使用看起来可信任的中间媒介传输恶意数据的攻击被称为“交叉站点恶意内容”攻击。
Attacks that exploit an apparently trustworthy intermediary to pass on malicious data are called "cross-site malicious content" attacks.
由于攻击者通常是试图添加恶意的脚本,因些这种变化被称为“交叉站点脚本攻击” (XSS攻击)。
Since attackers are usually trying to add malicious scripts, this particular variation is called a "cross-site scripting attack" (XSS attack).
httpOnlyCookies属性对付交叉站点脚本攻击十分有用;它意味着浏览器将无法通过脚本语言访问Cookie。
The httpOnlyCookies attribute is useful as a measure against cross-site scripting attacks; it indicates to the browser that the cookie should not be accessible from scripts.
交叉站点脚本攻击的一些例子是什么?
基地如果缺乏补给或者有游击队攻击,将在地图上显示黄色叹号提醒,上回合交战的基地也会显示出双枪交叉符号。
New map ICONS to show bases that are low on supply or have had partisan attacks. Map ICONS will also show hexes which had combat in the last turn.
攻击技术涉及到左直拳、左刺拳、左钩拳、右上钩拳、右交叉拳以及组合拳,如1 - 2连击的组合拳。
Punching involves quite a few skills, such as the straight left, the left jab, the left hook, the right uppercut, the right cross as well as the combination punching like the one-two.
若以两种抗原加福氏佐剂分别免疫小鼠,以日本血吸虫大陆株尾蚴攻击感染,减虫率相似(26~32%),表明两种抗原存在一定程度的交叉免疫保护性。
The worm reduction rate after challenging with mainland strain cercariae in mice immunized with rSj26 was 26~32%, similar to that in mice immunized with 24-26 kDa antigen.
若以两种抗原加福氏佐剂分别免疫小鼠,以日本血吸虫大陆株尾蚴攻击感染,减虫率相似(26~32%),表明两种抗原存在一定程度的交叉免疫保护性。
The worm reduction rate after challenging with mainland strain cercariae in mice immunized with rSj26 was 26~32%, similar to that in mice immunized with 24-26 kDa antigen.
应用推荐