除其他弱点外,城市在独自应对空气污染时而必须采取的措施存在政治上的争议,因此也很易受到攻击。
Among other weaknesses, the measures cities must employ when left to tackle dirty air on their own are politically contentious, and therefore vulnerable.
这些信息用于帮助发现潜在的安全“漏洞”,此类弱点可能被利用向客户发起攻击。
This information is used to help identify potential security "holes" that may be weak points for attacks against customers.
然而,当越来越多的网站使用ASP.NET表单验证时,也会有越来越多的攻击者尝试着发现弱点,所以遵守一些既定规则是明智的。
However, as more Web sites use ASP.NET forms authentication, more attackers will attempt to find weaknesses, so it's a good idea to follow some ground rules.
黑客可以根据所收集的信息推断出可能的弱点,并选择对选定目标系统的最佳攻击方法。
Based on the information gathered, hackers can deduce possible vulnerabilities and choose the best method of attack for the selected target system.
威胁模型用于确定服务器中的这些弱点并研究可能的攻击。
A threat model seeks to identify these points in the server and to develop possible attacks.
不管垃圾信息是来自机器人程序还是机械式的土耳其攻击,它均具有一个根本的弱点。
Whether spam comes from robots or mechanical Turk attacks, it has one ultimate weakness.
reflectedXSS攻击利用了Web应用程序安全性低的弱点,该应用程序在浏览器中显示输入参数而不对其中是否存在活动内容进行检查。
A reflected XSS attack exploits vulnerable Web applications that display input parameters back to the browser without checking for the presence of active content in them.
知道主机上哪些端口是打开的,对于攻击者推断目标主机上可能存在的弱点是重要的第一步。
Knowing which ports are open on a host is an important first step for an attacker to deduce possible vulnerabilities to the target host.
有创造力的攻击者会透过摧毁堆叠利用缓冲区溢位的弱点,然后执行任何程序码。
A creative attacker can take advantage of a buffer overflow vulnerability through stack-smashing and then run arbitrary code (anything at all).
富有经验的攻击者可以发现同类软件的缺点,并且尝试利用这些弱点来进入系统。
The sophisticated attacker finds a weakness in a similar type of software, and tries to use that to exploit the system.
说它聪明的原因是即使面对MD5和SHA - 1的弱点,它的防攻击能力还很强。
It's clever because it is quite resistant to attack, even in the face of weaknesses in MD5 and SHA-1.
正如我们在XSS示例中所看到的,大多数的攻击都利用了服务器端的弱点,注入恶意脚本。
As you've seen in the XSS examples, most of the attacks exploit server-side vulnerabilities by injecting malicious scripts.
当可以获得程序的来源程序码时,攻击者会寻找所有可疑的函式呼叫,然后尝试确定哪些是弱点。
When the source code is available, an attacker can look for all suspect function calls, and then try to determine which ones might end up being vulnerabilities.
弱点是系统的缺点,但是攻击者可能不知道。
A vulnerability is a weakness in the system, but it is not necessarily known by the attacker.
他们还解决了通过远程主机和文件上传进行访问时而产生攻击的弱点。
They also addressed vulnerabilities in chrome access by remote hosts and file uploading.
这时候我们听要么是为了获得发言机会,要么找到能够让我们攻击的缺陷或弱点。
We either listen for openings to take the floor, or for flaws or weak points we can attack.
假设我是一个攻击者,想利用WeatherReporter应用程序的弱点。
Suppose I'm an attacker wishing to exploit weaknesses in the Weather Reporter application.
数据篡改——利用访问控制机制中允许攻击者对Web服务进行未经授权调用的弱点来更改数据。
Data tampering — Exploiting weakness in the access control mechanism that permits the attacker to make unauthorized calls to the Web service to alter data.
这使得攻击者可以更快、更容易地发现弱点——这些攻击者们希望攻击的不是某个特定的Web站点,而是任何Web站点。
This makes it easier and faster for attackers to find vulnerabilities — not for people that want to attack a (specific) Web site, but for people that want to attack any Web site.
通常,Web服务器从用户输入中移除脚本,但是攻击者经常会利用服务器的弱点绕过这些过滤器,从而造成一些重大的攻击,比如说Yamanner或MySpaceIn蠕虫。
Usually Web servers remove scripts from user input, but often attackers exploit vulnerabilities to bypass these filters, resulting in major attacks such as the Yamanner or MySpace worms.
Jacob对其中的一些弱点给出了示例,像跨站点脚本攻击(XSS)、跨站点伪造请求(CSRF)、HTTP响应分割、会话固定攻击以及SQL注入攻击等等。
Jacob gave examples of some of the vulnerabilities like Cross-Site Scripting (XSS), Cross-Site Request Forgery (CSRF), HTTP Response Splitting, Session Fixation, and SQL Injection.
他攻击我论点中的每一个弱点。
通过正视弱点,你可以尊重真实的自我,而不是攻击你自己。
By facing your weaknesses, you are honoring your true self, rather than attacking yourself.
详细分析了UMTS认证和密钥分配协议的过程以及协议的安全性,找出协议中存在的弱点和可能的攻击,提出了公钥加密协议的改进方法。
This paper analyzes authentication and key distribution protocol of the procedure and security of UMTS. The vulnerability and possible attack to this protocol are described.
他们教会我如何去做好准备,如何使对手的精神概骂化以及如何攻击他们的弱点。
How to conceptualize the spirit of my opponents and attack them where they are weak.
分析了连续波制导体系的地(舰)空导弹武器系统难以攻击低速目标(武装直升机)和空中静目标(气球靶)的弱点,并从原理上进行了分析。
This paper analyzes the weakness of ground (ship) to air missile systems with CW guidance system to attack low speed targets (such as helicopters) and static air targets (balloon targets).
当他们在一起时可以使出特有的双子攻击,据称这是可以在一击之中便可打倒龙的强力绝技,难以置信的力量足以弥补他们拙于智思的弱点。
Together, they can perform the Gemini Attack, which can kill a dragon in one blow. Makes up for his lack of smarts with incredible strength.
当他们在一起时可以使出特有的双子攻击,据称这是可以在一击之中便可打倒龙的强力绝技,难以置信的力量足以弥补他们拙于智思的弱点。
Together, they can perform the Gemini Attack, which can kill a dragon in one blow. Makes up for his lack of smarts with incredible strength.
应用推荐