• 黑客进行端口探测通常尝试服务器执行恶意代码或者通过寻找攻击端口控制服务器。

    Port probing by hackers is usually an attempt to execute malicious code on a server or to take control of the server by looking for vulnerable ports.

    youdao

  • 指令码人员将来的骇客,他们的知识足够攻击机器执行预编码的指令码,还没有足够的知识建立这样指令码。

    Script kiddies are would-be hackers who know enough to run a pre-coded script against a vulnerable machine, but not enough to create such a script in the first place.

    youdao

  • 其他弱点外城市独自应对空气污染时而必须采取措施存在政治上的争议因此也很受到攻击

    Among other weaknesses, the measures cities must employ when left to tackle dirty air on their own are politically contentious, and therefore vulnerable.

    youdao

  • 有一个安全此类系统各式各样黑客攻击

    One is security: such systems will be vulnerable to all sorts of hacker attacks.

    youdao

  • 然后收集到的信息可以用来分配资源识别那些可能恶意用户程序攻击机器

    The information harvested can then be used to allocate resources and identify machines that may be vulnerable to attack by rogue users and programs.

    youdao

  • 我们大多数在冬天会花费很少时间晒太阳方法使我们摆脱维生素d缺乏症,使我们一些感染攻击

    Most of us spend less time in the sun during the winter, and that means we can end up vitamin d-deficient, leaving us vulnerable to any number of infections.

    youdao

  • 新的研究暗示血液中的铅含量可以用来解释为什么50多女性高血压攻击

    New research suggests that lead in the bloodstream might help explain the onset of high blood pressure in women in their 50s.

    youdao

  • 一步确定遭到恶意攻击关键系统资产——无形或者有形

    The first step is to identify critical system assetsintangible or tangiblethat are vulnerable to malicious attacks.

    youdao

  • 程序员阅读文件测试一个字节一个不变量似乎是无望的——这样会使程序模糊攻击

    Asking programmers to test each byte and every invariant when reading a file seems hopelessbut failing to do so leaves your programs vulnerable to fuzz.

    youdao

  • 攻击知道某一网站应用程序跨站点脚本编制攻击后,他就可以规划攻击

    After an application on a Web site is known to be vulnerable to cross-site scripting, an attacker can formulate an attack.

    youdao

  • 她们心理上受到攻击因此无论是对于抵抗这个家伙攻击还是事后在情绪上应对这些事都准备不足。

    They were psychologically vulnerable and hence ill-equipped to either resist this fellow's predations or to deal with them emotionally after they had occurred.

    youdao

  • 一些中国人而言他们担心国家无法获得能源供应,同时不断拉长能源供应链受到攻击

    Some Chinese, for their part, fear their country being denied access to supplies and worry about the vulnerability of its lengthening supply lines.

    youdao

  • 微软研究人员已经发明一种创建简单密码方法,同时也会使系统黑客攻击

    Researchers at Microsoft have come up with a way to create easy-to-remember passwords without making a system more vulnerable to hackers.

    youdao

  • 所以期待喜欢网站添加些社交功能吧,只是那些创新者一样先锋往往受到攻击

    So expect your favourite site to add social features, whereas many of the pioneers will end up with arrows in their backs, as innovators often do.

    youdao

  • 男性女性可能饮酒吸毒他们抑郁的时候,或者他们变得失意气馁激惹生气有时攻击的。

    Men may be more likely than women to turn to alcohol or drugs when they are depressed. They also may become frustrated, discouraged, irritable, angry, and sometimes abusive.

    youdao

  • 经受1900毁灭性飓风之后15年,大西洋飓风攻击地方,加尔维斯顿再次受到猛烈打击。

    Right in the line of fire for Atlantic hurricanes, Galveston was slammed again 15 years after enduring the devastating 1900 hurricane.

    youdao

  • 下面例子可以帮助识别XSS攻击领域

    The following examples are intended to help you recognize the areas that are vulnerable to XSS attack.

    youdao

  • 威尔企图一举攻占墓地努力完全失败,而普山的攻击北军击退,只抢占到山脚下一个据点

    The effort to storm Cemetery Hill was ultimately unsuccessful. Ewell's attacks were also repulsed at Culp's Hill, although a foothold was gained near the base of the hill.

    youdao

  • 今年早些时候公布的份调查中,某些公司英国金融服务局表示,对公用事业部门依赖,使它们受到攻击

    But in a survey earlier this year, some companies told the FSA they remained vulnerable because of their reliance on public utilities.

    youdao

  • 简单的哈(例如有时HTTP基本身份验证中使用哈希)受到回复攻击威胁,因为攻击可以很容探查通信能够在知道密码的情况下回复哈希。

    A simple hash, as sometimes used in HTTP Basic authentication, is subject to replay attacks because one can easily sniff the traffic and replay the hash without knowing the password.

    youdao

  • 民意测试建立了成为激进分子易攻击对象索引这个索引分数低于67分的为高危险地。

    The poll establishes an index of vulnerability-to-radicalisation, in which any score below 67 indicates high risk.

    youdao

  • Linux其他操作系统那样遭受病毒攻击而且提供了一种远程管理安全方法

    Linux is not subject to the same level of virus attacks as other operating systems, and it provides a secure method of remote administration.

    youdao

  • PHP4.3.9 安装程序支持CGI,而 CGI使得Web 浏览器安全性问题的影响受到攻击

    The PHP 4.3.9 installer package only supports CGI which makes your Web server subject to security problems and attacks.

    youdao

  • 投弹的嫌疑犯头目是埃塞俄比亚出生的穆克塔尔·卜拉欣(Muktar Ibrahim),他在发动攻击数月也去了巴基斯坦据说参加过苏丹训练营

    The bombers' alleged leader, Ethiopian-born Muktar Ibrahim, had gone to Pakistan several months before the attacks and is said to have attended a training camp in Sudan.

    youdao

  • 双辊ch - 47Chinook尤其受到那样攻击就是周末阿富汗击落的那种直升机

    Particularly susceptible to those attacks is the twin-rotor CH-47 Chinook - the kind of copter shot down over the weekend in Afghanistan.

    youdao

  • 危险贝利遥控开锁装置的汽车受这项黑客技术的攻击——拒绝透露一类汽车

    At risk: Bailey said cars with remote electronic locks are susceptible to his hack - but refused to reveal the types of car it affects.

    youdao

  • 根据veracodeWysopal所说,搜索gets函数——一个臭名昭著不安全字符串操作——可以揭示可能内存溢出攻击的程序

    And, searching for the function "gets" — a notoriously insecure string operationcan reveal programs that are likely vulnerable to a memory overflow, said Veracode's Wysopal.

    youdao

  • 根据veracodeWysopal所说,搜索gets函数——一个臭名昭著不安全字符串操作——可以揭示可能内存溢出攻击的程序

    And, searching for the function "gets" — a notoriously insecure string operationcan reveal programs that are likely vulnerable to a memory overflow, said Veracode's Wysopal.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定