很多人认为,移动设备容易受到安全攻击。
Mobile devices are still perceived by many as being vulnerable to security attacks.
大多数使用者对于安全攻击的知识都很匮乏。
Most users' knowledge of security vulnerabilities of their systems is vague at best.
提供有关如何保护网站免受安全攻击的信息。
Provides information about how to secure the parts of your application that use ADO. NET.
然而,这种随处可用性也使插件成为浏览器安全攻击的主要目标。
However, that ubiquity alsomakes plug-ins prime targets for browser security attacks.
禁止程序直接访问内存,那么整整一大类安全攻击都被彻底清除了。
By totally disallowing any direct access to memory, an entire huge, messy class of security attacks is ruled out.
常见的Web攻击防护——对常见的Web应用安全攻击进行检测。
Common web attacks protection - detecting common web application security attacks.
本节描述了攻击者或者黑客可以使用的潜在的安全攻击方法。
This section describes potential security attack methods from an attacker or hacker.
描述常见的网站安全攻击类型以及如何帮助阻止这些攻击。
Describes common types of Web-site security attacks and how to help prevent them.
首先介绍了网络安全攻击的基本概念和网络安全测试的一般方法。
First. this paper introduces the basic concepts of network security attacking and security testing methods.
当初之所以在.NET中引入这个特性,是为了阻止从网络上进行的安全攻击。
That feature was introduced in .NET from the beginning to prevent security attacks coming from network locations.
安全机制通过增加MAC帧的认证和保密以防御MAC层的安全攻击。
Security mechanism adds authentication and encryption mechanisms to MAC frame to defense MAC layer security attacks.
检测先进的安全攻击提供关键信息上谁,什么,以及为什么袭击发生。
Detects Advanced Attacks provides key information on who, what, and why the attack happened.
对于分布式应用资源的大量安全攻击来说,访问控制是重要的防范手段。
Resources access control (AC) is an essential defensive measure against a large number of security attacks.
也叫TCP会话劫持,它是在受保护的网络上对用户的会话进行安全攻击。
Also referred to as TCP session hijacking, a security attack on a user session over a protected network.
如果运行非最新插件,你的计算机更容易受安全攻击,因为旧插件没有最新安全补丁。
Your computer iseven more vulnerable to security attacks if you're running plug-ins that aren'tup to date, because out-of-date plug-ins don't contain the latest securityfixes.
基于缓冲区溢出的攻击是一种常见的安全攻击手段,也是目前惟一最重要最常见的安全威胁。
The attack, based on the buffer overflow, is a common means of security attacks and is the only most common security threats at present.
然而,在没有签名清单的情况下,很难确保应用程序安装程序在受到中间人安全攻击时不被篡改。
However, without signed manifests, it is difficult to ensure that the application installer is not tampered in man-in-the-middle security attacks.
首先对智能卡安全攻击的主要方法进行了研究,分析了几种最新的智能卡攻击技术的原理与关键步骤。
At first, the main methods of smartcard security attacks are discussed, and the principle and key steps of the latest attack technologies are analysed.
此方法不仅保护第一接入节点(3),而且分别保护后面的网络节点(10)和用户(1),免于安全攻击。
This method not just protects the first access node (3), but also the following network nodes (10) and users (1) respectively, against a security attack.
相比基本移动IP协议的接入认证方法,该方法的加密强度和安全性更高,可以更有效地抵御常见的安全攻击。
Compared with access authentication mechanism based on base mobile IP protocol, security and encryption for the mechanism are enhanced, which can resist common security att...
主要工作概括如下:(1)分析了传感器网络节点定位系统面临的安全挑战、可能受到的安全攻击和安全需求;
The main contributions of this dissertation are:(1) The security issues of location discovery are investigated, including challenges, possible security attacks and security requirements.
本发明涉及一种用于保护网络免于来自用户的安全攻击并且尤其是对于第2层交换机而言免于MAC洪流攻击的方法。
The present invention relates to a method for protecting a network against a security attack from an user, and in particular, for a layer 2 switch, against a MAC flooding attack.
同时列举了整个调度信息系统面临的安全攻击和安全隐患,并提出了电力调度信息系统总体安全防护结构和防护原则。
The paper also discusses the general principle of the security construction, and analyzed the main attack to the dispatching information system.
能否详细谈谈核心规则集项目有哪些新特性,这些新特性是如何帮助开发者和Web管理员保护Web应用免受安全攻击的困扰。
Can you elaborate on the new features in Core Rule Set project and how they help developers and web admins protect web applications against security vulnerabilities.
虽然与之前相比,其安全性有所提高,但当面临安全攻击(被动攻击和主动攻击)时,整个网络系统的安全性仍然亟待提高。
Although compared with the previous, improved their safety, but when faced with security attacks (passive attacks and active attacks), the whole network system security still needs to be improved.
memcpy加入到strcpy,strncpy,strcat,strncat等常用函数的队伍中,都是由于可通过缓存溢出进行安全攻击而被禁用。
Memcpy joins the ranks of other popular functions like strcpy, strncpy, strcat, strncat which were banned due to their security vulnerability through buffer overruns.
memcpy加入到strcpy,strncpy,strcat,strncat等常用函数的队伍中,都是由于可通过缓存溢出进行安全攻击而被禁用。
Memcpy joins the ranks of other popular functions like strcpy, strncpy, strcat, strncat which were banned due to their security vulnerability through buffer overruns.
应用推荐