• 论文最后研究预测制导方法高速再飞行攻击地面固定目标任务中的应用问题。

    A predictive guidance method for reentry vehicle in the case of attacking the stationary target on the surface is also investigated.

    youdao

  • 这样安全问题涉及到攻击,和上个月clickjacking最新跨浏览器攻击手法)事件类似利用Twitter网站网络编程错误

    This latest security concern involves an attack, similar to the clickjacking incident from last month, that takes advantage of a web programming error on Twitter's support site.

    youdao

  • 知道为什么回力镖会攻击植物知道神奇悬停电脑显示协助攻击还是逃离现场

    I have no idea why a boomerang is attacking a plant or whether the magical hovering computer monitor is aiding in the attack or fleeing the scene.

    youdao

  • 继续影响蓝领工作白领工作受到微处理攻击

    Robots continue to have an impact on blue-collar jobs, and white-collar jobs are under attack by microprocessors.

    youdao

  • 如果程序数据浏览或者编辑——比如文字处理或者图像显示——那么那些数据有可能来自攻击者,所以可信输入

    If your program is a viewer or editor of datasuch as a word processor or an image displayer—that data might be from an attacker, so it's an untrusted input.

    youdao

  • 方面来考虑这个问题服务攻击

    Think of the problem from two perspectives: the server, and the attacker.

    youdao

  • 攻击可以用户连接攻击选择恶意服务上。

    An attacker can connect users to a malicious server of the attacker's choice.

    youdao

  • 这里两种主要超级用户进入类型缓冲溢出攻击服务上执行脚本

    There are two main types of root exploits: buffer overflow attacks and executing scripts against a server.

    youdao

  • 尽管限制浏览浏览信任站点可以减少受到攻击风险恶意代码可以植入任何网站

    While restricting web surfing to trusted sites should reduce the risk of infection, the malicious code can be injected into any website.

    youdao

  • 订阅黑客攻击RSS新闻阅读上取得最新消息。

    Subscribe to the Hack Attack RSS feed to get new installments in your newsreader.

    youdao

  • 有时敏感数据存储他们使用设备服务上,因此用户防止黑客攻击至关重要的。

    With sensitive data sometimes stored on devices and the servers that they use, the protection of users from black-hat hackers is critical.

    youdao

  • 例如清单3中展示代码能够窃取信息其发送某个攻击服务

    For example, Listing 3 shows code that steals information and sends it to an attacker's server.

    youdao

  • 威胁模型用于确定服务中的这些弱点研究可能的攻击

    A threat model seeks to identify these points in the server and to develop possible attacks.

    youdao

  • 控制面对网络攻击显示出脆弱性一个公开秘密

    The vulnerability of the controller to cyberattack was an open secret.

    youdao

  • 黑客进行端口探测通常尝试服务执行恶意代码或者通过寻找攻击端口控制服务

    Port probing by hackers is usually an attempt to execute malicious code on a server or to take control of the server by looking for vulnerable ports.

    youdao

  • 联合终端攻击控制小组怎样观测到卡车的过程并不清楚许多飞机上都有红外摄像仪,地面活物的图像发射电脑监视

    How the JTAC team was observing the trucks was not clear, but many aircraft have infrared video cameras that can send a live feed to a computer monitor on the ground.

    youdao

  • 相信客户机总是发送有效数据服务等于是请求别人攻击

    Servers that trust clients to send them only valid data are just begging to be hacked.

    youdao

  • 指出近期已经一些服务攻击例子

    He points out that there have been recent examples of servers being hacked.

    youdao

  • 每个服务必须一个客户——客户端容易恶意服务进行攻击

    For every server, there must be a client — and that client can be susceptible to attacks by a malicious server.

    youdao

  • MITM攻击在使用代理服务的情况中尤其重要

    The MITM attack becomes especially important when talking about proxy servers.

    youdao

  • 这些防御措施有效地阻止了基于解析创建外部网络连接所有攻击

    These defenses effectively stop any attacks based on the parser making external network connections.

    youdao

  • 转发文件通常包含某些代码,其目的是在最终服务完成攻击希望事情

    The file that is forwarded typically contains some sort of payload designed to make the final server do something that the attacker wants it to do.

    youdao

  • 他们发布命令控制这次攻击服务位于美国,在开始袭击周就连接上了互联网

    They said the command and control server that directed the attack was based in the United States and had come online several weeks before it began the assault.

    youdao

  • 攻击只要工作站尝试使用HTML编辑工具攻击IIS服务

    The attacker simply goes to a workstation and tries to attack the IIS server with an HTML editing tool.

    youdao

  • 恶意客户机使用虚假地址来伪造一个IP报文时,TCP出现问题,这会大量 TCPSYN报文攻击服务

    The problem that can occur with TCP is when a rogue client forges an IP packet with a bogus source address, then floods a server with TCP SYN packets.

    youdao

  • 埃克斯说实际上就意味着航天物理电子攻击来说脆弱,对航天控制来说也是如此

    According to Axe, this essentially means that spacecraft are highly vulnerable to physical and electronic attack, and so are their control stations.

    youdao

  • 于是浏览会执行攻击引入恶意代码数据被传递黑客网站

    The malicious script introduced by the attacker is executed by the browser and the data is passed to the hacker's Web site.

    youdao

  • 然而,这种随处可用性也使插件成为浏览安全攻击主要目标

    However, that ubiquity alsomakes plug-ins prime targets for browser security attacks.

    youdao

  • 然而,这种随处可用性也使插件成为浏览安全攻击主要目标

    However, that ubiquity alsomakes plug-ins prime targets for browser security attacks.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定