• 这样,能够识别签名工具可以有选择地为授予软件安全特权其他文件做不到的,可以检测代码是否篡改过。

    Tools that recognize your signature can then optionally grant your software security privileges it wouldn't otherwise have, and detect if the code has been tampered with.

    youdao

  • Web浏览器运行任何代码可能恶意用户篡改或者完全绕开

    Any code that executes in a Web browser can be tampered with, or bypassed completely, by a malicious user.

    youdao

  • 因为单一校验和技术比较容易攻击代码屏蔽,所以有人提出安全的方案:互联校验网络,只有令整个网络失效,才能对付这种篡改技术。

    Since a single checksum is relatively easy for an attacker to disable, stronger proposals rely on a network of inter-connected checksums, all of which must be disabled to defeat tamper resistance.

    youdao

  • 保护公共密钥不能篡改从而防止网络欺诈欺骗篡改代码攻击

    It also ensures that public keys cannot be tampered with, thereby preventing phishing, spoofing, and code-tampering attacks.

    youdao

  • 另外硬件机制可以内存部分区域提供保护防止代码数据其它恶意应用程序篡改

    Also, the hardware virtual memory mechanisms allow areas of memory to be protected against writing. This protects code and data from being overwritten by rogue applications.

    youdao

  • 另外硬件机制可以内存部分区域提供保护防止代码数据其它恶意应用程序篡改

    Also, the hardware virtual memory mechanisms allow areas of memory to be protected against writing. This protects code and data from being overwritten by rogue applications.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定