Perhaps the most malicious form of injection attack is code injection—placing new code into the memory space of the running process and then directing the running process to execute it.
最恶劣的注入攻击形式也许是代码注入——将新代码置入正在运行的进程的内存空间,随后指示正在运行的进程执行这些代码。
Essentially, what happens in an overflow style of attack is too much data is pushed into what the original programmer thought was enough space.
实质上,溢出类攻击是由于将太多的数据放入原始程序设计人员认为足够的空间中导致的。
More subtly, passengers will need to demonstrate that they have the psychological stability to handle a trip to space without the sort of panic attack that could scuttle the mission.
再深入一点,乘客必须展现出过硬的心理素质以应对空间旅行,从而不至于在中途因惊恐而发作,搞砸飞行任务。
The danger is that if you forget to take the available buffer space into account, you can still permit a buffer overflow attack even when usingstrncpy(3).
这样的危险之处在于,如果忘了考虑可用的缓冲区空间,那么即使在使用strncpy(3)时也可能会留下缓冲区攻击隐患。
We can also set up a really effective system of defense in space to protect our country from foreign attack.
我们也可以设立真正有效率的太空防卫系统,以保护国家免受外来攻击。
Cover and m Attacks: When making a m attack, choose a square of the attacker's space.
掩护和范围攻击︰当进行范围攻击时,选择一个攻击者所在的方格。
It became the subject of early Separatists attacks during the Clone Wars, with Mon Calamari Commander Merai leading a joint space and surface attack on the planet.
在克隆人战争期间,它成为分离势力早期攻击的目标,蒙卡拉马里人梅赖指挥官对这颗星球发动了空陆联合进攻。
Xorn Ravager (30/60): When using Undermine, this creature can make an attack against any enemy whose space it enters during the movement allowed during this attack action.
索尔石怪劫掠者(30/60):当使用坑道挖掘,这生物可以对任何被他在攻击动作时穿越的生物进行一次近战攻击。
You want the role of mercenaries and head out to the corner of space to destroy alien attack, and find the alien behind them.
你要的作用雇佣军和头部到外的角落空间摧毁外来攻击,并找到外来他们的幕后策划者。
UFO enthusiasts claim the video shows that the space shuttle was being followed by extraterrestrial spacecraft, which then fled in response to a ground-based laser attack.
UFO爱好者们宣称这段视频展现了航天飞机被外星人飞行器跟踪,随后在地面激光攻击下逃离的情形。
Comparing with land military countermeasure, the space has some natural features as follows: asymmetry in attack and defense, 'soft' destruction, concealment and rapidness of countermeasure.
与地面军事对抗行动相比,空间军事对抗具有以下特点:攻防的不对称性、进攻的软性化、对抗的隐蔽性和对抗的瞬时化。
In the game, the role of the space bar there are many, such as jump, attack or suspension.
在游戏中,空格键的作用有很多种,比如跳、攻击或暂停等。
Successful defense should reasonably utilize defense skill under the time and space characteristics, namely understanding the opponent, interfere the attack time endurance and control space.
成功的防守应在时空特性下合理运用防守技术,即了解对手,破坏对手进攻的时间持续性和控制空间。
Currently in 1.09 as the Brotherhood of Nod, the upper-hand is easy to acheive with multiple attack angles and plenty of space for flanking and sneak attacks.
在当今1.09中,Nod兄弟会是公认的强势,它可以方便的实行多角度攻击同时拥有足够的空间来进行侧翼进攻和偷袭。
The formation of the clothing, primarily in order to be able to in the vast space activities, to resist cold, cover the sun and rain, and sand separated the attack.
而服饰的形成,主要是为了能在广阔的空间活动时,用来抵御严寒,遮隔日晒雨淋和风沙袭击的。
The limit that space domain only be applied in LSB under gray image of digital watermark was changed. Then, experiment showed that the method have a better adaptability to normal attack.
在灰度图像中的数字水印中,空间域方法只能用在LSB(最低有效位)的局限性,同时,实验表明对常规攻击具有较好的识别能力。
Finally, the composing of space weapon platform based on USA space attack - (defense) confrontation concept system is presented.
最后给出了美国空间攻防对抗概念体系下的空间武器平台的构成。
Opponents of Star Wars are worried that a system might introduce nuclear weapons into outer space and might not completely protect the nation against attack.
反对星球大战的人们担心,这个系统可能会把核武器引入外层空间,而且不可能完全使国家免受核攻击。
The model was suitable for describing complicated network attack, which could reduce the scale of state space effectively.
该模型能够有效缩减状态空间的规模,适合对复杂网络攻击建模。
Finally, it points out that the space environment and its effect are the important information guarantee and utilization components in the space attack-defense confrontation.
从作战保障的角度,指出空间环境及其效应是空间攻防对抗中信息保障及信息利用的重要组成部分。
Finally, it points out that the space environment and its effect are the important information guarantee and utilization components in the space attack-defense confrontation.
从作战保障的角度,指出空间环境及其效应是空间攻防对抗中信息保障及信息利用的重要组成部分。
应用推荐