• 测试额外安全性攻击问题例如所部署应用程序上会间接伤害数据中心其他应用程序的恶意攻击

    Testing for additional security and vulnerability issues; for example, malicious attacks on a deployed application that can indirectly harm other applications in the data center.

    youdao

  • 程序员阅读文件测试一个字节一个不变量似乎是无望的——这样会使程序模糊攻击

    Asking programmers to test each byte and every invariant when reading a file seems hopelessbut failing to do so leaves your programs vulnerable to fuzz.

    youdao

  • 要想登录这个站点攻击首先要输入一个测试用户ID (“test ”)密码(“ test ”)。

    To log into the Web site, the attacker first enters a test user ID (" test ") and password (" test ").

    youdao

  • BreakingPoint系统提供一个5强度的攻击测试包括了侦测网络蠕虫拒绝服务攻击踩点攻击特洛伊木马后门入侵

    The BreakingPoint system delivered a strike level 5 test that included exploits, network worms, denial-of-service attack, reconnaissance attacks, Trojan horse and backdoor intrusions.

    youdao

  • PIDS开发结束作者对PIDS各模块性能功能进行测试使用几个典型攻击案例测试PIDS的应用功能。

    After finishing the programming, the author tests the capability and function of the modules of PIDS and gives some typical attacking examples to test the applied function of PIDS.

    youdao

  • 如果开发者使用Spring框架设计测试应用时候头脑中能安全问题有个清楚且正确的认识的话,企业应用在部署之后也就不会那么容易遭到攻击了。

    The right security awareness in the design and testing phase of applications using the Framework can protect enterprises from exploitation after deployment.

    youdao

  • 首先介绍网络安全攻击基本概念网络安全测试的一般方法

    First. this paper introduces the basic concepts of network security attacking and security testing methods.

    youdao

  • 实例一个系统攻击程序。仅供读者学习测试之用,否则后果自负

    This example is to attack a system process. Readers for learning and testing, or else at your peril.

    youdao

  • 传统标准化考试受到广泛质疑猛烈攻击专家们称其割裂测试教学的关系。

    The traditional standardized tests are exposed to wide questioning and vigorous attacks, being accused of segregating testing and teaching reality.

    youdao

  • 实验结论攻击测试表明算法对JPEG有损压缩滤波附加噪声剪切各种图像处理攻击有较强的棒性。

    Experimental results and attack analysis show that the method is robust against normal image processing such as JPEG loss compression, filtering, additive noise, and cropping attacks.

    youdao

  • 模型算法进行多种典型攻击测试实验结果表明模型具有较高检测,并有效降低率。

    The experimental results show that the model has high detection rate, and which can deduce the false alarm rate effectively.

    youdao

  • 项1988年研究中,苏黎世大学的人种学者爱德华·斯塔姆贝奇对长尾猕猴进行了试验测试它们控制攻击性的行为相互合作的能力

    In a 1988 study, University of Zurich ethnologist Edward Stammbach set up an experiment with long-tailed macaque monkeys to test their ability to rein in aggressive behavior and act cooperatively.

    youdao

  • These Fuzzers可以测试错误应用协议文件广泛用于寻找新的漏洞一样溢出攻击SQL注入跨站脚本

    These Fuzzers can test errors for applications, protocols, files etc and are widely used to find new vulnerabilities like buffer overflow, DoS, SQL injection and XSS.

    youdao

  • These Fuzzers可以测试错误应用协议文件广泛用于寻找新的漏洞一样溢出攻击SQL注入跨站脚本

    These Fuzzers can test errors for applications, protocols, files etc and are widely used to find new vulnerabilities like buffer overflow, DoS, SQL injection and XSS.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定