A hacker could use this attack technique to retrieve, corrupt, or delete data.
黑客可以使用这种攻击技巧来检索、破坏或删除数据。
The company's information security team detected the attack almost immediately, and took aggressive actions to protect all systems and data.
该公司的信息安全团队几乎立即发现了攻击,并采取积极的行动来保护所有系统和数据。
The company’s information security team detected the attack almost immediately, and took aggressive actions to protect all systems and data.
该公司的信息安全团队几乎立即发现了攻击,并采取积极的行动来保护所有系统和数据。
Message snooping — a direct attack on data privacy by examining all or part of the content of a message.
消息探听——通过检查消息中所有或部分内容对数据隐私进行直接攻击。
In order to protect applications from this kind of attack or ambiguity, application designers or developers should add the identity of the intended recipient to application data to be signed.
为了让应用能避免此类攻击或模糊点,应用的设计者或开发者们应该在待签名的应用数据中加入目标接收方的身份。
This is done by tricking a WPA to send out a large amount of data, and then mathematically cracking it without using a dictionary attack.
通过诱使一个WPA发送大量的数据,然后无需使用字典式攻击,而是使用数学方法就可以破解掉它。
Attackers can use this fact to "slip through" data validators to attack programs.
攻击者可以利用这一点来“骗过”数据验证来攻击程序。
Essentially, what happens in an overflow style of attack is too much data is pushed into what the original programmer thought was enough space.
实质上,溢出类攻击是由于将太多的数据放入原始程序设计人员认为足够的空间中导致的。
One form of hacker attack even involves feeding bad data to ARP tables, a practice known as ARP poisoning.
黑客攻击的一种形式就包括修改恶意数据到ARP映射缓存,即所谓的ARP中毒。
The often-serious format string attack is based on the idea that an attacker can control the format used to display data.
常见的格式化字符串攻击来自于一个思想:攻击者可以控制显示数据所使用的格式。
This attack mimics the format of ADS-B data packets to create fake aircraft signals, either on the ground controller's screen or on the pilot's tracking display.
这种攻击通过模拟ads - B的数据报文,在地面空管人员的显示屏或飞行员的跟踪显示屏上建立假的飞机信号。
In addition to the overflow exploits, SQL injection is one other type of attack that relies on developer oversight by not testing incoming data.
除了溢出的利用以外,SQL注入是另一类依赖于开发人员没测试输入数据的疏漏的攻击。
So, I was especially interested in the results of some related data analysis that I worked on for on the recently released Symantec Report on Attack Kits and Malicious Websites.
因此,我对于工作中得出的相关数据分析结果非常的感兴趣,这些数据最近发表在赛门铁克关于攻击工具和恶意站点的报告中。
They can be used to attack other systems, host attack tools, send spam, or just steal data.
犯罪分子可以利用计算机网络攻击他人计算机系统、软件、发送垃圾邮件或是窃取资料。
They are both vulnerable to attack using the same techniques shown above with SQL injections; the data store just happens to be XML files instead of an actual database.
很容易使用上文SQL注入中所示的相同技巧来攻击之;数据存储区刚好是XML文件而不是实际的数据库。
During the throughput testing, the 8500e interpreted a massive amount of data sent by the Ixia over six ports as a DoS attack, and immediately blocked all traffic.
在吞吐量测试过程中,8500e解释了发自Ixia,到其6个端口的,作为DoS攻击的海量数据,并立即阻塞了所有流量。
In fuzz testing, you attack a program with random bad data (aka fuzz), then wait to see what breaks.
在模糊测试中,用随机坏数据(也称做fuzz)攻击一个程序,然后等着观察哪里遭到了破坏。
It could have been worse. Mallory's attack could have overwritten any file, including critical data stored on the server.
更糟的是,Mallory的攻击完全可以覆盖所有文件,包括服务器上存储的重要数据。
Any application that queries a database using user-entered data, including Windows Forms applications is a potential target of an injection attack.
使用用户输入的数据查询数据库的任何应用程序(包括Windows窗体应用程序)都是Injection攻击的潜在目标。
LulzSec also separately posted a message justifying its attack on Sony, saying the company's approach to handling sensitive data was "disgraceful and insecure".
LulzSec同时分别发布一条消息为它对索尼的攻击辩护,说这家公司控制敏感信息的方法是“丢脸和不安全的”。
Use electronic bulletin boards and online data services to gain access to more market data and business opportunities, allowing your organization to quickly attack new opportunities.
l运用点子公告栏和在线数据服务来获得更多的市场数据与商机,从而能够使组织快速地捕捉新机遇。
In this case, it is first necessary to "escape" to the free context, and then to append the XSS attack. For example, if the data is injected as a default value of an HTML form field.
在这种情况下,首先必要的是“逃”到自由的环境中,然后附加XSS攻击。
If you can keep malicious data from entering your program, or at least keep it from being processed, your program becomes much harder to attack.
如果您能不让恶意的数据进入您的程序,或者至少不在程序中处理它,您的程序在面对攻击时将更加健壮。
One tactic that's gaining popularity is to attack what is usually the slowest part of the data transfer chain: the hard drive.
一种逐渐流行的策略是解决数据传输链上通常最慢的部分:硬盘驱动器。
Some doctors also questioned whether the heart attack data were accurately collected for all participants.
一些医生也对那些收集到的参与者关于患心脏病的数据是否准确持怀疑态度。
So it is necessary to adopt one encrypt intensity high algorithm encrypt some important data, in order to prevent that legal users operate over authority, illegal user attack viciously.
因此,有必要采用一种加密强度比较高的加密算法来加密一些重要数据,以防止合法用户的越权操作和非法用户的恶意攻击。
But if the operating system has marked that Internet communications buffer region of memory as only being valid for containing data and NOT code, the hacker's attack will never get started.
但是,如果经营体制,标志着互联网通信缓冲区的记忆,因为只有被有效遏制数据,而不是代码,黑客的攻击将不会得开始。
But if the operating system has marked that Internet communications buffer region of memory as only being valid for containing data and NOT code, the hacker's attack will never get started.
但是,如果经营体制,标志着互联网通信缓冲区的记忆,因为只有被有效遏制数据,而不是代码,黑客的攻击将不会得开始。
应用推荐