论文最后研究了预测制导方法在高速再入飞行器攻击地面固定目标任务中的应用问题。
A predictive guidance method for reentry vehicle in the case of attacking the stationary target on the surface is also investigated.
这样安全问题涉及到攻击,和上个月的clickjacking(一种最新的跨浏览器攻击手法)事件类似,它利用Twitter网站的网络编程错误。
This latest security concern involves an attack, similar to the clickjacking incident from last month, that takes advantage of a web programming error on Twitter's support site.
我不知道为什么回力镖会攻击植物,也不知道神奇的悬停电脑显示器是在协助攻击还是逃离现场。
I have no idea why a boomerang is attacking a plant or whether the magical hovering computer monitor is aiding in the attack or fleeing the scene.
机器人继续影响蓝领工作,而白领工作正受到微处理器的攻击。
Robots continue to have an impact on blue-collar jobs, and white-collar jobs are under attack by microprocessors.
如果您的程序是数据的浏览器或者编辑器——比如文字处理器或者图像显示器——那么那些数据有可能来自攻击者,所以那是不可信的输入。
If your program is a viewer or editor of data—such as a word processor or an image displayer—that data might be from an attacker, so it's an untrusted input.
请从两方面来考虑这个问题:服务器和攻击者。
Think of the problem from two perspectives: the server, and the attacker.
攻击者可以将用户连接到攻击者选择的恶意服务器上。
An attacker can connect users to a malicious server of the attacker's choice.
这里有两种主要的超级用户进入类型:缓冲溢出攻击和在服务器上执行脚本。
There are two main types of root exploits: buffer overflow attacks and executing scripts against a server.
尽管限制浏览器只浏览信任站点可以减少受到攻击的风险,恶意代码可以被植入任何的网站。
While restricting web surfing to trusted sites should reduce the risk of infection, the malicious code can be injected into any website.
订阅黑客攻击RSS,在你的新闻阅读器上取得最新消息。
Subscribe to the Hack Attack RSS feed to get new installments in your newsreader.
有时敏感数据存储在他们使用的设备和服务器上,因此用户防止黑客攻击是至关重要的。
With sensitive data sometimes stored on devices and the servers that they use, the protection of users from black-hat hackers is critical.
例如,清单3中展示的代码能够窃取信息并将其发送到某个攻击者的服务器。
For example, Listing 3 shows code that steals information and sends it to an attacker's server.
威胁模型用于确定服务器中的这些弱点并研究可能的攻击。
A threat model seeks to identify these points in the server and to develop possible attacks.
控制器面对网络攻击显示出脆弱性是一个公开的秘密。
The vulnerability of the controller to cyberattack was an open secret.
黑客进行的端口探测通常是尝试在服务器上执行恶意代码或者通过寻找易攻击的端口来控制服务器。
Port probing by hackers is usually an attempt to execute malicious code on a server or to take control of the server by looking for vulnerable ports.
联合终端攻击控制器小组是怎样观测到卡车的过程并不清楚,但许多飞机上都有红外摄像仪,能将地面活物的图像发射到电脑监视器上。
How the JTAC team was observing the trucks was not clear, but many aircraft have infrared video cameras that can send a live feed to a computer monitor on the ground.
相信客户机总是发送有效数据的服务器等于是请求别人的攻击。
Servers that trust clients to send them only valid data are just begging to be hacked.
他指出近期已经有一些服务器被攻击的例子。
He points out that there have been recent examples of servers being hacked.
对每个服务器,必须有一个客户端——客户端容易被恶意服务器进行攻击。
For every server, there must be a client — and that client can be susceptible to attacks by a malicious server.
MITM攻击在使用代理服务器的情况中尤其重要。
The MITM attack becomes especially important when talking about proxy servers.
这些防御措施有效地阻止了基于解析器创建外部网络连接的所有攻击。
These defenses effectively stop any attacks based on the parser making external network connections.
被转发的文件通常包含某些代码,其目的是在最终服务器上完成攻击者希望做的事情。
The file that is forwarded typically contains some sort of payload designed to make the final server do something that the attacker wants it to do.
他们称发布命令并控制这次攻击的服务器位于美国,在开始袭击前几周就连接上了互联网。
They said the command and control server that directed the attack was based in the United States and had come online several weeks before it began the assault.
攻击者只要转至工作站并尝试使用HTML编辑工具攻击IIS服务器。
The attacker simply goes to a workstation and tries to attack the IIS server with an HTML editing tool.
当恶意客户机使用虚假的源地址来伪造一个IP报文时,TCP就会出现问题了,这会大量 TCPSYN报文攻击服务器。
The problem that can occur with TCP is when a rogue client forges an IP packet with a bogus source address, then floods a server with TCP SYN packets.
据埃克斯说,这实际上就意味着说航天器对物理和电子攻击来说很脆弱,对航天器的控制站来说也是如此。
According to Axe, this essentially means that spacecraft are highly vulnerable to physical and electronic attack, and so are their control stations.
于是浏览器会执行攻击者引入的恶意代码,数据将被传递到黑客的网站。
The malicious script introduced by the attacker is executed by the browser and the data is passed to the hacker's Web site.
然而,这种随处可用性也使插件成为浏览器安全攻击的主要目标。
However, that ubiquity alsomakes plug-ins prime targets for browser security attacks.
然而,这种随处可用性也使插件成为浏览器安全攻击的主要目标。
However, that ubiquity alsomakes plug-ins prime targets for browser security attacks.
应用推荐