• 避免数据自动存入数据库(阻止SQL注入攻击)。

    Automatically escapes data saved to the database (to prevent SQL injection attacks).

    youdao

  • 分析了网络分布攻击定位算法构建了全光网络攻击定位恢复仿真平台

    In all-optical networks, distributed algorithms for attack localization was analyzed, and an all-optical network simulation platform was constructed for attack localization and resumption.

    youdao

  • 可能意味着记录所有DNS查询-钓鱼攻击追捕可疑流量趋势也是有益的。

    This could mean logging down all DNS queries - which is also useful to track down suspicious traffic trends from phishing attacks.

    youdao

  • 有效解决分布攻击提出基于多传感器数据融合挖掘的分布入侵检测模型

    To solve the distributed attacks efficiently, this paper presents the Distributed Intrusion Detection Model Based on Multisensor Data Fusion and Mining (DIDM).

    youdao

  • 异步木马系统由于具有异步通信特点分布攻击能力受到广泛的利用重视

    Therefore, asynchronism Botnet systems are widely used and intensely emphasized due to their asynchronous communicating characteristic and distributed attacking ability.

    youdao

  • 结果表明这种数据收集模型协同检测奠定基础提高了对分布攻击检测能力

    It is shown that this model of data collection establishes the basis of collaborative detection and greatly improves the capability of detecting distributed attacks.

    youdao

  • 为了保证系统受阻攻击我们应该用户设置进程限制。编辑如下配置文件即可。

    To protect your system from fork bomb attacks, you should set up a process limit for your users.

    youdao

  • 使用动态字符串串联根据用户输入生成连接字符串时,可能发生连接字符串注入攻击

    A connection string injection attack can occur when dynamic string concatenation is used to build connection strings that are based on user input.

    youdao

  • 同时,利用检测代理反馈回来的信息,控制台可以检测出单个代理无法检测的分布攻击

    At the same time, the console may detect distribute attack which single agent is unable to detect.

    youdao

  • 范例会使用CNG类别具名管道传输互动主控台视窗示范拦截攻击安全性方案

    The example USES CNG classes, a named pipes transport, and interactive console Windows to demonstrate security solutions for a man-in-the-middle attack.

    youdao

  • 通过诱使一个WPA发送大量数据然后无需使用字典攻击,而是使用数学方法就可以破解掉

    This is done by tricking a WPA to send out a large amount of data, and then mathematically cracking it without using a dictionary attack.

    youdao

  • 可以动作混合连贯起来跳跃攻击使你的对手处在困境当中,并且只是大体上敌人碎片。

    You can string together your moves in combos, use leaping attacks to keep your opponents at bay, and just generally rip enemies to shreds.

    youdao

  • 这样带有目标性攻击——叫做鱼叉网路钓鱼——已经变得危险因为我们通常会因特网泄露大量的信息。

    This kind of targeted attack - known as spear-phishing - has become so dangerous because of the amount of information we divulge on the Internet.

    youdao

  • 翠鸟一种埋伏捕猎者,它会栖息河流上方的树枝上仔细观察,一旦有小鱼游过自己的攻击范围内,它就会垂直俯冲下去,抓住鱼,然后飞回树枝上。

    The kingfisher is an ambush hunter, perching over a river until a small fish flicks into range.

    youdao

  • 任何允许外部实体输入数据程序容易受到恶意攻击例如缓冲区溢出嵌入控制字符

    Any program that allows an external entity to input data is vulnerable to malicious activity, such as buffer overflows and embedded control characters.

    youdao

  • 这种类型攻击甚至用于绕过安全检查

    This kind of attack can even be used to bypass explicit security checks.

    youdao

  • 2020年,空军拥有仅仅快速喷气战斗机以及名为台风欧洲战斗机联合攻击战斗机。

    By 2020, the air force will have just two types of fast jet-fighter and strike versions of the Eurofighter Typhoon and the JSF.

    youdao

  • 可以获得程序来源程序码时,攻击寻找所有可疑呼叫然后尝试确定哪些弱点。

    When the source code is available, an attacker can look for all suspect function calls, and then try to determine which ones might end up being vulnerabilities.

    youdao

  • 供应商主机拒绝服务攻击

    Denial of service attack against the provider's host.

    youdao

  • 现实世界里接近分布拒绝服务攻击大规模静坐乌合之众,他们把建筑物围得水泄不通,没人可以进出。

    The closest equivalent to a DDOS attack in the offline world would be a mass sit-in or a mob milling around a building, making entry and exit impossible.

    youdao

  • 这个横跨公海上形状酷似飞机棚的建筑容纳60艘“攻击气垫艇”,用来渗透登陆作战”。

    The hangar-shaped buildings spotted across the international waters will house 60 "attack hovercraft", to be used for "infiltration attacks and landing".

    youdao

  • 分布拒绝服务攻击需要许多电脑一个网站集中进行流量轰炸,使其因负担过重而不能提供正常的服务。

    A distributed denial of service attack involves using many computers to bombard a Web site with an overload of traffic, knocking it offline.

    youdao

  • 本周谷歌披露说,来源于中国网络攻击通过使用一项“鱼叉网络钓鱼”技术提取那些粗心大意的谷歌邮箱用户账号密码

    This week Google revealed that a cyber attack originating from China had used a technique known as "spear phishing" to extract Gmail passwords from unwary users.

    youdao

  • 无需任何工具即可安装使用足以防御肩扛火箭筒的攻击

    It can be fitted without any tools and is strong enough to protect against rocket-propelled grenades.

    youdao

  • 老布什曾经攻击杜卡基斯是招牌的自由派精英

    Mr Bush senior reduced Mr Dukakis to the candidate of card-carrying liberal elitists.

    youdao

  • 由于引导,A - 10攻击架F - 15鹰战斗机对数个游击队阵地进行了致命打击,把他们牢牢钉在阵地上动弹不得。

    As a result of his efforts, two A-10 Warthogs and two F-15 Strike Eagles dealt lethal effects onto numerous enemy positions and disrupted their ability to maneuver.

    youdao

  • 官方发布消息T-50综合攻击喷气战斗机功能

    The official press release says that the T-50 will combine the functions of the assault aircraft and fighter jet.

    youdao

  • 官方发布消息T-50综合攻击喷气战斗机功能

    The official press release says that the T-50 will combine the functions of the assault aircraft and fighter jet.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定