• 其他弱点城市独自应对空气污染时而必须采取措施存在政治上的争议因此也很易受到攻击

    Among other weaknesses, the measures cities must employ when left to tackle dirty air on their own are politically contentious, and therefore vulnerable.

    youdao

  • 这些信息用于帮助发现潜在安全漏洞”,此类弱点可能利用客户发起攻击

    This information is used to help identify potential security "holes" that may be weak points for attacks against customers.

    youdao

  • 然而越来越多的网站使用ASP.NET表单验证时也会有越来越多的攻击尝试发现弱点所以遵守一些既定规则明智

    However, as more Web sites use ASP.NET forms authentication, more attackers will attempt to find weaknesses, so it's a good idea to follow some ground rules.

    youdao

  • 黑客可以根据所收集信息推断出可能弱点选择选定目标系统最佳攻击方法

    Based on the information gathered, hackers can deduce possible vulnerabilities and choose the best method of attack for the selected target system.

    youdao

  • 威胁模型用于确定服务器中的这些弱点研究可能的攻击

    A threat model seeks to identify these points in the server and to develop possible attacks.

    youdao

  • 不管垃圾信息来自机器人程序还是机械式土耳其攻击具有一个根本弱点

    Whether spam comes from robots or mechanical Turk attacks, it has one ultimate weakness.

    youdao

  • reflectedXSS攻击利用Web应用程序安全性低的弱点,该应用程序在浏览器中显示输入参数不对其中是否存在活动内容进行检查

    A reflected XSS attack exploits vulnerable Web applications that display input parameters back to the browser without checking for the presence of active content in them.

    youdao

  • 知道主机哪些端口打开的,对于攻击推断目标主机上可能存在的弱点重要一步

    Knowing which ports are open on a host is an important first step for an attacker to deduce possible vulnerabilities to the target host.

    youdao

  • 创造力的攻击透过摧毁堆叠利用缓冲区溢位弱点然后执行任何程序

    A creative attacker can take advantage of a buffer overflow vulnerability through stack-smashing and then run arbitrary code (anything at all).

    youdao

  • 富有经验的攻击可以发现同类软件缺点并且尝试利用这些弱点进入系统

    The sophisticated attacker finds a weakness in a similar type of software, and tries to use that to exploit the system.

    youdao

  • 聪明原因即使面对MD5SHA - 1的弱点,它的攻击能力还很强。

    It's clever because it is quite resistant to attack, even in the face of weaknesses in MD5 and SHA-1.

    youdao

  • 正如我们XSS示例看到大多数攻击利用了服务器端的弱点注入恶意脚本

    As you've seen in the XSS examples, most of the attacks exploit server-side vulnerabilities by injecting malicious scripts.

    youdao

  • 可以获得程序来源程序码时,攻击寻找所有可疑函式呼叫然后尝试确定哪些弱点

    When the source code is available, an attacker can look for all suspect function calls, and then try to determine which ones might end up being vulnerabilities.

    youdao

  • 弱点系统缺点但是攻击者可能知道

    A vulnerability is a weakness in the system, but it is not necessarily known by the attacker.

    youdao

  • 他们解决了通过远程主机文件上传进行访问时而产生攻击弱点

    They also addressed vulnerabilities in chrome access by remote hosts and file uploading.

    youdao

  • 这时候我们要么为了获得发言机会要么找到能够让我们攻击缺陷弱点

    We either listen for openings to take the floor, or for flaws or weak points we can attack.

    youdao

  • 假设一个攻击利用WeatherReporter应用程序弱点

    Suppose I'm an attacker wishing to exploit weaknesses in the Weather Reporter application.

    youdao

  • 数据篡改——利用访问控制机制允许攻击Web服务进行未经授权调用弱点更改数据。

    Data tamperingExploiting weakness in the access control mechanism that permits the attacker to make unauthorized calls to the Web service to alter data.

    youdao

  • 使得攻击者可以更快容易发现弱点——这些攻击者们希望攻击不是某个特定Web站点而是任何Web站点。

    This makes it easier and faster for attackers to find vulnerabilitiesnot for people that want to attack a (specific) Web site, but for people that want to attack any Web site.

    youdao

  • 通常Web服务器用户输入中移除脚本但是攻击经常利用服务器的弱点绕过这些过滤器从而造成一些重大的攻击,比如说YamannerMySpaceIn蠕虫

    Usually Web servers remove scripts from user input, but often attackers exploit vulnerabilities to bypass these filters, resulting in major attacks such as the Yamanner or MySpace worms.

    youdao

  • Jacob其中一些弱点给出了示例站点脚本攻击(XSS)、跨站点伪造请求(CSRF)、HTTP响应分割会话固定攻击以及SQL注入攻击等等。

    Jacob gave examples of some of the vulnerabilities like Cross-Site Scripting (XSS), Cross-Site Request Forgery (CSRF), HTTP Response Splitting, Session Fixation, and SQL Injection.

    youdao

  • 攻击论点中的每一个弱点

    He attacked every weak point in my argument.

    youdao

  • 通过正视弱点可以尊重真实自我不是攻击你自己

    By facing your weaknesses, you are honoring your true self, rather than attacking yourself.

    youdao

  • 详细分析了UMTS认证密钥分配协议过程以及协议的安全性,找出协议中存在弱点和可能的攻击,提出了公钥加密协议的改进方法。

    This paper analyzes authentication and key distribution protocol of the procedure and security of UMTS. The vulnerability and possible attack to this protocol are described.

    youdao

  • 他们教会如何去做好准备,如何使对手精神骂化以及如何攻击他们弱点

    How to conceptualize the spirit of my opponents and attack them where they are weak.

    youdao

  • 分析连续制导体系()导弹武器系统难以攻击低速目标(武装直升机)空中目标(气球)的弱点,并从原理上进行了分析。

    This paper analyzes the weakness of ground (ship) to air missile systems with CW guidance system to attack low speed targets (such as helicopters) and static air targets (balloon targets).

    youdao

  • 他们一起可以使出特有双子攻击,据称这是可以在之中便可打倒强力绝技,难以置信的力量足以弥补他们拙于智思的弱点

    Together, they can perform the Gemini Attack, which can kill a dragon in one blow. Makes up for his lack of smarts with incredible strength.

    youdao

  • 他们一起可以使出特有双子攻击,据称这是可以在之中便可打倒强力绝技,难以置信的力量足以弥补他们拙于智思的弱点

    Together, they can perform the Gemini Attack, which can kill a dragon in one blow. Makes up for his lack of smarts with incredible strength.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定