We had only a vague description of the attacker.
我们只有那个袭击者的粗略描述。
The attacker knocked on their door and made a lunge for Wendy when she answered.
袭击者敲了他们的门,并在温迪开门时,向她猛冲过去。
This information will help us build a picture of his attacker.
这条信息将有助于描画出袭击他的人的相貌。
The attacker threatened them with a gun.
袭击者用枪威胁他们。
She was barely able to stammer out a description of her attacker.
她只能勉强结结巴巴地说一说袭击她的人是什么模样。
The drawing is said to be a good likeness of the girl's attacker.
据说那幅画像很像袭击那个女孩的歹徒。
If your program is a viewer or editor of data—such as a word processor or an image displayer—that data might be from an attacker, so it's an untrusted input.
如果您的程序是数据的浏览器或者编辑器——比如文字处理器或者图像显示器——那么那些数据有可能来自攻击者,所以那是不可信的输入。
Luckily, Zhang had just learned how to escape from an attacker, a person who plans to hurt someone.
幸运的是,张刚学会了如何从计划伤害他人的袭击者手中逃脱。
A creative attacker can take advantage of a buffer overflow vulnerability through stack-smashing and then run arbitrary code (anything at all).
有创造力的攻击者会透过摧毁堆叠利用缓冲区溢位的弱点,然后执行任何程序码。
The sophisticated attacker finds a weakness in a similar type of software, and tries to use that to exploit the system.
富有经验的攻击者可以发现同类软件的缺点,并且尝试利用这些弱点来进入系统。
A common scenario is that the attacker calls the shopper, pretending to be a representative from a site visited, and extracts information.
一个常见的场景是攻击者打电话给购物者,假装是购物者所访问站点的代表,并且提取信息。
The first scenario looks at a situation in which a disgruntled employee is the attacker.
第一种方案研究的是攻击者是心怀不满的雇员的情况。
For a second time, I retreated a step while my attacker relented in his attack.
我再一次后退了一步,同时,我的袭击者的攻击也减缓了。
But missile attacks on ships are rare, so it is difficult to know just how safe a ship really is-especially if an attacker launches a dozen or so missiles at once.
但舰船受到导弹攻击的案例非常少,因此很难判断一条战舰躲过导弹攻击的劫数有多大,特别是在攻击者一次发射十多枚导弹的情况下。
Determining the identity of the attacker was a matter of narrowing down the line of potential suspects.
确定攻击者的身份需要逐渐缩小一连串嫌疑人的范围。
Women were cooking dinner, men were praying and children were playing nearby when the attacker struck, a witness said.
妇女烹饪晚餐,男子祈祷和孩子们玩附近时,攻击者击中,一位目击者说。
Worst of all, the identity of the attacker may remain a mystery.
最糟糕的是,攻击者的身份仍是一个迷。
For instance, pseudo-random Numbers are used for process IDs and packet IDs, which makes spoofing significantly more difficult for a would-be attacker.
例如,伪随机数可用于进程ID和包id,这使得那些想要进行攻击的人很难进行欺骗。
Another term for an attacker is a black hat.
攻击者的另一个词汇是黑帽(black hat)。
Therefore, as a hack, an attacker might authenticate as a valid user, but then provide an HTTP header (perhaps the iv-cred) that implies more permissions than he actually has.
因此,攻击者可能作为一个有效用户通过认证,然后提供一个HTTP 消息头(可能为 iv-cred ),这个消息头表明他比实际上有更多的权限。
A malicious attacker can make use of this behavior and launch a remote denial-of-service attack against a vulnerable network service over the Internet.
恶意攻击者可以利用这一点,通过Internet对网络服务发动远程拒绝服务攻击。
Essentially, if you allow an attacker to run code on such a machine through any means, the attacker can completely take over the machine.
从本质上说,如果您允许攻击者在这样的机器上以任何方式运行代码,则攻击者完全可以接管该机器。
But once an attacker can run code on such a machine, the attacker instantly attains complete control.
但是,一旦攻击者可以在这样的机器上运行代码,就可以立即获取完全控制。
Although URIs provide a lot of flexibility, if you're accepting a URI from a potential attacker, you need to check it before passing it on to anyone else.
尽管uri提供了很大的灵活性,可是如果您接收到了一个来自攻击者的URI,您需要在把它转给任何其他人之前检查它。
If an attacker can cause a buffer to overflow, then the attacker can control other values in the program.
如果攻击者能够导致缓冲区溢出,那么它就能控制程序中的其他值。
Your application might need a few more, but limit them -- don't accept data from a potential attacker unless it's critically needed.
您的应用程序可能还需要更多,但是要限制它们 ——除非是特别需要,否则不要接受潜在的攻击者的数据。
The problem is that if an attacker can control the underlying libraries used by a program, the attacker can completely control the program.
问题是,如果攻击者可以控制程序用到的底层库,那么攻击者就可以控制整个程序。
Even if monitored, a casual attacker will be stymied by the presence of backspace and other characters that apparently alter the presence or order of characters in the password string.
即使受到监视,使用后退键或者其他明显破坏密码字符串显示和顺序的字符,都可以使偶然的攻击者无所适从。
The attacker, a veteran systems administrator, has a problem with her job and takes it out on the systems she is trusted to administer, manage, and protect.
攻击者,一名经验丰富的系统管理员,在工作中遇到了问题,而拿她自己管理、保护的系统发泄。
The attacker, a veteran systems administrator, has a problem with her job and takes it out on the systems she is trusted to administer, manage, and protect.
攻击者,一名经验丰富的系统管理员,在工作中遇到了问题,而拿她自己管理、保护的系统发泄。
应用推荐