• And the most popular injection attack methods.

    以及流行的注入攻击方法

    youdao

  • This method removes the potential for an SQL injection attack.

    这种方法消除SQL注入攻击可能性

    youdao

  • In an SQL injection attack, a program creates an SQL command and sends it to an SQL interpreter.

    SQL注入攻击中,程序会创建一个SQL命令其发送给SQL解释器。

    youdao

  • In an SQL injection attack, Mallory finds a Web site that Alice has created to sell electronics.

    SQL注入攻击中,Mallory找到Alice创建一个Web站点

    youdao

  • The focus of this article is a specific type of code injection attack: the Blind XPath injection.

    本文主要介绍代码注入攻击一种特殊类型XPath

    youdao

  • The SQL injection attack shown in Figure 3 resulted in the display of user names and passwords from the Users table.

    3SQLInjection攻击导致显示users中的用户密码

    youdao

  • An emerging threat, first outlined by Amit Klein in a paper in 2004, is the blind XPath injection attack (see Resources).

    最近开始出现种威胁(最初AmitKlein于2004年篇论文中概述)XPath攻击(请参阅参考资料)。

    youdao

  • Forever, many hackers attack means, such as phishing and SQL injection attacks, start from the identity authentication.

    目前的很多黑客攻击手段钓鱼攻击、SQL注入攻击等各种网络攻击方式都是身份认证开始的。

    youdao

  • Like the SQL injection attack, you can often easily deal with the threat if you follow best practices to develop secure applications.

    SQL注入攻击类似如果使用最佳实践开发安全应用程序通常可以轻松地处理该威胁

    youdao

  • ISR (Instruction Set Randomization) is a new, general approach for safeguarding systems against any type of code-injection attack.

    指令随机化(isr)技术一种新型保护系统免遭任何类型注入攻击通用方法

    youdao

  • The characteristics of SQL injection attacks is widespread, covert means, characteristics, methods and tools nonenumerative attack civilians.

    SQL注入攻击具有广泛存在手段隐蔽特征不可枚举、攻击手段工具平民化特征。

    youdao

  • A connection string injection attack can occur when dynamic string concatenation is used to build connection strings that are based on user input.

    使用动态字符串串联根据用户输入生成连接字符串时,可能发生连接字符串注入式攻击

    youdao

  • Any application that queries a database using user-entered data, including Windows Forms applications is a potential target of an injection attack.

    使用用户输入数据查询数据库任何应用程序(包括Windows窗体应用程序)都Injection攻击的潜在目标

    youdao

  • While it's easy to point to one or two key measures for the prevention of the SQL injection attack, it's best to take a layered approach to the problem.

    尽管采取项关键措施预防SQLInjection攻击容易最好问题采用分层方法

    youdao

  • Blind SQL injection attacks are a well know and recognized form of code injection attack, but there are many other forms, some not so well documented or understood.

    SQL攻击一种为人熟知代码注入攻击形式但是很多其他形式有些尚未得到很好的记载和了解。

    youdao

  • Perhaps the most malicious form of injection attack is code injectionplacing new code into the memory space of the running process and then directing the running process to execute it.

    恶劣注入攻击形式也许代码注入——代码置入正在运行进程内存空间随后指示正在运行的进程执行这些代码。

    youdao

  • The basic idea behind a SQL injection attack is this: you create a Web page that allows the user to enter text into a textbox that will be used to execute a query against a database.

    SQLInjection攻击基本原理如下创建一个网页允许用户文本框输入文本用于数据库执行查询。

    youdao

  • This attack functions almost exactly like the blind SQL injection attack but, unlike SQL injection attacks, few people know about XPath injection attacks or take precautions against them.

    这种攻击运作SQL攻击几乎完全相似,SQL注入攻击不同的是,几乎没什么了解XPath盲注攻击其进行预防。

    youdao

  • Parameterized commands guard against a SQL injection attack by guaranteeing that values received from an external source are passed as values only, and not part of the SQL statement.

    参数化命令会借保证外部来源接收数值传递SQL陈述式传递,以防范SQL投射攻击

    youdao

  • Aiming at Advanced Encryption Standard (AES) implemented on a secret chip, this paper presents an optical fault injection attack method to get the secret information from microcontroller.

    获取芯片秘密信息针对其中高级加密标准(aes)算法,提出一种故障注入攻击方法

    youdao

  • In this article, the author explains the principle and process of SQL Injection Attack, and introduces a serial interrelated solution to prevent SQL Injection Attack from the aspect of code in detail.

    介绍SQL注入攻击原理,SQL注入攻击过程功能代码本身方面详细介绍了SQL注入攻击的防范措施

    youdao

  • In addition to the overflow exploits, SQL injection is one other type of attack that relies on developer oversight by not testing incoming data.

    除了溢出的利用以外,SQL注入一类依赖开发人员测试输入数据疏漏攻击

    youdao

  • Newer modifications include Blind XPath injection, which reduces the knowledge required to mount the attack.

    更新修改中还包括暗藏xpath注入降低了安置攻击所需知识

    youdao

  • In the malicious attack statement, two kinds of attacks, SQL injection and middleware channel multiplexing, are hard and heavy.

    恶意攻击语句中,SQL注入中间件通道复用攻击中难,同时也是中重。

    youdao

  • Conclusion: Chuankezhi injection has a certain effect on acute attack of bronchial asthma in children without toxic or side effect, and can prevent the recurrence of asthma to some extent.

    结论喘可治注射液治疗儿童支气管哮喘急性发作疗效肯定无毒副作用具有一定预防哮喘复发的作用。

    youdao

  • The main way: password loophole attack, SQL Server extended stored procedure attack, SQL Injection (SQL Injection), steals backup, etc.

    主要手法有:口令漏洞攻击SQLServer扩展存储过程攻击、SQL注入(SQLInjection)、窃取备份

    youdao

  • Directory traversal is another injection-style attack, wherein a malicious user tricks filesystem code into reading and/or writing files that the Web server shouldn't have access to.

    目录遍历另一注入类型攻击,攻击者欺骗文件系统服务器允许操作的文件

    youdao

  • Directory traversal is another injection-style attack, wherein a malicious user tricks filesystem code into reading and/or writing files that the Web server shouldn't have access to.

    目录遍历另一注入类型攻击,攻击者欺骗文件系统服务器允许操作的文件

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定