攻击者可以将用户连接到攻击者选择的恶意服务器上。
An attacker can connect users to a malicious server of the attacker's choice.
对每个服务器,必须有一个客户端——客户端容易被恶意服务器进行攻击。
For every server, there must be a client — and that client can be susceptible to attacks by a malicious server.
这也限制了服务器暴露于任何内部恶意行为。
This also limits the exposure of the servers to any internal malicious activity.
如果匹配成功,就拒绝该请求,恶意的输入不会到达服务器。
If any match, the request is rejected, and the malicious input does not arrive at the server.
恶意代码会被在会发生任何糟糕情况的服务器上执行。
And that code executes on a server, where it can do all kinds of bad things.
硅谷专门制作电脑、服务器安保软件的赛门铁克公司在一个全球恶意代码捕获系统捕捉到了它。
The Symantec Corporation, a maker of computer security software and services based in Silicon Valley, snared it in a global malware collection system.
当恶意客户机使用虚假的源地址来伪造一个IP报文时,TCP就会出现问题了,这会大量 TCPSYN报文攻击服务器。
The problem that can occur with TCP is when a rogue client forges an IP packet with a bogus source address, then floods a server with TCP SYN packets.
这样会使恶意用户乘机注入将在服务器上执行的代码。
This would be a big mistake; it would allow malicious users to inject code that would be executed on your server.
这就把构建服务器置于提交给源树的 bug和恶意代码的风险之下。
This puts your build server at some risk from bugs and malicious code committed to source trees.
在8月份,Kernel.org声明自己的服务器被恶意网站攻破,这引发了Linux社区的剧烈反应。
In August, an announcement that the Kernel.org server had become compromised with malware took the Linux community by storm.
如果合法服务器将一个包含clientprofile值的页面发回给用户,则在客户机Web浏览器上就会执行恶意代码,如图1所示。
If the legitimate server sends a page back to the user including the value of clientprofile, the malicious code will be executed on the client Web browser as shown in Figure 1.
这有助于在传输过程中保护备份数据,它意味着存储在TivoliStorageManager服务器上的数据已加密,因而不能被恶意管理员所读取。
This helps secure backed-up data during transmission, and it means that the data stored on the Tivoli Storage Manager server is encrypted and thus is unreadable by any malicious administrators.
想了解更多保护网站服务器的信息,请看我们最近发表的有关安全的系列博文,“残暴不仁的恶意软件”尤其是第三部分和第四部分。
For more information on securing your web server, check out our recent series of security blog articles, "The Merciless Malignancy of Malware," especially Part 3 and Part 4.
由于主题安装,博客拥有者会把一段从来没有经过检测的代码安装到WordPress所在的服务器上,一点也没有意识到隐藏的恶意代码就在里边。
Because of the ease of theme installation, blog owners who’d never install untested code on a server are deploying themes on their blogs, not realizing that hidden code is coming along for the ride.
当人们得知twitter宕机的原因是缘于恶意袭击,Twitter才得以从困境中缓过气来 -人们原本推测Twitter宕机的原因是twitter不能承受如此规模的服务器负担,而这种情况在以前就发生过的。
Knowing that the cause is a malicious attack does take Twitter off the hook to some degree –it may have been assumed that the site was simply failing to scale properly, as had happened in the past.
而当你发送电子邮件回家,部分或所有这些恶意软件可能已经转移到你家里的主服务器上了,这是真的。
And when you emailed back home, some or all of the malware may have migrated to your home server. This is not hypothetical.
而当你在家发送电子邮件的时候,这些恶意软件中的一部分或者全部都已经转移到国内服务器上了。
And when you emailed back home, some or all of the malware may have migrated to your home server.
黑客进行的端口探测通常是尝试在服务器上执行恶意代码或者通过寻找易攻击的端口来控制服务器。
Port probing by hackers is usually an attempt to execute malicious code on a server or to take control of the server by looking for vulnerable ports.
因为安全连接必须由代理服务器提供一个隧道才能到达目的地,因此恶意的代理服务器就可以很容易地窃取任何会话。
Because the secure connection must "tunnel" through the proxy server to the intended destination, malicious proxy servers can very easily eavesdrop on any conversation.
按照这台服务器配置的方式,一台恶意的客户机可以连接到这台服务器上,并且可以发送一个非常大的字符串,结果将使整个服务器瘫痪。
With the way that this server is configured, a malicious client could connect to the server and send one extremely large string, effectively bringing the entire server to its knees.
正如我们在XSS示例中所看到的,大多数的攻击都利用了服务器端的弱点,注入恶意脚本。
As you've seen in the XSS examples, most of the attacks exploit server-side vulnerabilities by injecting malicious scripts.
最近,一种流行的散播恶意软件的方式是挖掘网站服务器的缺陷从而在非恶意网站上种植恶意软件——有些很有名。
Recently, one of the emerging methods of spreading malware is by exploiting weak or flawed web servers to plant malware on otherwise benign sites- some very well known.
作者也考虑到服务器的反馈,由此检测到一个恶意客户端的服务器可以发送给客户端任意种类的响应信息,包括恶意的内容。
The authors also consider server retaliation, whereby a server that detects a malicious client could send the client any sort of response, including malicious content.
通过跟踪这个恶意程序并获得对入侵者使用的服务器电脑的访问权限,McAfee识别出了72个受危害的公司和组织。
Through tracing this malware and also gaining access to a "command and control" computer server used by the intruders, McAfee identified 72 compromised companies and organisations.
一些安全专家警告称,某些代理服务器网站可能带有病毒和恶意程序,登陆这些网站的学生会把自己置于网络犯罪的危险境地。
Security experts are warning that some proxy server website can carry viruses and malicious software, and pupils who log on put themselves at risk of cyber crime.
检察官说,然后他们在该律所的网络服务器上安装了恶意软件,以便随时掌握交易信息,包括当时正在谈判的价格等等。
They then installed malware on the law firm's web server, prosecutors said, enabling them to obtain information about live deals, including the price at which they were being negotiated.
这个一般是由于有一些恶意的客户试图通过代理服务器去访问一些网站,并且不会显示他的真实位置。
This is usually the result of malicious clients trying to exploit open proxy servers to access a website without revealing their true location.
问题是如果DNS服务器缓存被假DNS入口“污染”,用户随后能被转发到替代恶意站点,而不是他们查访问的站点。
The problem is that if the DNS server cache is "polluted" with bogus DNS entries, users can subsequently be forwarded to malicious Web sites instead of the sites they intended to visit.
它的目的就是为了使数据库运行恶意代码,从而泄漏敏感消息或者使服务器崩溃。
The objective is to fool the database system into running malicious code that will reveal sensitive information or otherwise compromise the server.
它的目的就是为了使数据库运行恶意代码,从而泄漏敏感消息或者使服务器崩溃。
The objective is to fool the database system into running malicious code that will reveal sensitive information or otherwise compromise the server.
应用推荐