同时,对于数字水印的攻击也在不断出现,其中以解释攻击(IBM攻击)最为危险。
With the development of digital watermarking, more and more attacks on it appeared, interpretation attack(IBM attack) is the most dangerous attack of them.
为此本文详细介绍了如何利用时戳机制、单向水印机制和数字作品版权保护认证机制来避免由于解释攻击引起的无法仲裁的版权纠纷。
This article presents how to use timestamp, one-way watermarking mechanism and authentication mechanism of the copyright protection to avoid the copyright disputes from interpretation.
这一发现或许可以解释为何一些人的确受到鲨鱼攻击却极少致命——只要大白鲨的体型还不够大,它咬下去的那一口就没有它的名声大。
The finding may explain why the few shark attacks that do happen on people are rarely fatal-until it's pretty big, the great white's reputation is worse than its bite.
袭击行为变得如此凶残,以至专家都不知该如何解释这种“前所未有”的行为,特别是为什么鲨鱼在海岸附近发动如此多的攻击。
The attacks have been so ferocious that experts have been left at a loss to explain the "unprecedented" behaviour, particularly why the sharks launched multiple attacks close to shore.
袭击行为变得如此凶残,以至专家都不知该如何解释这种“前所未有”的行为,特别是为什么鲨鱼在海岸附近发动如此多的攻击。
The attacks have been so ferocious that experts have been left at a loss to explain the “unprecedented” behaviour, particularly why the sharks launched multiple attacks close to shore.
商业站点上每月都会发现跨站点脚本编制的攻击,并且每月都会发布解释这种威胁的报告。
Every month cross-site scripting attacks are found in commercial sites and advisories are published explaining the threat.
岗恩认为这些发现与有人称之为“植物可见性理论”(plantapparency theory)的解释相一致。这一理论认为最容易被看到的植物最有可能受到捕食者的攻击。
Gahn says these findingsare consistent with something called the “plant apparency theory, ”which states that the most readily seen plants are those that are mostlikely to be attacked by predators.
在吞吐量测试过程中,8500e解释了发自Ixia,到其6个端口的,作为DoS攻击的海量数据,并立即阻塞了所有流量。
During the throughput testing, the 8500e interpreted a massive amount of data sent by the Ixia over six ports as a DoS attack, and immediately blocked all traffic.
虽然支持这种理论的证据最近受到攻击,但这种说法或许能解释为什么许多自闭症患者不说谎,而且也不能理解别人说的谎话。
This account would explain why many autistic people do not tell lies and cannot comprehend those told by others, although the supporting evidence behind this theory has come under fire lately.
对这个的一个解释是在人类这样需要有大量的母性关怀的动物中,女性认为身体上的攻击性是很难承担的。
One idea to explain this is that in animals such as humans, where there is a lot of maternal care, females find physical aggression less affordable.
新的研究暗示了血液中的铅含量可以用来解释为什么50多岁的女性易受高血压的攻击。
New research suggests that lead in the bloodstream might help explain the onset of high blood pressure in women in their 50s.
但是至少这些事件是误导和攻击,看到摇摆不定的高级保守党力图解释并非如此时是多么令人痛心啊!
But these events are, at the least, misguided and offensive, and it is painful to see squirming senior Tories trying to argue otherwise.
在SQL注入攻击中,程序会创建一个SQL命令,并将其发送给SQL解释器。
In an SQL injection attack, a program creates an SQL command and sends it to an SQL interpreter.
不幸的是,将数据从攻击者传递到对数据进行解释的库是非常常见的。
Unfortunately, passing data from attackers to libraries that interpret that data is common.
将银行业看做一个生物系统还有助于解释:为什么金融世界变得如此容易受到攻击?
Seeing banking as a biological system can also help explain why the financial world became so vulnerable.
为了帮助您将这些技术与刚才提到的攻击类别联系起来,我们将使用以下图形解释各种技术。
To help you tie these techniques back to the classes of attack just presented, for each technique we will include the following graphic.
另外一个Youtube的视频中解释了这种攻击方式。
虽然我不能详细解释这种攻击是如何实施的,但如果您了解SQL 的话,就可以找到相关的答案。 如果您在Web服务器上驻留数据库的话,一定要了解这种攻击。
Although I can't get into the specifics of how to pull this type of attack off, you can look it up if you have SQL knowledge, which—if you're hosting database on your Web server—you should have.
Watt是在黑客社区中并且他提供给Gonzalez一些必要的黑客攻击帮助,但是他并没有从中得到很多钱,Coleman解释到。
Watt "was definitely in the hacker community, and he provided some of the hacks necessary for Gonzalez, but didn't make a lot of money off it," Coleman explained.
Van Tilburg认为,这至少在一定程度上解释了,无聊情绪多引导一些主动性的情绪:比如攻击性、愤怒和敌意。
This may, says Van Tilburg, at least partially explain the positive relationship between boredom proneness with aggression, anger, and hostility.
“安全编程:安全地调用组件”(2004年12月):解释如何防止攻击者通过组件调用攻击系统。
"Call components safely" (December 2004) explains how to prevent attackers from exploiting component calls.
斯丁格先生就一些批评家称索尼公司对黑客攻击的反应速度过慢的言论进行了解释。
In an interview last week, Mr. Stringer defended Sony's response to the attacks, which some critics said was too slow.
事涉人身攻击,而且十分不堪,我那时心很慌,也很泄气,知道自己想解释时没有讲出个道理来。
It got personal and very negative, and I got so flustered and frustrated that I know I didn't make much sense trying to explain myself.
印度自从2002年就拥有上述战机,然而巴基斯坦空军却不具备有效的能保护主要城市和设施的武器系统,以防卫这些战机发起的攻击,该官员解释说。
India has these aircraft since 2002 whereas the PAF has no effective weapon system to save major cities of the country and defence installations from any attack by such planes, the official said.
这一发现或许可以解释为何一些人的确受到鲨鱼攻击却极少致命——只要大白鲨的体型还不够大,它咬下去的那一口就没有它的名声大。
The finding may explain why the few shark attacks that do happen on people are rarely fatal—until it's pretty big, the great white's reputation is worse than its bite.
在上面的案例中,如果我能努力听取搭档的解释,我或许会很快就意识到尽管他的误解让人很沮丧,但是可以确定那不是人身攻击或者有意过失。
In the above example, if I had made an effort to hear my partner I would have quickly realized that although his misunderstanding was frustrating, it wasn't a personal attack or wanton negligence.
在上面的案例中,如果我能努力听取搭档的解释,我或许会很快就意识到尽管他的误解让人很沮丧,但是可以确定那不是人身攻击或者有意过失。
In the above example, if I had made an effort to hear my partner I would have quickly realized that although his misunderstanding was frustrating, it wasn't a personal attack or wanton negligence.
应用推荐