As with the applet sandbox, this guarantees that a malicious application cannot do any harm.
如同使用applet沙箱(sandbox),这样可以保证恶意的应用程序不能造成任何破坏。
Skype has no evidence to suggest that this was a malicious attack. We've identified a bug in the Skype software which was the root cause of the downtime.
一个发言人排除了这是一次破坏行为的可能性,Skype没有证据显示这是一次蓄意的攻击,相反,我们在Skype的软件中发现了一个bug,该bug是导致此次全球宕机的根源。
If I accept a malicious piece of code that wreaks havoc on my computer, whose fault is it?
如果我接受了一段恶意代码,其破坏了我的计算机,那又是谁的错呢?
If a malicious user gets hold of this key information, then the security of that host machine can be compromised very easily.
如果恶意用户获得了这些密钥信息,那么主机的安全性就很容易受到威胁。
OK, so think like a malicious hacker.
好了,想象自己是一个恶意的黑客。
Yes, it seems that to get the malicious code working, a user would still need to be surfing with IE.
是的,似乎如果想让恶意代码生效,用户还是得使用IE浏览器。
How many malicious users can a tagging system tolerate before results significantly degrade?
在服务质量明显变坏之前,一个标签系统能忍受多少的恶意用户?
After you disentangle these systems and enable SOA, malicious users have a simpler architecture that is easier to compromise.
对这些系统进行分解并启用SOA后,恶意用户所面对的体系结构就会简单一些,从而更便于进行破坏。
A malicious proxy can make it appear that the connection is tunneled when it actually is not.
恶意的代理可以在并不存在隧道时却伪装成仿佛隧道真正存在一样。
That means that someone was searching for a legitimate website by name and ended up visiting a malicious website instead.
这就意味着一些人在搜索正常站点的过程中最终访问了恶意站点。
Trusting a malicious certification authority will put your computer at risk, so use discretion.
信任一个恶意的证书颁发机构将会对您的计算机造成威胁,所以请妥善使用。
A malicious user can send a really long data sequence.
恶意用户会发送超长数据。
Execution of malicious scripts within a trusted domain or context.
恶意代码在一个受信任的域或上下文中执行。
Rather, it is "being distributed from a malicious website," according to Kaspersky researcher Denis Maslennikov.
它是“通过一个恶意网站传播的,”根据卡巴斯基研究员DenisMaslennikov的说法。
It's someone trying to make malicious use of a command-line executable.
而是试图恶意利用一个命令行可执行文件。
But it shows that a malicious programmer can cause a lot of harm quite easily.
但是它显示了一个恶意的程序员可以很容易的导致许多损害。
Granted, for most users this will not happen, but a malicious one could slip through.
即使大多数用户都不会这样做,但某个恶意的人却可以钻空子。
The just man frowns, but never smiles with a malicious sneer.
公正的人蹙起眉头,但从不会有那种恶意的微笑。
For example, once a malicious party has somehow stolen a legitimate message created by a sender, the message could be forwarded to anyone.
例如,一旦有恶意的一方以某种方式窃取了由发送方创建的合法消息,该消息就有可能被转发给任何人。
Without this protection, a malicious web page could compromise the integrity of another web page.
没有这个保护的话,恶意的网页可能危害到另外一个正常的网页。
Use this mode to temporarily lock down computers during a known network attack or when a malicious program is spreading.
使用这种模式,可以在一个已知的网络攻击或者病毒程序沿着网络传播期间,暂时地锁定电脑。
Consider a malicious recipient who claims that it has received a message twice from a sender even though the sender has actually sent it only once.
请设想一下,一个恶意的接收方声称两次收到了来自发送方的消息,尽管发送方只发送过一次。
There is nothing to stop a malicious client from sending options that cover almost all of the data in the window.
如果恶意客户机发送的选项覆盖窗口中几乎全部的数据,则无法对此加以阻止。
This brings up a few questions: What if a malicious user hacks the underlying security mechanism itself?
这会带来几个问题:如果恶意用户攻破了底层安全机制本身,那么会怎么样?
In this scenario, the user unknowingly executes scripts written by an attacker when they follow a malicious link in a mail message.
在本方案中,当用户执行邮件消息中的恶意链接时,就会不知不觉地执行攻击者编写的脚本。
Again, consider a malicious recipient who receives a signed SOAP message and forwards it to another malicious party.
请再设想一下,恶意接收方收到了经签名的SOAP消息,并将其转发给另一个恶意方。
In such cases, if a malicious user exploits these sessions, the user can potentially disrupt the system.
在这些情况下,如果恶意用户利用这些会话,用户就会潜在地破换系统。
An attacker can connect users to a malicious server of the attacker's choice.
攻击者可以将用户连接到攻击者选择的恶意服务器上。
This enables you to find issues in the third party components, along with issues from a malicious file input source and more.
这样能够使您在第三方控件中找出问题,并伴随着来自恶意文件源中更多的问题。
This enables you to find issues in the third party components, along with issues from a malicious file input source and more.
这样能够使您在第三方控件中找出问题,并伴随着来自恶意文件源中更多的问题。
应用推荐