Without this protection, a malicious web page could compromise the integrity of another web page.
没有这个保护的话,恶意的网页可能危害到另外一个正常的网页。
According to Microsoft, the vulnerability allows a malicious web site to run code on a client's machine.
根据微软所述,恶意站点可以利用该漏洞在用户机器上运行代码。
Web Trojan Defense:Automatically blocks malicious web scripts and viruses while you are browsing the web.
网络病毒防御:自动阻止恶意的脚本和病毒,而您浏览网页。
In this paper, the harm and the principle of malicious Web page are analyzed; meanwhile, the defense is introduced.
文章分析了恶意网页的危害性和工作原理,介绍了防御方法。
Searching for cats? The malicious Web site becomes a portal of cat pictures and cat-owner blogs with software products for sale.
想在网上搜寻猫吗?恶意网站会变成一个门户网站,上面有猫的图片,猫主人的博客,还有软件产品出售。
By limiting the scope of navigation, Gazelle is able to prevent malicious web pages from navigating frames in benign web applications.
通过限制导航范围,Gazelle可以防止在正常网站中访问到恶意网页。
That blog link doesn't even cover how some malicious Web sites completely rewrite their code depending on what the end-user is looking for.
博客中的链接,其实还没有涉及某些恶意网站是如何依据终端用户的搜寻内容而彻底重写代码的。
If you open a malicious web page, the browser's sandbox prevents that malicious code from leaving the browser and installing itself to your hard drive.
就算你打开一个恶意网页,浏览器的沙箱也会阻止恶意代码安装到硬盘上。
TrojanDownloader. Exchanger. ah arrives on a system as a file dropped by other malware, or downloaded by an unsuspecting user when visiting malicious Web sites.
下载者,由其它恶意软件投放到系统上,或用户访问恶意网站时下载到系统上。
One of the metrics we use in the report examines Web search terms and the number of times the use of each search term resulted in a user visiting a malicious website.
我们使用报告中所阐述的一种标准去检查web搜索词和使用每种搜索词所导致用户访问恶意站点的次数。
The problem is that if the DNS server cache is "polluted" with bogus DNS entries, users can subsequently be forwarded to malicious Web sites instead of the sites they intended to visit.
问题是如果DNS服务器缓存被假DNS入口“污染”,用户随后能被转发到替代恶意站点,而不是他们查访问的站点。
To exploit the security hole, hackers must trick users into visiting a Web site loaded with malicious code, Microsoft said.
微软说,为了利用这个安全漏洞,黑客必须欺骗用户访问一个装载了恶意代码的网站。
Let us assume an attacker succeeded in filling a page containing malicious script to the Web site for the subscribed members.
让我们假设攻击者成功地将一个包含恶意脚本的页面填入到订阅成员使用的网站上。
Malicious software often infects a corporate network by exploiting security holes in web browsers to infiltrate a PC when its user visits a dodgy website.
恶意软件经常通过嗅探网络浏览器的安全漏洞来感染公司网络,当用户访问隐藏的网页时,所用电脑会感染病毒。
As Microsoft explains on its Web site, DEP is a set of hardware and software technologies that perform additional checks on memory to help prevent malicious code from running on a system.
据微软网站的说明,DEP是一系列硬件和软件技术,可以通过对内存区域的附加检查阻止恶意代码在系统上运行。
These services scan for Web sites exhibiting unusual behavior or known malicious activity and block those sites from users.
它可以对网站进行扫描,监测其是否有不正常的行为或是否存在已知的恶意行为,并阻挡用户访问这些站点。
Guarantee that the pages in the Web site return user inputs only after validating them for any malicious code.
保证Web站点的页面只有在验证了用户输入没有恶意代码之后才返回用户输入。
Starting with these seven habits for writing more secure PHP Web applications will help you avoid becoming an easy victim of malicious attacks.
从这七个习惯开始尝试编写更安全的PHPWeb应用程序,可以帮助您避免成为恶意攻击的受害者。
Both types of entities might be used to create denial of service attacks or other malicious documents when used with a Web browser's rendering engine.
当这两种类型的实体与Web浏览器的呈现引擎一起使用时,可能被用于创建拒绝服务攻击或其他恶意文档。
If the legitimate server sends a page back to the user including the value of clientprofile, the malicious code will be executed on the client Web browser as shown in Figure 1.
如果合法服务器将一个包含clientprofile值的页面发回给用户,则在客户机Web浏览器上就会执行恶意代码,如图1所示。
Unfortunately, malicious code can find its way into a Web application in many ways.
遗憾的是,恶意代码进入Web应用程序的方法多种多样。
With this alteration, the Web site displays the malicious content on the page as if the displayed information is the valid content from the site.
通过这种方法,Web站点就会像显示站点中的有效内容一样在页面上显示恶意内容。
XSS results from malicious scripts being injected into a Web site.
XSS由注入Web站点的恶意脚本而导致。
Last week instances of Gumblar across the web increased by almost two-and-a-half times, while security company Sophos says it was responsible for 42% of all cases of malicious code found on websites.
上周盖博拉在整个网络上的案例增加了近两倍半,而网络安全公司Sophos表示,网站上发现的恶意代码中42%与这个病毒有关。
If the targeted Web site doesn't check for this type of malicious code, misuse of the user is probable.
如果目标Web站点不检查这类恶意代码,就可能造成恶意使用用户信息。
Any code that executes in a Web browser can be tampered with, or bypassed completely, by a malicious user.
Web浏览器上运行的任何代码都可能被恶意用户篡改或者完全绕开。
When the page is displayed, the malicious script runs, collects the users' cookies, and sends a request to the attacker's Web site with the cookies gathered.
显示该页面时,恶意脚本就运行,它收集用户的cookie,并向攻击者的网站发送包含收集到的 cookie 的请求。
Securing Web services with ACLs, however, does not mitigate the risk of exposing Web services (and non-Web services) vulnerabilities to a malicious attack.
用访问控制表保护Web服务,然而,这并不能减轻Web服务(以及非web服务)漏洞受到恶意攻击的危险。
While restricting web surfing to trusted sites should reduce the risk of infection, the malicious code can be injected into any website.
尽管限制浏览器只浏览信任站点可以减少受到攻击的风险,恶意代码可以被植入任何的网站。
Most modern browsers pre-check each web page you visit and alert you if one is suspected of being malicious.
大部分最新的浏览器已能提前检查你浏览的每个网页,如果网站疑似有恶意软件,浏览器就会提示你。
应用推荐