• 最后讨论如何根据溢出规律植入代码结构特征,采取有效措施来防御缓冲区溢出攻击。

    At last discuss how to defense buffer overflow by the rule of buffer overflow and the structure character of injected code.

    youdao

  • 实际验证表明,该缓冲区溢出攻击描述语言能够动态地构造植入代码,实现缓冲区溢出攻击的自动化

    The actual verification shows that attack description language can correspondingly construct suitable embedded code and launch attack automatically.

    youdao

  • 最后使用版本2时,开发人员想出聪明办法使用元编程设计国际化代码植入代码中。

    In the end, when it came time to work on version two, one of the developers had come up with a clever way, using metaprogramming, to weave the internationalization code into the code base.

    youdao

  • 尽管限制浏览器只浏览信任站点可以减少受到攻击风险恶意代码可以植入任何网站

    While restricting web surfing to trusted sites should reduce the risk of infection, the malicious code can be injected into any website.

    youdao

  • 尽管植入每种容器代码可能相似容器本身反映了不同能力风格整体哲学

    While the code that goes into each container may be similar, the containers themselves reflect different capabilities, styles, and overall philosophies.

    youdao

  • 添加代码植入内容

    Add code to populate the content spot.

    youdao

  • J sp添加代码植入内容

    Add code to the JSP to populate the content spots.

    youdao

  • 这些代码一但植入会不知不觉地普通用户电脑上生成一张自动的“病毒网络”---首先就是易受攻击的“脸谱”用户。

    Once embedded, the code would have created a “botnet” of millions of zombie computers capable of launching all manner of scams on innocent folk—starting with gullible Facebook users themselves.

    youdao

  • 所以我们植入了一些错误校验如果愿意我们执行代码

    So we've embedded some error checking, if you will, into our implementations.

    youdao

  • 比如植入恶意代码电表能够扰乱输电网络——电脑的“僵尸网络”能够扰乱因特网一样。

    Smart meters injected with malware, for instance, could disrupt the grid just as networks of PC botnets-home computers hijacked by viruses-now disrupt the Internet.

    youdao

  • 本文分析了这些问题给出了解决方案,提出了枚举变量适值计算规则代码植入方案。

    This article analyzes these problems and presents the solutions of code embedded in the rule of enumeration variable fitness calculation.

    youdao

  • 感染病毒是,病毒将自身程序代码植入其他执行文件(EXE)。

    On a virus infection, the virus attaches its own program code to other executable files (. Exe).

    youdao

  • 算法所处理迷惑代码能够很好地抗击代码静态分析基于代码植入迷惑攻击。

    The obfuscation algorithm can prevent the deobfuscation technique based on the static analysis of programs and by using program instrumentation.

    youdao

  • 算法所处理迷惑代码能够很好地抗击代码静态分析基于代码植入迷惑攻击。

    The obfuscation algorithm can prevent the deobfuscation technique based on the static analysis of programs and by using program instrumentation.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定