• 游戏中的人物5种决定战斗能力属性攻击伤害攻击速度防御盔甲

    The game's characters currently have five combat attributes that determine their performances in battle. They are attack value, damage, attack speed, defense, and armor.

    youdao

  • 如果属性没有任何关联,那么这种攻击甚至可以通过溢出字符串限制来损害基于SAX系统

    If it's dereferenced in an attribute value, this attack can even damage a SAX-based system by overflowing the limits of a string.

    youdao

  • XML元素名称实体深度类似的东西没有内建限制所以攻击可以这些构造体提供很长的

    XML has no built-in limits on names of elements, entity depths, and the like, so an attacker could provide long values for these constructs.

    youdao

  • 攻击也许能够通过改变函数其他数据利用缓冲区溢出没有哪种方法能够防止这点

    An attacker may be able to exploit a buffer overflow by changing the value of other data in the function; none of these approaches counter that.

    youdao

  • 缓冲区溢出攻击实例程序内部溢出,从而改变程序的运行方式。

    In the instance of a buffer overflow attack, an internal value in a program is overflowed to alter how the program runs.

    youdao

  • 会话固定攻击就是客户端的会话id强制设置一个明确的已知

    A session fixation attack is designed to force the session ID of a client to an explicit, known value.

    youdao

  • 如果不怀好意使用者缓冲区变更标志从而指出攻击是非法存取专用文件

    If a malicious user can overwrite the buffer, then the value of the flag can be changed, thus providing the attacker with illegal access to private files.

    youdao

  • 可以看到疯狂卷曲,你可以攻击它们得到一些生命

    Also, you're going to see these crazy spiraled flowers that you can attack and get to spit out health.

    youdao

  • 数字不同尺寸之间转换时,攻击者会利用这个操作吗?

    When numeric values are translated between different sizes, can an attacker exploit this?

    youdao

  • SSH标准端口改为不常用增强SSH配置从而挡住最简单的攻击

    Changing SSH's standard port to an unusual value and reinforcing SSH configuration so that simple-minded attacks just bounce back.

    youdao

  • 注意程序名字只是命令第0个参数——不要相信程序因为攻击改变

    Note that the name of the program is just argument number 0 in the command line valuesdon't trust the program name, since an attacker can change it.

    youdao

  • 不管怎样,输入验证数据消毒(sanitation)防止XSS攻击关键因素

    In either case, input value validation and sanitization are the key to preventing XSS attacks.

    youdao

  • 服务器假设Request - Token头部中缺乏正确任何请求都是CSRF攻击企图拒绝它们。

    The server will assume that any requests that lack the correct value in the Request-Token header are CSRF attack attempts and will reject them.

    youdao

  • 防止受到XSS攻击只要变量将被打印输出中,就需要通过htmlentities()函数过滤输入

    To guard yourself against XSS attacks, filter your input through the htmlentities() function whenever the value of a variable is printed to the output.

    youdao

  • 如果粗心大意的开发人员输入清单5中的文本(以便直接嵌入),这个调用面临SQL注入攻击的风险。

    If a less-than-careful developer entered the text from Listing 5 (in the hopes of embedding the values directly), the call would be exposed to SQL injection attacks.

    youdao

  • 示例一样,此页也会受到SQLInjection攻击因为执行的SQL通过用户输入的动态构造的。

    Like the last example, the page is ripe for SQL injection attacks because the executed SQL is constructed dynamically from a user-entered value.

    youdao

  • 但是可能通过rainbow攻击密码hash:预先计算出来的数量庞大的hash,涵盖所有可能的字符组合

    But it is possible to attack the hashed value of your password using rainbow tables: enormous, pre-computed hash values for every possible combination of characters.

    youdao

  • Web应用程序使用POST包含nonce(短期有效惟一字符串)防范服务拒绝攻击

    The Web application USES a nonce (a unique string whose value is valid only for a short time) that is included in the POST as a way to guard against denial-of-service attacks.

    youdao

  • 问题攻击可以控制变量filename吗?

    The question to ask is can an attacker control the value of the variable filename?

    youdao

  • 通常攻击使用它运行恶意代码来使缓冲区溢出然后攻击者会更改返回指向它们发送的恶意代码。

    Often the attacker will overrun the buffer with the malicious code the attacker wants to run, and the attacker will then change the return value to point to the malicious code they've sent.

    youdao

  • 如果攻击能够导致缓冲区溢出那么它就控制程序中的其他

    If an attacker can cause a buffer to overflow, then the attacker can control other values in the program.

    youdao

  • 不对的,因为攻击非常聪明他们常常想到其他危险数据

    It's a mistake because attackers are quite clever; they can often think of yet another dangerous data value.

    youdao

  • 攻击接下来密码重新设置特定

    The attacker then asks for the password to be reset to a specific value.

    youdao

  • 一种有用的方法不过注意这种方法无法防止缓冲区溢出改写其他(攻击仍然能够利用这些攻击系统)。

    This is a useful approach, but note that this does not protect against buffer overflows overwriting other values (which they may still be able to use to attack a system).

    youdao

  • 是因为攻击可能会做一些不合常理的事情例如同一个环境变量创建多个(比如两个不同的LD _ LIBRARY _ path)。

    It's because attackers can do weird things such as create multiple values for the same environment variable name (like two different LD_LIBRARY_PATH values).

    youdao

  • 某些攻击属性伤害属性吸取形式对属性造成伤害。

    Some attacks deal damage to an ability score in the form of ability damage or ability drain.

    youdao

  • 这些调用不是成功攻击的必要条件它们可用说明攻击最终结果就是创建了一个包含无效Vulnerable对象

    These calls are not necessary for the attack to succeed, but they serve to demonstrate the end result of the attack, which is that a Vulnerable object is created that has an invalid value.

    youdao

  • 爆炸文:雕文被破坏将会爆炸伤害基于剩余能。回合、或每次受到攻击都将会消耗层。

    Explosive Glyph: the Glyphs explode when destroyed, inflicting damage based on the charges left. Glyphs automatically lose a charge each turn and when they are attacked.

    youdao

  • 即使一个攻击获得权限看到经过hash密码可能只从hash重建密码。

    Even if an attacker gained access to the hashed version of your password, it's not possible to reconstitute the password from the hash value alone.

    youdao

  • 即使一个攻击获得权限看到经过hash密码可能只从hash重建密码。

    Even if an attacker gained access to the hashed version of your password, it's not possible to reconstitute the password from the hash value alone.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定