的安全攻击安全需求

    The main contributions of this dissertation are:(1) The security issues of location discovery are investigated, including challenges, possible security attacks and security requirements.

    youdao

  • 发明涉及一种用于保护网络免于来自用户安全攻击并且尤其是对于第2交换机而言免于MAC洪流攻击方法

    The present invention relates to a method for protecting a network against a security attack from an user, and in particular, for a layer 2 switch, against a MAC flooding attack.

    youdao

  • 同时列举了整个调度信息系统面临安全攻击安全隐患,提出了电力调度信息系统总体安全防护结构和防护原则

    The paper also discusses the general principle of the security construction, and analyzed the main attack to the dispatching information system.

    youdao

  • 能否详细谈谈核心规则项目有哪些特性这些新特性是如何帮助开发者Web管理员保护Web应用免受安全攻击的困扰。

    Can you elaborate on the new features in Core Rule Set project and how they help developers and web admins protect web applications against security vulnerabilities.

    youdao

  • 虽然之前相比安全有所提高面临安全攻击(被动攻击主动攻击)时,整个网络系统安全仍然亟待提高。

    Although compared with the previous, improved their safety, but when faced with security attacks (passive attacks and active attacks), the whole network system security still needs to be improved.

    youdao

  • memcpy加入到strcpy,strncpy,strcat,strncat常用函数队伍中,都是由于通过缓存溢出进行安全攻击而被禁用

    Memcpy joins the ranks of other popular functions like strcpy, strncpy, strcat, strncat which were banned due to their security vulnerability through buffer overruns.

    youdao

  • memcpy加入到strcpy,strncpy,strcat,strncat常用函数队伍中,都是由于通过缓存溢出进行安全攻击而被禁用

    Memcpy joins the ranks of other popular functions like strcpy, strncpy, strcat, strncat which were banned due to their security vulnerability through buffer overruns.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定