Stolen cookies: XSS attack results
cookie 受窃:XSS攻击的后果
Listing 10 demonstrates how the form could print the results, allowing an XSS attack.
清单10演示了允许XSS攻击的表单如何输出结果。
So, I was especially interested in the results of some related data analysis that I worked on for on the recently released Symantec Report on Attack Kits and Malicious Websites.
因此,我对于工作中得出的相关数据分析结果非常的感兴趣,这些数据最近发表在赛门铁克关于攻击工具和恶意站点的报告中。
Determine the potential for damage from a successful attack that results in a security breach.
确定攻击成功而导致安全性被破坏的可能性。
When script kiddies launch an attack, they typically do so without realizing the results of their actions, such as potentially crashing systems or inadvertently performing a denial of service (DoS).
当脚本kiddy启动一个攻击,他们通常不了解这种行为的后果,如潜在地破坏系统或无意识地执行拒绝服务攻击(DoS)。
My anger at the insensitive reporter simmered along with the disbelief and fear that had become part of my life since watching the results of the attack on America.
在看到美国被恐怖袭击后,我对那个麻木不仁的记者感到恼火,也不敢相信美国遭袭这个事实,更加害怕这个事件对我会造成什么影响。
Experimental results indicate that these techniques are very effective in keeping resilience to cropping attack.
实验结果表明,置乱技术在抵抗剪切攻击方面是非常有效的。
However, this success will be very short-lived for it is extremely easy to 'attack' these analysers to make them produce incorrect results.
然而,成功会是非常短暂的,因为极容易‘攻击’这些分析器、使它们产生不正确的结果。
The results enabled them to choose the right attack directions.
其结果使美军能够选择出正确的进攻方向。
The most destructive results from fires occur when the enemy forces are close together in a building, along a road or assembling for an attack.
上述火力能够产生最大破坏效果的时刻,就是在敌军汇集到一栋建筑内、沿公路行进或者是正在为一次进攻进行集结的时候。
It has profited from the domestic and foreign research results, in this foundation, it discussed automatic production of attack path, as well as attack graph algorithm comparison.
同时,在借鉴国内外研究成果的基础上,探讨了攻击路径的自动生成算法以及对攻击图相关的算法之间的优缺点进行了比较。
A further analysis on enhancing the ability to resist cropping attack is made again according to experimental results.
文中还结合实验结果对增强剪切攻击鲁棒性的技术进行了分析。
Cardiologists have had to decide which type of stent to use in heart attack patients based on small randomized trials that didn't include long-term follow-up and reported conflicting results.
心脏病学家必须在以小没有长期随访并且报告的结果有矛盾的的随机试验的基础上,决定心脏病发作的患者用哪种类型的支架。
Experimental results show that the proposed watermarking scheme is robust against synchronization attack and general signal processing.
实验结果表明,该算法可有效抵抗常规信号攻击,尤其对去同步攻击有较好的鲁棒性。
A new attack classification method was put forward and delivered the criterion and results of the classification.
提出了一种新的基于多维角度的攻击分类方法,给出分类的标准和结果。
Experimental results show that the improved algorithm has stronger ability to resist differential attack, and the avalanche effect of.
实验结果表明,改进后的算法对差分攻击的抵抗能力有所提高,雪崩效应更趋合理。
Experimental results show that, this algorithm is able to resist local cropping attack.
实验表明,该算法能够很好地抵抗局部剪切的攻击。
Experimental results show that this algorithm has a good hiding effect and is robust for single attack and even collage attacks.
实验结果表明,该算法的隐藏效果很好,并且对单一攻击及多种复合攻击具有很好的鲁棒性。
Corrosion fatigue. A type of failure that results from the simultaneous action of a cyclic stress and chemical attack.
由循环应力和化学腐蚀同时作用导致的一类失效。
Based on the description of the algorithm, experimental results and attack analysis are given.
在描述算法的基础上,给出了实验结果及攻击分析。
The research results indicate that E2 not only has excellent performance against differential attack and linear attack, but also can be implemented very flexibly.
研究结果表明,E2不仅具有十分优异的抗差分攻击和抗线性攻击的性能,而且实现也十分方便。
The experimental results show that TVCA can achieve good effects in many aspects such as efficient computing and malicious attack resistance.
模拟实验表明TVCA算法在提高计算效率、抵抗恶意攻击等方面都能取得良好的效果。
The experimental results prove that this algorithm is invisible, robust against the attack of JPEG compression, noise and cut-and-paste attack.
实验结果证明该算法具有良好的不可见性,对JPEG压缩、噪声攻击和剪切攻击都有很好的鲁棒性。
Test results displayed that, under most circumstances, system detection rate was increased when the attack knowledge model was adjusted after learning.
仿真结果表明,在大多数情况下,学习调整后的知识模型能够提高误用检测系统的检测率。
The experimental results and attack analysis show that the watermark algorithm is robust against some image processing operations, such as JPEG lossy compression , rotation, cropping and noise adding.
实验结果表明该水印算法具有良好的抗JPEG压缩、旋转、裁剪和加噪等常见攻击的能力。
The influence of nodal points interval of angle of attack and order of spline function on estimation results is also researched.
同时还研究了迎角节点间隔和样条函数的次数对估计结果的影响。
The influence of nodal points interval of angle of attack and order of spline function on estimation results is also researched.
同时还研究了迎角节点间隔和样条函数的次数对估计结果的影响。
应用推荐