• 一个攻击页面曾经被部署

    A vulnerable page is ever deployed.

    youdao

  • 计算机连接网络上时,有了攻击可能性。

    When connecting your computer to a network, it becomes vulnerable to attack.

    youdao

  • 它们直接攻击组织这样的话人体必须再生以便替换攻击的组织。

    They can directly attack live tissue, which the body must then strain to replace.

    youdao

  • 可用性系统持续工作即使攻击的时候也是如此(“工作持续性”)。

    Availability: the system will keep working even when being attacked (" works continuously ").

    youdao

  • 成功的攻击允许攻击攻击应用程序执行任意代码。同时,失败攻击导致拒绝服务。

    Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks may cause denial-of-service conditions.

    youdao

  • 外壳型入侵型病毒通常攻击可执行文件,即带有或扩展名的文件。当然数据文件攻击的危险

    Shell and intrusive viruses most commonly attack executable program flies-those with a. com or. exe extension, although data flies are also at some risk.

    youdao

  • 数百警察决然警察棍向公园中的群众开始攻击攻击的群众则开始投掷石块高声辱骂干脆逃跑

    Hundreds of police waded into the crowd with nightsticks, as their targets threw rocks, shouted curses, or ran.

    youdao

  • 如果攻击程序系统管理员启动的,那么恶意代码作为原始程序的一部分进行执行黑客系统中的管理员特权

    If the attacked program was initiated by a system administrator, the malicious code will then run as a part of the original program, giving the attacker administrator privileges on the system.

    youdao

  • 网络预警技术预知主体攻击可能性具体指证将要发生的行为和产生的后果,而到网络安全业界的重视

    The early warning technology attaches great importance in the network security field because it can foresee the possibility of the attacks and the following behavior and consequences.

    youdao

  • 如何避开攻击网络区域数据安全传输至目的地对于减少拒绝服务攻击危害维护网络可用性有着至关重要的意义。

    How to avoid the attack area of the network and transfer data to the destination is very important in reducing the damage of denial of service attacks and maintaining network availability.

    youdao

  • 因特网上,指一类他们故意数据包淹没网站网络,对攻击网站或网络的用户而言造成拒绝服务情景

    On the Internet, a packet monkey is someone who intentionally inundates a Web site or network with data packets, resulting in a denial-of-service situation for users of the attacked site or network.

    youdao

  • 美国在最容易攻击国家中排名第九,平均48次浏览一次遭到攻击的风险英国排名三十,它攻击的概率1/63。

    The U.S. ranked ninth with one in every 48 Web surfers at risk, while the U.K. was 30th with a rate of one in 63.

    youdao

  • 脚本容易跨站点脚本攻击因为盲目输出所提交表单数据

    This script is vulnerable to cross-site scripting attacks because it blindly prints out submitted form data.

    youdao

  • 每个身份集成一个压力点,每份凭证都都扩大攻击潜在帮助中心成本

    Each identity integration point becomes a stress point, and each credential creates a broader attack surface and potential help desk expense.

    youdao

  • 有一个安全此类系统各式各样黑客攻击

    One is security: such systems will be vulnerable to all sorts of hacker attacks.

    youdao

  • 代码容易xss攻击因为没有进行任何的输入验证

    This piece of code is vulnerable to XSS attacks because no check is made to validate the input.

    youdao

  • 现在知道这个站点容易xss类型的攻击

    Now he knows that the site is prone to an XSS-style attack.

    youdao

  • 如果系统服务不可用,合法用户无法使用攻击系统上网络服务(2)。

    Once the system or service has been made unavailable, legitimate clients are blocked from using the network service hosted by the system under attack (See Figure 2).

    youdao

  • cookie 窃:XSS攻击后果

    Stolen cookies: XSS attack results

    youdao

  • 只有使用信任的签署方发放的证书才能发起攻击

    You can only use certificates issued by trusted signers to execute this attack.

    youdao

  • 我们大多数在冬天会花费很少时间晒太阳方法使我们摆脱维生素d缺乏症,使我们一些感染攻击

    Most of us spend less time in the sun during the winter, and that means we can end up vitamin d-deficient, leaving us vulnerable to any number of infections.

    youdao

  • 如果真的有打击危险,生活潜在攻击点区域人们我们建议进行疏散或者他们自己决定疏散到不是核打击目标区域

    If there were threat of an attack, people living near potential targets could be advised to evacuate or they could decide on their own to evacuate to an area not considered a likely target.

    youdao

  • 能够所有可能攻击继续工作的系统存在的,但是系统可以抵御许多攻击攻击迅速恢复可用状态。

    No system can keep up under all possible attacks, but systems can resist many attacks or rapidly return to usefulness after an attack.

    youdao

  • 新的研究暗示血液中的铅含量可以用来解释为什么50多女性高血压攻击

    New research suggests that lead in the bloodstream might help explain the onset of high blood pressure in women in their 50s.

    youdao

  • 虽然ID随机生成的,但是仍然重播攻击影响,因为没有超时(除非处于空闲状态)。

    While the id is randomly generated, it is still subject to replay attacks because it does not timeout (except when idle).

    youdao

  • 攻击知道某一网站应用程序跨站点脚本编制攻击后,他就可以规划攻击

    After an application on a Web site is known to be vulnerable to cross-site scripting, an attacker can formulate an attack.

    youdao

  • 为了避免安全漏洞攻击使用这些信任方法应用服务器应该使用信任连接方法。

    To avoid vulnerability to security breaches, an application server that USES these trusted methods should not use un-trusted connection methods.

    youdao

  • 为了避免安全漏洞攻击使用这些信任方法应用服务器应该使用信任连接方法。

    To avoid vulnerability to security breaches, an application server that USES these trusted methods should not use un-trusted connection methods.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定