• 保护自己免于恶意代码攻击一种方法确保接收预期的输入。

    One way to protect yourself from malicious code is to make sure that what you expect as input is actually what you receive as input.

    youdao

  • 供电设施私人供电公司没有防毒软件补丁应对恶意代码攻击

    Utilities and private power firms have failed to install patches in security software against malware threats.

    youdao

  • OSX中的安全技术帮助保护应用生成管理敏感数据恶意代码攻击造成损害降到最低。

    The security technologies in OS X help you safeguard sensitive data created or managed by your app, and help minimize damage caused by successful attacks from hostile code.

    youdao

  • SQL攻击一种为人熟知代码注入攻击形式但是很多其他形式有些尚未得到很好的记载了解

    Blind SQL injection attacks are a well know and recognized form of code injection attack, but there are many other forms, some not so well documented or understood.

    youdao

  • 由于这个事实所有可执行代码转移包含0地址会使得攻击程序困难了。

    Since that's the case, moving all executable code to addresses with a 0 in it makes attacking the program far more difficult.

    youdao

  • 内存空间缺口——通过溢出缓冲区溢出错误来实现,以宿主进程权限执行攻击提供任何代码

    Memory space breachAccomplished via stack overflow, buffer overrun, or heap error, enables execution of arbitrary code supplied by the attacker with the permissions of the host process.

    youdao

  • 研究人员寻找恶意软件攻击载体时,他们往往寻找接口代码中的漏洞

    When researchers look for malware and attack vectors, the tendency is to look for vulnerabilities in portals or code.

    youdao

  • 尽管限制浏览器只浏览信任站点可以减少受到攻击风险恶意代码可以植入任何网站

    While restricting web surfing to trusted sites should reduce the risk of infection, the malicious code can be injected into any website.

    youdao

  • 这些预防方法多数可以类似应用预防其他类型代码注入攻击

    Not surprisingly most of these preventative methods are the same methods you can and should use to prevent other typical code injection attacks.

    youdao

  • 代码容易受xss攻击因为没有进行任何的输入验证

    This piece of code is vulnerable to XSS attacks because no check is made to validate the input.

    youdao

  • 恶劣注入攻击形式也许代码注入——代码置入正在运行进程内存空间随后指示正在运行的进程执行这些代码

    Perhaps the most malicious form of injection attack is code injection—placing new code into the memory space of the running process and then directing the running process to execute it.

    youdao

  • 随着攻击进化会有工具辅助代码分析代码分析提供信息帮助找到存在漏洞代码

    As these attacks evolve there will be tools to assist with code analysis that will give information to help you find the lines of code where the vulnerabilities exist.

    youdao

  • 通常攻击使用它运行恶意代码来使缓冲区溢出然后攻击者会更改返回指向它们发送的恶意代码

    Often the attacker will overrun the buffer with the malicious code the attacker wants to run, and the attacker will then change the return value to point to the malicious code they've sent.

    youdao

  • 攻击者的角度进行思考防护代码一个步骤

    Thinking like a cracker is the next step in defending your code.

    youdao

  • 转发文件通常包含某些代码,其目的是在最终服务器上完成攻击希望事情

    The file that is forwarded typically contains some sort of payload designed to make the final server do something that the attacker wants it to do.

    youdao

  • 微软警告公众,泄露版本可能带有恶意代码攻击电脑

    Microsoft has warned that the leaked software may get infected with malicious codes which could then attack computers.

    youdao

  • 于是浏览器会执行攻击引入恶意代码数据被传递黑客网站

    The malicious script introduced by the attacker is executed by the browser and the data is passed to the hacker's Web site.

    youdao

  • 进行系统加固应该采取首要步骤之一降低攻击机器运行代码越多代码利用机会更越大

    One of the first steps you should take when hardening a machine is to reduce its attack surface. The more code that's running on a machine, the greater the chance that the code will be exploitable.

    youdao

  • 最后确保PHP代码可以抵抗XSS攻击表单欺骗CSRF攻击

    Finally, make sure your PHP code is resilient to XSS attacks, form spoofs, and CSRF attacks.

    youdao

  • 一种常见Web应用程序攻击威胁某种形式代码注入Wikipedia将其定义为。

    One of the more common attacks or threats to Web applications is some form of code injection, which Wikipedia defines as.

    youdao

  • 如果担心这种类型攻击(可以通过代码检查轻松地加以防止),则可以阻止任何不受信任的客户端连接web容器

    If you are concerned about this type of attack, which is easily prevented through code inspections, you can prevent untrusted clients from connecting to the Web container.

    youdao

  • 本文主要介绍代码注入攻击一种特殊类型XPath

    The focus of this article is a specific type of code injection attack: the Blind XPath injection.

    youdao

  • 5中的代码使用参数化s QL阻止Injection攻击

    The code in Figure 5 employs parameterized SQL to stop injection attacks.

    youdao

  • 清单8中的代码尝试攻击invulnerable

    The code in Listing 8 tries to attack invulnerable.

    youdao

  • 并不详细介绍每个攻击如何运行或者编写shell代码

    I don't get into the specifics of how to run each exploit or write shell code.

    youdao

  • 例如攻击可能通过堆栈溢出(stackcorruption)代码注入进程从而执行攻击选定代码

    For example, attackers could be trying to inject code into the process via stack corruption, resulting in the ability to execute code of the attacker's choice.

    youdao

  • 从本质上说如果允许攻击这样机器任何方式运行代码,则攻击完全可以接管机器。

    Essentially, if you allow an attacker to run code on such a machine through any means, the attacker can completely take over the machine.

    youdao

  • 但是一旦攻击可以这样机器上运行代码,就可以立即获取完全控制

    But once an attacker can run code on such a machine, the attacker instantly attains complete control.

    youdao

  • 但是一旦攻击可以这样机器上运行代码,就可以立即获取完全控制

    But once an attacker can run code on such a machine, the attacker instantly attains complete control.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定