• 恶意攻击可以利用一点,通过Internet网络服务发动远程拒绝服务攻击

    A malicious attacker can make use of this behavior and launch a remote denial-of-service attack against a vulnerable network service over the Internet.

    youdao

  • 一个后门妥协系统完整性使更改系统,允许使用恶意攻击者目的不明用户

    Backdoor compromises system integrity by making changes to the system that allow it to by used by the attacker for malicious purposes unknown to the user.

    youdao

  • 恶意业务访问恶意攻击构建非正常SQL语句我们把它定义破坏模态化行为

    Malicious business access is a malicious attacker to build an abnormal SQL statement, which we define as the destruction of the behavior of the model.

    youdao

  • 恶意攻击者可以探查连接(请注意缺省情况下密码摘要没有被加密)回复整个UsernameToken因此nonce时间戳检查缺一不可的。

    A malicious attacker can still sniff the wire (note that password digest is not encrypted by default) and replay the entire UsernameToken, so nonce and timestamp checking are imperative.

    youdao

  • 如果攻击可以这些参数中嵌入恶意命令,那么外部系统就可能应用程序的名义执行这些命令。

    If an attacker can embed malicious commands in these parameters, the external system may execute those commands on behalf of the... application.

    youdao

  • 我们假设攻击成功地一个包含恶意脚本页面到订阅成员使用的网站上。

    Let us assume an attacker succeeded in filling a page containing malicious script to the Web site for the subscribed members.

    youdao

  • 方案中用户执行邮件消息中的恶意链接时,就会不知不觉地执行攻击编写脚本

    In this scenario, the user unknowingly executes scripts written by an attacker when they follow a malicious link in a mail message.

    youdao

  • 现在攻击需要找到某个地方输入恶意脚本

    Now, an attacker would need to find somewhere to input a malicious script.

    youdao

  • 攻击者将其恶意输入注入sql语句中,修改查询语句逻辑

    The attacker injects his malicious inputs to the SQL statement to change the query's logic.

    youdao

  • 于是浏览器会执行攻击引入恶意代码数据被传递黑客网站

    The malicious script introduced by the attacker is executed by the browser and the data is passed to the hacker's Web site.

    youdao

  • 攻击者用户提交动态表单引入恶意脚本时,产生跨站点脚本(XSS)攻击

    When an attacker introduces a malicious script to a dynamic form submitted by the user, a cross-site scripting (XSS) attack then occurs.

    youdao

  • 用户查看基于攻击提供内容而动态生成页面时,他们不知不觉地执行恶意脚本

    Users can unknowingly execute malicious scripts when viewing dynamically generated pages based on content provided by an attacker.

    youdao

  • 第二确定电脑黑客攻击可能恶意攻击漏洞

    The second step is to identify vulnerabilities that a hacker or attacker could maliciously exploit.

    youdao

  • 词汇攻击者可用描述恶意黑客

    The term attacker can be used to describe a malicious hacker.

    youdao

  • 攻击可以通过设置PATH环境变量改变saposcol寻找其他程序的位置,然后saposcol创建一个恶意的“扩展程序来运行。

    An attacker could set the PATH environment variable to change where saposcol looked for other programs, and then create a malicious "expand" program for saposcol to run.

    youdao

  • 利用这点攻击者可以这些发送畸形JSON对象这样eval函数就会执行这些恶意代码

    To exploit this, attackers send malformed JSON objects to these libraries so the eval function executes their malicious code.

    youdao

  • 显示页面恶意脚本就运行,它收集用户cookie攻击者网站发送包含收集 cookie 的请求

    When the page is displayed, the malicious script runs, collects the users' cookies, and sends a request to the attacker's Web site with the cookies gathered.

    youdao

  • 攻击可以用户连接攻击者选择恶意服务器上。

    An attacker can connect users to a malicious server of the attacker's choice.

    youdao

  • 通常攻击使用它运行恶意代码来使缓冲区溢出然后攻击者会更改返回指向它们发送恶意代码。

    Often the attacker will overrun the buffer with the malicious code the attacker wants to run, and the attacker will then change the return value to point to the malicious code they've sent.

    youdao

  • 然而研究人员往往可以研究语言恶意软件程序特点,获悉攻击国籍线索

    However, researchers can often learn clues about the attackers' country of origin by studying the language and other signs in the malicious software's programming.

    youdao

  • 由于攻击通常试图添加恶意脚本,因些这种变化称为“交叉站点脚本攻击” (XSS攻击)。

    Since attackers are usually trying to add malicious scripts, this particular variation is called a "cross-site scripting attack" (XSS attack).

    youdao

  • 如果应用程序xss漏洞攻击者可能会发送应用程序执行恶意脚本导致XSS侵入

    If the application has XSS holes, the attacker may send a malicious script that can still be executed by the application and lead to XSS intrusions.

    youdao

  • 我们自然的就会想到攻击者以后制作出更难侦测的注入了恶意软件的幻灯片。

    It's not far-fetched to imagine that in the future attackers could create even harder-to-detect malware-infused slideshows.

    youdao

  • 一个安全认证协议有效抵御恶意攻击者通信网进行欺诈保证通信网的安全运行。

    A secure authentication protocol can resist the cheat of malicious attacker to communication network and guarantee the security of network.

    youdao

  • 恶意攻击者可以通过这个账户任意地控制计算机

    Baleful aggressor can pass this account to control your computer arbitrarily.

    youdao

  • 大部分攻击通过提供外部输入越界缓冲区应该受外部输入影响内存位置达到他们恶意目的

    Most attackers attain their vicious goal by overwriting beyond buffers to the memory locations that should not be influenced by the input the attackers provide.

    youdao

  • 攻击可以提交恶意快捷方式文件用户可移动驱动器一个关联的恶意的二进制文件。

    An attacker could present a removable drive to the user with a malicious shortcut file, and an associated malicious binary.

    youdao

  • 攻击可以恶意软件假冒网站得到检查SHA- 1哈希验证任何系统信任

    An attacker can allow its malware or fake site to be checked for SHA-1 hashes to verify the trust of any system.

    youdao

  • 通常攻击者链接中的恶意内容编码HEX其他编码方法),所以减少用户点击怀疑

    Usually the attacker will encode the malicious portion of the link to the site in HEX (or other encoding methods) so the request is less suspicious looking to the user when clicked on.

    youdao

  • 如果字串未经验证逸出恶意文字元,攻击可能得以存取伺服器机密资料其他资源。

    If the string is not validated and malicious text or characters not escaped, an attacker can potentially access sensitive data or other resources on the server.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定