一个受攻击的页面曾经被部署。
当把您的计算机连接到网络上时,就有了受攻击的可能性。
When connecting your computer to a network, it becomes vulnerable to attack.
它们会直接攻击活组织,这样的话人体就必须再生以便替换受攻击的组织。
They can directly attack live tissue, which the body must then strain to replace.
可用性:系统将持续工作,即使在受攻击的时候也是如此(“工作的持续性”)。
Availability: the system will keep working even when being attacked (" works continuously ").
成功的攻击会允许攻击者在受攻击的应用程序上执行任意代码。同时,失败的攻击会导致拒绝服务。
Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks may cause denial-of-service conditions.
外壳型和入侵型病毒通常攻击可执行文件,即带有或扩展名的文件。当然数据文件也有受攻击的危险。
Shell and intrusive viruses most commonly attack executable program flies-those with a. com or. exe extension, although data flies are also at some risk.
数百名警察决然地用警察棍向公园中的群众开始攻击,受攻击的群众则开始投掷石块、高声辱骂或干脆逃跑。
Hundreds of police waded into the crowd with nightsticks, as their targets threw rocks, shouted curses, or ran.
如果受攻击的程序是由系统管理员启动的,那么恶意代码将作为原始程序的一部分进行执行,给黑客系统中的管理员特权。
If the attacked program was initiated by a system administrator, the malicious code will then run as a part of the original program, giving the attacker administrator privileges on the system.
网络预警技术因其可预知主体受攻击的可能性和具体的指证将要发生的行为和产生的后果,而受到网络安全业界的重视。
The early warning technology attaches great importance in the network security field because it can foresee the possibility of the attacks and the following behavior and consequences.
如何避开受攻击的网络区域而将数据安全传输至目的地对于减少拒绝服务攻击的危害和维护网络可用性有着至关重要的意义。
How to avoid the attack area of the network and transfer data to the destination is very important in reducing the damage of denial of service attacks and maintaining network availability.
在因特网上,包猴是指一类人,他们故意用数据包淹没网站或网络,对受攻击的网站或网络的用户而言,造成拒绝服务的情景。
On the Internet, a packet monkey is someone who intentionally inundates a Web site or network with data packets, resulting in a denial-of-service situation for users of the attacked site or network.
美国在最容易受攻击的国家中排名第九,平均每48次浏览就有一次遭到攻击的风险;英国排名三十,它受攻击的概率是1/63。
The U.S. ranked ninth with one in every 48 Web surfers at risk, while the U.K. was 30th with a rate of one in 63.
该脚本容易受跨站点脚本攻击,因为它盲目输出所提交的表单数据。
This script is vulnerable to cross-site scripting attacks because it blindly prints out submitted form data.
每个身份集成点都是一个压力点,而每份凭证都都扩大了攻击的受面和潜在帮助中心成本。
Each identity integration point becomes a stress point, and each credential creates a broader attack surface and potential help desk expense.
有一个是安全:此类系统易受各式各样的黑客攻击。
One is security: such systems will be vulnerable to all sorts of hacker attacks.
这段代码很容易受xss攻击,因为没有进行任何的输入验证。
This piece of code is vulnerable to XSS attacks because no check is made to validate the input.
现在他知道这个站点容易受xss类型的攻击。
如果系统或服务不可用,合法用户就无法使用受攻击系统上的网络服务(见图2)。
Once the system or service has been made unavailable, legitimate clients are blocked from using the network service hosted by the system under attack (See Figure 2).
cookie 受窃:XSS攻击的后果
只有使用受信任的签署方发放的证书才能发起此攻击。
You can only use certificates issued by trusted signers to execute this attack.
我们大多数人在冬天会花费很少的时间晒太阳,这方法能使我们摆脱维生素d缺乏症,使我们易受一些感染的攻击。
Most of us spend less time in the sun during the winter, and that means we can end up vitamin d-deficient, leaving us vulnerable to any number of infections.
如果真的有受到核打击的危险,生活在潜在的受攻击点区域的人们,我们建议要进行疏散或者他们自己决定疏散到不是核打击目标的区域。
If there were threat of an attack, people living near potential targets could be advised to evacuate or they could decide on their own to evacuate to an area not considered a likely target.
能够在所有可能的攻击下继续工作的系统是不存在的,但是系统可以抵御许多攻击或在受攻击后迅速恢复至可用状态。
No system can keep up under all possible attacks, but systems can resist many attacks or rapidly return to usefulness after an attack.
新的研究暗示了血液中的铅含量可以用来解释为什么50多岁的女性易受高血压的攻击。
New research suggests that lead in the bloodstream might help explain the onset of high blood pressure in women in their 50s.
虽然该ID是随机生成的,但是它仍然受重播攻击的影响,因为它没有超时(除非处于空闲状态)。
While the id is randomly generated, it is still subject to replay attacks because it does not timeout (except when idle).
当攻击者知道某一网站上的应用程序易受跨站点脚本编制攻击后,他就可以规划攻击。
After an application on a Web site is known to be vulnerable to cross-site scripting, an attacker can formulate an attack.
为了避免对安全漏洞的攻击,使用这些受信任方法的应用服务器不应该使用不受信任的连接方法。
To avoid vulnerability to security breaches, an application server that USES these trusted methods should not use un-trusted connection methods.
为了避免对安全漏洞的攻击,使用这些受信任方法的应用服务器不应该使用不受信任的连接方法。
To avoid vulnerability to security breaches, an application server that USES these trusted methods should not use un-trusted connection methods.
应用推荐