• For example, a buffer overflow in a network server program that can be tickled by outside users may provide an attacker with a login on the machine.

    例如外部使用者可以利用网路伺服器程序中的缓冲区溢位可能使攻击登入机器。

    youdao

  • Buffer overflow attack technology is a very efficient attack technology based on network.

    缓冲区溢出攻击技术一项十分有效的网络攻击技术。

    youdao

  • Buffer overflow attacks have been the most popular methods of attacking network.

    缓冲区溢出攻击已经成为网络攻击主要方式

    youdao

  • In the current network and distributed system security, buffer overflow is widely used by more than 50%.

    当前网络分布式系统安全中,被广泛利用的50%以上都是缓冲区溢出

    youdao

  • The buffer overflow attacks have been the most common form in the network attacks and become a predominant problem in the system and network security area.

    缓冲区溢出攻击网络攻击事件常用的一种攻击方式,成为系统网络安全中亟待解决重要问题

    youdao

  • Network security has been paid more attention to and hackers often take advantage of buffer overflow to attack other systems or spread virus.

    网络安全日益引起人们重视,而利用缓冲区溢出进行攻击是黑客病毒较为常用的手段。

    youdao

  • Network security has been paid more attention to and hackers often take advantage of buffer overflow to attack other systems or spread virus.

    网络安全日益引起人们重视,而利用缓冲区溢出进行攻击是黑客病毒较为常用的手段。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定