• 问题出现时,链接攻击自由

    Problems appear when linking against my lib.

    youdao

  • 但是实际上一个用新浪微博链接t.c n”做掩护脚本链接攻击

    But this was a scripted url attack under the disguise of Sina Weibo's short link "t.cn".

    youdao

  • 方案中用户执行邮件消息中的恶意链接时,就会不知不觉地执行攻击编写脚本

    In this scenario, the user unknowingly executes scripts written by an attacker when they follow a malicious link in a mail message.

    youdao

  • 钓鱼攻击网上很常见常常是以收到看似合法电子邮件开始,邮件中含有逼真网站(常常银行电子邮件供应商)的链接

    Phishing attacks are common online, and usually begin with the arrival of a legitimate-looking email containing a link to a realistic-looking website - often a bank or email provider.

    youdao

  • 请看Google News中有关罗迪市的链接专栏截稿关于男性法庭上攻击一位法官被警察击毙报道共有781文章。

    Looking at our Lodi links, the top story about a man who attacked a judge in court and was killed by police had 781 articles at my deadline for filing this column.

    youdao

  • 使用符号链接竞争条件攻击

    Race-condition attacks with symbolic links.

    youdao

  • 事实上WebApplicationSecurityConsortium (WASC)2009年初就估计所有Web站点有87%漏洞攻击的(有关更多信息请参见参考资源中的链接)。

    In fact, the Web Application Security Consortium (WASC) estimated in early 2009 that 87% of all Web sites were vulnerable to attack (see Resources for links to more information).

    youdao

  • 很多攻击只有它们欺骗特权程序一些计划外的事情而且程序的特权启用时才会成功(例如通过创建不合常理符号链接链接)。

    Many attacks only work if they trick the privileged program into doing something unintended while its privileges are enabled (for example, by creating weird symbolic links and hard links).

    youdao

  • 攻击可以蓄意地安排他们输入使之溢出引号之外运行真正查询后面链接任意一个查询。

    Attackers can deliberately craft their input so that it escapes out of quoting, and chain an arbitrary query on the end of the one you had intended to run.

    youdao

  • 用户可能会提示单击链接登录站点攻击借此获得用户的登录信息。

    The user may be prompted to click on the link and log on to the Web site, whereby the attacker can seize the user's log on information.

    youdao

  • 如果对此关心,可以参考IETFRFC 2965,可以得到关于这种攻击详细说明(参考资料中相关链接)。

    Details on how this attack works are explained in IETF RFC 2965, if you're curious (see Resources for a link).

    youdao

  • 攻击只需找到应用防御措施或是应用链接框架中的漏洞,就可以控制你的应用及其所拥有的权限

    But an attacker needs only to find a single hole in your defenses, or in any of the frameworks and libraries that you link against, to gain control of your app along with all of its privileges.

    youdao

  • 通常攻击链接中的恶意内容编码HEX其他编码方法),所以减少用户点击怀疑

    Usually the attacker will encode the malicious portion of the link to the site in HEX (or other encoding methods) so the request is less suspicious looking to the user when clicked on.

    youdao

  • 攻击可以蓄意地安排他们输入使之溢出引号之外,并运行真正查询后面链接任意一个查询。

    Attackers can deliberately craft their input so that it escapes out of quoting and chain an arbitrary query on the end of the one you had intended to run.

    youdao

  • 这些攻击事件时间产生大量流量链接导致网络堵塞甚至瘫痪。

    These attacks generate a lot of traffic within a short time, which may cause network congestion.

    youdao

  • 这些攻击事件时间产生大量流量链接导致网络堵塞甚至瘫痪。

    These attacks generate a lot of traffic within a short time, which may cause network congestion.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定