• 即使攻击攻击进入一个游戏程序所有的事情修改分数文件

    Even if an attacker broke into a game program, all he could do would be to change the score files.

    youdao

  • 另一种攻击类型中,攻击可能会修改样式表信息隐藏起来不让用户发现。

    In another type of attack, the attacker might modify the stylesheet to hide information from users.

    youdao

  • 攻击可以安装一个特洛伊木马程序不请自来的电子邮件发送软件目的是金融活动造成损害品牌名称修改公司资源

    Or an attacker might be able to install a Trojan horse program or unsolicited E-mail sending software, aim at financial enrichment or cause brand name damage by modifying company resources.

    youdao

  • 这个程序允许攻击包括可以修改SQL命令意义字符

    The program allows an attacker to include characters that change the meaning of that SQL command.

    youdao

  • 基于网络攻击这些攻击依赖于对网络数据包低层访问试图通过修改通信流或者发现这些数据包中的信息危害系统

    Network-based attacks: these attacks rely on low-level access to network packets and attempt to harm the system by altering this traffic or discovering information from these packets.

    youdao

  • 这些修改不会显著增强计算机安全性但是尝试强力攻击标准端口22一般脚本失败不会造成损害

    These changes don't substantially add to the security of your machine, but a common script that just tries brute force attacks at the standard port 22 will fail harmlessly.

    youdao

  • 黑客攻击一种形式包括修改恶意数据ARP映射缓存,即所谓的ARP中毒

    One form of hacker attack even involves feeding bad data to ARP tables, a practice known as ARP poisoning.

    youdao

  • 测试一个抵御模糊攻击应用程序时,可能黑盒测试,通过一些明显修改基本想法还是可以应用的。

    When you're testing a fuzz-resistant application, you can't do pure blackbox testing, but with some obvious modifications, the basic ideas still apply.

    youdao

  • 它们旨在保护数据传输过程中不查看、修改攻击

    They aim to protect the data from being viewed, modified, or hacked while in transit.

    youdao

  • 尽管攻击可能修改发送数据,但是您需要确保组件按照希望方式您发送数据进行处理。

    You'll need to make sure that the component will interpret the data you send the way you expect, even if an attacker can influence the value of that data.

    youdao

  • 如果攻击可以添加修改某些以短横线斜线开头的内容,并传递命令行程序,那么这些内容就可能会被错误当作选项进行处理。

    If an attacker can get a leading dash or slash into something that will be passed down to a command-line program, it might get misinterpreted as an option.

    youdao

  • 现在我们来修改消息就像使用中间人攻击黑客那样

    Now let's modify the message, as a hacker might using a "man in the middle" attack

    youdao

  • 这次攻击之后,几家不相关网站包括LinkedInWoot,均他们用户发送邮件提醒他们,如果他们所用密码在Gawker上的密码一样,需要尽快修改

    Following the attack several unrelated websites, including LinkedIn and Woot, sent E-mail to their users warning them to change their passwords if these were the same ones as they used for Gawker.

    youdao

  • 这种攻击类似ping洪水攻击,但它能巧妙地修改进程

    This attack is similar to the ping flood attack but with a clever modification to the process.

    youdao

  • 如果提供加密攻击通常仍然可以通过修改客户机攻击技术

    If you provide encryption, then an attacker can generally still attack the technique by modifying your client.

    youdao

  • 另一种狡猾的攻击方法入侵者可以修改通过HTTP返回任何页面——甚至包括页面嵌入的URL。

    An even more subtle attack is that any page returned over HTTP can be potentially altered by an intruder — even URLs embedded in the page.

    youdao

  • 这种攻击中,用户可以修改url显示其他用户帐户信息

    In such attacks, users modify URLs to display information of other user accounts.

    youdao

  • 一设置确保攻击不能修改JNDI命名空间

    This setting ensures that attackers cannot modify the JNDI namespace.

    youdao

  • 比如说某个用户正在进行在线转帐操作时,攻击目标帐户修改属于自己的帐户也是可行的。

    For example, as a user is making an online money transfer, it is possible for an attacker to change the destination account to one that belongs to him.

    youdao

  • 攻击将其恶意输入注入sql语句中,修改查询语句逻辑

    The attacker injects his malicious inputs to the SQL statement to change the query's logic.

    youdao

  • 此外利用这些漏洞之一攻击可以修改任何服务器配置参数

    In addition, leveraging one of these vulnerabilities, an attacker can modify any server configuration parameter.

    youdao

  • 更新修改还包括暗藏xpath注入降低了安置攻击所需知识

    Newer modifications include Blind XPath injection, which reduces the knowledge required to mount the attack.

    youdao

  • 夏威夷大学科学家建议,将塔罗修改基因长出一种更强壮的塔罗树,更少受到病毒攻击影响。

    Scientists from the University of Hawaii are suggesting that the tarot be genetically modified to create a stronger plant less subject to the virus attacking it.

    youdao

  • 修改email地址之后,他一个忘记密码网页可能一新的密码就会发送攻击电子邮箱里了。

    After he changed it, he will go to the forgotten-password page and the (possibly new) password will be mailed to the attacker's E-mail address.

    youdao

  • 历史上很多攻击利用命令shell处理IFS环境变量方法但是当今大部分shell(包括GNUbash)已经经过了修改从而使IFS难以利用

    Historically, many attacks exploited the way the command shell handled the IFS environment variable, but most of today's shells (including GNU bash) have been modified to make IFS harder to exploit.

    youdao

  • 然而攻击可以通过修改email地址接管帐户

    However, the attacker may also take over the account by changing the E-mail address.

    youdao

  • 对策是修改密码的表单不能被CRSF攻击当然改变密码的时候,需要用户输入密码。

    As a countermeasure, make change-password forms safe against CSRF, of course. And require the user to enter the old password when changing it.

    youdao

  • 毒蛇守护”修改猎人获得毒蛇守护,使远程近战攻击能够恢复法力降低伤害50%。

    Aspect of the viper changed to - the hunter takes on the aspect of the viper, causing ranged and melee attacks to regenerate mana but reducing your total damage done by 50%.

    youdao

  • 通过修改url攻击可以数据库结构逆向开发有可能找到用户姓名口令甚至信用卡

    By modifying the URL, attackers can reverse-engineer the database structure and potentially find users' names, passwords, or even credit card Numbers.

    youdao

  • 改进了一种抵抗同步攻击数字音频盲水印算法,该算法通过修改多个采样的统计均值嵌入同步,解决了空域嵌入同步码的不稳定性问题。

    A robust digital audio watermarking algorithm is presented, which can resist desynchronization attack effectively. We embed synchronization code by modifying the mean value of several samples.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定