• A hacker could use this attack technique to retrieve, corrupt, or delete data.

    黑客可以使用这种攻击技巧检索破坏删除数据

    youdao

  • The company's information security team detected the attack almost immediately, and took aggressive actions to protect all systems and data.

    公司信息安全团队几乎立即发现攻击采取积极行动保护所有系统数据

    youdao

  • The company’s information security team detected the attack almost immediately, and took aggressive actions to protect all systems and data.

    公司信息安全团队几乎立即发现攻击采取积极行动保护所有系统数据

    youdao

  • Message snooping — a direct attack on data privacy by examining all or part of the content of a message.

    消息探听——通过检查消息所有部分内容数据隐私进行直接攻击

    youdao

  • In order to protect applications from this kind of attack or ambiguity, application designers or developers should add the identity of the intended recipient to application data to be signed.

    为了应用能避免此类攻击模糊点应用设计者开发者们应该在待签名的应用数据中加入目标接收方身份

    youdao

  • This is done by tricking a WPA to send out a large amount of data, and then mathematically cracking it without using a dictionary attack.

    通过诱使一个WPA发送大量数据然后无需使用字典式攻击,而是使用数学方法就可以破解掉

    youdao

  • Attackers can use this fact to "slip through" data validators to attack programs.

    攻击可以利用一点数据验证来攻击程序

    youdao

  • Essentially, what happens in an overflow style of attack is too much data is pushed into what the original programmer thought was enough space.

    实质上溢出攻击由于将太多数据放入原始程序设计人员认为足够的空间中导致的。

    youdao

  • One form of hacker attack even involves feeding bad data to ARP tables, a practice known as ARP poisoning.

    黑客攻击一种形式包括修改恶意数据ARP映射缓存,即所谓的ARP中毒

    youdao

  • The often-serious format string attack is based on the idea that an attacker can control the format used to display data.

    常见格式化字符串攻击来自于思想攻击者可以控制显示数据所使用格式

    youdao

  • This attack mimics the format of ADS-B data packets to create fake aircraft signals, either on the ground controller's screen or on the pilot's tracking display.

    这种攻击通过模拟ads - B数据报文地面空管人员显示屏飞行员跟踪显示屏建立飞机信号

    youdao

  • In addition to the overflow exploits, SQL injection is one other type of attack that relies on developer oversight by not testing incoming data.

    除了溢出的利用以外,SQL注入一类依赖开发人员测试输入数据疏漏攻击

    youdao

  • So, I was especially interested in the results of some related data analysis that I worked on for on the recently released Symantec Report on Attack Kits and Malicious Websites.

    因此对于工作中得出的相关数据分析结果非常感兴趣,这些数据最近发表赛门铁克关于攻击工具恶意站点的报告中

    youdao

  • They can be used to attack other systems, host attack tools, send spam, or just steal data.

    犯罪分子可以利用计算机网络攻击他人计算机系统软件发送垃圾邮件或是窃取资料

    youdao

  • They are both vulnerable to attack using the same techniques shown above with SQL injections; the data store just happens to be XML files instead of an actual database.

    容易使用上文SQL注入中所示相同技巧攻击之数据存储区刚好XML文件而不是实际数据库

    youdao

  • During the throughput testing, the 8500e interpreted a massive amount of data sent by the Ixia over six ports as a DoS attack, and immediately blocked all traffic.

    吞吐量测试过程中,8500e解释了发自Ixia,到6个端口的,作为DoS攻击的海量数据立即阻塞了所有流量。

    youdao

  • In fuzz testing, you attack a program with random bad data (aka fuzz), then wait to see what breaks.

    模糊测试中,随机数据(也称做fuzz)攻击一个程序然后等着观察哪里遭到了破坏

    youdao

  • It could have been worse. Mallory's attack could have overwritten any file, including critical data stored on the server.

    糟的是,Mallory攻击完全可以覆盖所有文件包括服务器存储重要数据

    youdao

  • Any application that queries a database using user-entered data, including Windows Forms applications is a potential target of an injection attack.

    使用用户输入数据查询数据库任何应用程序(包括Windows窗体应用程序)都Injection攻击的潜在目标

    youdao

  • LulzSec also separately posted a message justifying its attack on Sony, saying the company's approach to handling sensitive data was "disgraceful and insecure".

    LulzSec同时分别发布条消息索尼攻击辩护这家公司控制敏感信息方法丢脸不安全的”。

    youdao

  • Use electronic bulletin boards and online data services to gain access to more market data and business opportunities, allowing your organization to quickly attack new opportunities.

    l运用点子公告栏在线数据服务获得更多市场数据商机从而能够使组织快速地捕捉新机遇。

    youdao

  • In this case, it is first necessary to "escape" to the free context, and then to append the XSS attack. For example, if the data is injected as a default value of an HTML form field.

    这种情况下首先必要自由环境中然后附加XSS攻击

    youdao

  • If you can keep malicious data from entering your program, or at least keep it from being processed, your program becomes much harder to attack.

    如果不让恶意数据进入程序或者至少不在程序中处理,您的程序在面对攻击时将更加健壮。

    youdao

  • One tactic that's gaining popularity is to attack what is usually the slowest part of the data transfer chain: the hard drive.

    一种逐渐流行策略解决数据传输链上通常最慢部分硬盘驱动器

    youdao

  • Some doctors also questioned whether the heart attack data were accurately collected for all participants.

    一些医生对那些收集到参与者关于心脏病数据是否准确怀疑态度。

    youdao

  • So it is necessary to adopt one encrypt intensity high algorithm encrypt some important data, in order to prevent that legal users operate over authority, illegal user attack viciously.

    因此必要采用一种加密强度比较的加密算法来加密一些重要数据防止合法用户越权操作非法用户的恶意攻击

    youdao

  • But if the operating system has marked that Internet communications buffer region of memory as only being valid for containing data and NOT code, the hacker's attack will never get started.

    但是如果经营体制标志互联网通信缓冲区记忆因为只有有效遏制数据不是代码黑客攻击不会得开始。

    youdao

  • But if the operating system has marked that Internet communications buffer region of memory as only being valid for containing data and NOT code, the hacker's attack will never get started.

    但是如果经营体制标志互联网通信缓冲区记忆因为只有有效遏制数据不是代码黑客攻击不会得开始。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定