测试额外的安全性和可攻击性问题;例如,所部署应用程序上会间接伤害数据中心中其他应用程序的恶意攻击。
Testing for additional security and vulnerability issues; for example, malicious attacks on a deployed application that can indirectly harm other applications in the data center.
让程序员们在阅读一个文件时测试每一个字节和每一个不变量似乎是无望的——但不这样做就会使程序易被模糊攻击。
Asking programmers to test each byte and every invariant when reading a file seems hopeless — but failing to do so leaves your programs vulnerable to fuzz.
要想登录这个站点,攻击者首先要输入一个测试用户ID (“test ”)和密码(“ test ”)。
To log into the Web site, the attacker first enters a test user ID (" test ") and password (" test ").
BreakingPoint的系统提供了一个5级强度的攻击测试,包括了侦测、网络蠕虫、拒绝服务攻击、踩点攻击、特洛伊木马和后门入侵。
The BreakingPoint system delivered a strike level 5 test that included exploits, network worms, denial-of-service attack, reconnaissance attacks, Trojan horse and backdoor intrusions.
PIDS开发结束后,作者对PIDS各模块的性能和功能进行了测试,并使用几个典型的攻击案例测试PIDS的应用功能。
After finishing the programming, the author tests the capability and function of the modules of PIDS and gives some typical attacking examples to test the applied function of PIDS.
如果开发者在使用Spring框架设计和测试应用的时候头脑中能对安全问题有个清楚且正确的认识的话,企业应用在部署之后也就不会那么容易遭到攻击了。
The right security awareness in the design and testing phase of applications using the Framework can protect enterprises from exploitation after deployment.
首先介绍了网络安全攻击的基本概念和网络安全测试的一般方法。
First. this paper introduces the basic concepts of network security attacking and security testing methods.
本实例是一个系统攻击程序。仅供读者学习和测试之用,否则后果自负。
This example is to attack a system process. Readers for learning and testing, or else at your peril.
传统的标准化考试正受到广泛的质疑和猛烈的攻击,专家们称其割裂了测试与教学的关系。
The traditional standardized tests are exposed to wide questioning and vigorous attacks, being accused of segregating testing and teaching reality.
实验结论和攻击测试表明,该算法对JPEG有损压缩、滤波、附加噪声、剪切等各种图像处理的攻击有较强的鲁棒性。
Experimental results and attack analysis show that the method is robust against normal image processing such as JPEG loss compression, filtering, additive noise, and cropping attacks.
对模型和算法进行多种典型攻击测试实验,结果表明模型具有较高的检测率,并能有效降低误警率。
The experimental results show that the model has high detection rate, and which can deduce the false alarm rate effectively.
在一项1988年的研究中,苏黎世大学的人种学者爱德华·斯塔姆贝奇对长尾猕猴进行了一次试验,以测试它们控制攻击性的行为和相互合作的能力。
In a 1988 study, University of Zurich ethnologist Edward Stammbach set up an experiment with long-tailed macaque monkeys to test their ability to rein in aggressive behavior and act cooperatively.
These Fuzzers可以测试错误的应用,协议,文件等,被广泛用于寻找新的漏洞一样溢出攻击,SQL注入和跨站脚本。
These Fuzzers can test errors for applications, protocols, files etc and are widely used to find new vulnerabilities like buffer overflow, DoS, SQL injection and XSS.
These Fuzzers可以测试错误的应用,协议,文件等,被广泛用于寻找新的漏洞一样溢出攻击,SQL注入和跨站脚本。
These Fuzzers can test errors for applications, protocols, files etc and are widely used to find new vulnerabilities like buffer overflow, DoS, SQL injection and XSS.
应用推荐