避免数据自动存入数据库(阻止SQL注入式攻击)。
Automatically escapes data saved to the database (to prevent SQL injection attacks).
分析了全光网络分布式攻击定位算法,构建了全光网络攻击定位与恢复的仿真平台。
In all-optical networks, distributed algorithms for attack localization was analyzed, and an all-optical network simulation platform was constructed for attack localization and resumption.
这可能意味着记录所有DNS查询-这对从钓鱼式攻击追捕可疑流量趋势也是有益的。
This could mean logging down all DNS queries - which is also useful to track down suspicious traffic trends from phishing attacks.
为有效解决分布式攻击,提出了基于多传感器数据融合与挖掘的分布式入侵检测模型。
To solve the distributed attacks efficiently, this paper presents the Distributed Intrusion Detection Model Based on Multisensor Data Fusion and Mining (DIDM).
异步木马系统由于具有异步通信的特点和分布式攻击的能力而受到广泛的利用和重视。
Therefore, asynchronism Botnet systems are widely used and intensely emphasized due to their asynchronous communicating characteristic and distributed attacking ability.
结果表明,这种数据收集模型为协同检测奠定了基础,提高了对分布式攻击的检测能力。
It is shown that this model of data collection establishes the basis of collaborative detection and greatly improves the capability of detecting distributed attacks.
为了保证系统不受阻断式攻击,我们应该为用户设置进程限制。编辑如下配置文件即可。
To protect your system from fork bomb attacks, you should set up a process limit for your users.
当使用动态字符串串联根据用户输入生成连接字符串时,可能发生连接字符串注入式攻击。
A connection string injection attack can occur when dynamic string concatenation is used to build connection strings that are based on user input.
同时,利用检测代理反馈回来的信息,控制台可以检测出单个代理所无法检测的分布式攻击。
At the same time, the console may detect distribute attack which single agent is unable to detect.
范例中会使用CNG类别、具名管道传输和互动式主控台视窗,示范拦截式攻击的安全性方案。
The example USES CNG classes, a named pipes transport, and interactive console Windows to demonstrate security solutions for a man-in-the-middle attack.
通过诱使一个WPA发送大量的数据,然后无需使用字典式攻击,而是使用数学方法就可以破解掉它。
This is done by tricking a WPA to send out a large amount of data, and then mathematically cracking it without using a dictionary attack.
你可以把你的动作混合连贯起来,用跳跃式攻击使你的对手处在困境当中,并且只是大体上把敌人撕成碎片。
You can string together your moves in combos, use leaping attacks to keep your opponents at bay, and just generally rip enemies to shreds.
这样带有目标性的攻击——叫做鱼叉式网路钓鱼——已经变得很危险,因为我们通常会在因特网上泄露大量的信息。
This kind of targeted attack - known as spear-phishing - has become so dangerous because of the amount of information we divulge on the Internet.
翠鸟是一种埋伏式的捕猎者,它会栖息在河流上方的树枝上仔细观察,一旦有小鱼游过自己的攻击范围内,它就会垂直俯冲下去,抓住鱼,然后飞回树枝上。
The kingfisher is an ambush hunter, perching over a river until a small fish flicks into range.
任何允许外部实体来输入数据的程序都容易受到恶意的攻击,例如缓冲区溢出和嵌入式控制字符。
Any program that allows an external entity to input data is vulnerable to malicious activity, such as buffer overflows and embedded control characters.
这种类型的攻击甚至可用于绕过显式安全检查。
This kind of attack can even be used to bypass explicit security checks.
到2020年,空军将拥有仅仅两种快速喷气式战斗机以及名为台风的欧洲战斗机和联合攻击战斗机。
By 2020, the air force will have just two types of fast jet-fighter and strike versions of the Eurofighter Typhoon and the JSF.
当可以获得程序的来源程序码时,攻击者会寻找所有可疑的函式呼叫,然后尝试确定哪些是弱点。
When the source code is available, an attacker can look for all suspect function calls, and then try to determine which ones might end up being vulnerabilities.
对供应商主机的拒绝式服务攻击。
现实世界里,最接近分布式拒绝服务攻击的则是大规模静坐或乌合之众,他们把建筑物围得水泄不通,没人可以进出。
The closest equivalent to a DDOS attack in the offline world would be a mass sit-in or a mob milling around a building, making entry and exit impossible.
这个横跨在公海上形状酷似飞机棚的建筑将容纳60艘“攻击型气垫艇”,用来“渗透式登陆作战”。
The hangar-shaped buildings spotted across the international waters will house 60 "attack hovercraft", to be used for "infiltration attacks and landing".
分布式的拒绝服务攻击需要用许多台电脑对一个网站集中进行流量轰炸,使其因负担过重而不能提供正常的服务。
A distributed denial of service attack involves using many computers to bombard a Web site with an overload of traffic, knocking it offline.
本周谷歌披露说,一次来源于中国的网络攻击,通过使用一项“鱼叉式网络钓鱼”技术提取那些粗心大意的谷歌邮箱用户的账号密码。
This week Google revealed that a cyber attack originating from China had used a technique known as "spear phishing" to extract Gmail passwords from unwary users.
无需任何工具即可安装使用,足以防御肩扛式火箭筒的攻击。
It can be fitted without any tools and is strong enough to protect against rocket-propelled grenades.
老布什也曾经攻击杜卡基斯是招牌式的自由派精英。
Mr Bush senior reduced Mr Dukakis to the candidate of card-carrying liberal elitists.
由于他的引导,两架A - 10疣猪攻击机和两架F - 15鹰式战斗机对数个游击队阵地进行了致命的打击,把他们牢牢地钉在阵地上动弹不得。
As a result of his efforts, two A-10 Warthogs and two F-15 Strike Eagles dealt lethal effects onto numerous enemy positions and disrupted their ability to maneuver.
官方发布的消息称,T-50将综合攻击机和喷气式战斗机的功能。
The official press release says that the T-50 will combine the functions of the assault aircraft and fighter jet.
官方发布的消息称,T-50将综合攻击机和喷气式战斗机的功能。
The official press release says that the T-50 will combine the functions of the assault aircraft and fighter jet.
应用推荐