• The format of the command you use to run an exploit is.

    运行攻击命令格式

    youdao

  • To use Metasploit to run an exploit, perform the following steps.

    使用Metasploit运行一个攻击执行以下步骤

    youdao

  • An exploit is a program that demonstrates or exploits the vulnerability.

    漏洞利用(exloit)一个揭示利用安全性漏洞程序

    youdao

  • The potential damage from such an exploit depends on the script that is executed.

    擅用攻击的潜在损害程度取决于指令码所执行的内容。

    youdao

  • Subsequently, the aim is to detect a malware that is using an exploit or vulnerability.

    随后目的检测恶意软件,使用的是漏洞弱点

    youdao

  • This yields a richer feature set that an AT can exploit than the set that MSAA provides.

    生成AT利用MSAA提供更丰富特性

    youdao

  • Choose an exploit to use against your target system. Three commands are available for this purpose.

    选择一个针对目标系统攻击涉及三个命令

    youdao

  • And their incentive to write an exploit has much more to do with bravado and bragging rights than money.

    他们(漏洞)利用程序的动机虚张声势自夸胜于金钱

    youdao

  • An exploit often needs to reference absolute memory locations: an address on the stack, the address for a library function, etc.

    这是一种攻击往往需要引用绝对内存地址地址,函数地址,等等

    youdao

  • RealNetworks said it has received no reports of systems actually hit with an exploit, but it still urged users to update as soon as possible.

    该公司还表示至今没有受到利用这些漏洞攻击但是仍然希望用户可以尽可能的更新

    youdao

  • So if Obama can exploit this triumph to justify an accelerated disengagement, he'll reap the maximum benefits from this otherwise modest victory.

    那麽如果奥巴马利用这次凯旋加速跑偏的重心扳回正轨,这次某种方面来说是“谦让的胜利”中获益匪浅

    youdao

  • In order to minimize the possibility of such an exploit, the script always checks to determine if the E-mail is being sent to an acceptable address.

    为了这种威胁降最低脚本通常会检查发送电子邮件地址是否是一个可到达地址

    youdao

  • This isn't the first time Microsoft has asked people to voluntarily upgrade, but it is the first time that it's been in response to an exploit or vulnerability.

    不是微软第一建议用户自愿升级但是第一次作为对某个事件或者漏洞回应而建议用户升级。

    youdao

  • Three exploits followed: an attack on Microsoft Word, an exploit for Microsoft's animated cursor vulnerability and the Slammer worm, which exploited a flaw in Microsoft's SQL database engine.

    最后是三个漏洞个是攻击MicrosoftWord的,一个是利用Microsoft's animated cursor vulnerability漏洞最后利用Microsoft's SQL数据库引擎漏洞的Slammer worm蠕虫。

    youdao

  • The strongest motivation for the DUMAND project is that it will exploit an important source of information about the universe.

    DUMAND 计划最强烈动机开发一个关于宇宙重要信息来源

    youdao

  • Aesthetic particulars produced by the highly creative artist extend or exploit, in an innovative way, the limits of an existing form, rather than transcend that form.

    具创造力艺术家所创造美学细节创新方式扩展利用了一种现有形式局限不是超越那种形式。

    youdao

  • An ancestral species might have adapted to exploit a particular ecological niche on one island and then traveled over water to colonize other islands.

    原始物种可能已经适应利用岛屿特定生态位,然后在水上迁徙其他岛屿定居。

    youdao

  • These adaptations allowed an increasing diversity of plant forms to exploit dry land.

    这些适应机制保证了植物形态多样性不断增加,以便它们开拓干旱的陆地。

    youdao

  • Implementers who want to exploit an abstraction such as this need to inherit from the _templated class, like in the Listing 13.

    开发这样一个抽象实现者需要_ templated继承清单13示。

    youdao

  • Along with his strength, he had an uncanny ability to spot and exploit any weakness in an opponent.

    除了大无穷外,还有一种非同寻常能力,那就是发现利用对手的任何弱点

    youdao

  • Instead of lobbying against mobile money, Banks should see it as an exciting chance to exploit telecoms firms' vast retail networks and powerful brands to reach new customers.

    不仅不应游说反对移动钱包,而一个充分利用电信企业巨大的零售网络发挥强大的品牌效应争取客户机会

    youdao

  • For example using advanced best practices too early in an organization not yet able to exploit them may lead to frustration and inability to execute.

    例如一个组织太早使用不能利用高级最佳实践可能会导致挫折无法执行

    youdao

  • In most cases, if you create a list of "illegal" characters, an attacker will find a way to exploit your program.

    绝大多数情况下如果创建了一个非法字符列表攻击者还是可以找到利用的程序的方法

    youdao

  • An attacker may be able to exploit a buffer overflow by changing the value of other data in the function; none of these approaches counter that.

    攻击也许能够通过改变函数其他数据利用缓冲区溢出没有哪种方法能够防止这点。

    youdao

  • Shaikh, who is imprisoned in the isolated north-western city of Urumqi, was the victim of an elaborate ruse to exploit his mental condition, say his supporters.

    谢赫偏僻西北城市乌鲁木齐。支持者称,他因患有精神疾病而被利用一个精心策划诡计牺牲品

    youdao

  • An attacker may use directory traversal and cross-site ccripting during a scan phase and then hit it with an SQL injection or an RFI in the exploit phase.

    扫描阶段攻击者可能利用路径遍历站点脚本;攻击阶段,黑客可能会利用SQL注入远程文件包含进行攻击。

    youdao

  • And Zuckerberg, once again, saw an opportunity to exploit this as well.

    克伯格再度看到机会,并这个同样加以利用。

    youdao

  • An attacker can potentially exploit this extended processing attribute by looking for relatively short processing times.

    攻击通过查找相对简短处理时间,有可能利用这个延长的处理属性

    youdao

  • Now we have an attack vector that is wide open to exploit.

    我们就得到了一个易于利用攻击载体

    youdao

  • Robots are artefacts; they should not be designed to exploit vulnerable users by evoking an emotional response or dependency. It should always be possible to tell a robot from a human.

    机器人也是一件人工制品;应该通过唤起他们情感反应依赖性既而设计成为会溢出漏洞用户必须尽可能由人类告诉机器人做的事。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定