• Prevent SQL injection in applications.

    防止应用程序中的SQL注入

    youdao

  • Know about SQL injection and how to prevent it.

    了解SQL注入(SQL injection)及其预防方法。

    youdao

  • This method removes the potential for an SQL injection attack.

    这种方法消除SQL注入攻击可能性

    youdao

  • This is an effective way to guard against malicious SQL injection.

    抵御恶意SQL注入有效方法

    youdao

  • To find the problem with any SQL injection, perform source code analysis.

    发现任何SQL注入问题可执行源代码分析

    youdao

  • SQL injection is still one of the most common types of an injection flaw.

    SQL注入仍然常见注入缺陷

    youdao

  • SQL injection attacks are a vulnerability that tend to hurt high-value sites.

    SQL注入攻击一个可能损害高价值站点的漏洞

    youdao

  • SQL injection attacks can also be used to change data or damage the database.

    SQL Injection攻击用于更改数据损坏数据库

    youdao

  • Automatically escapes data saved to the database (to prevent SQL injection attacks).

    避免数据自动存入数据库(阻止SQL注入式攻击)。

    youdao

  • This removes the need to do preparation at runtime and can reduce SQL injection risk.

    这样就无需运行时执行准备工作可以减少SQL注入风险

    youdao

  • In an SQL injection attack, a program creates an SQL command and sends it to an SQL interpreter.

    SQL注入攻击中,程序会创建一个SQL命令其发送给SQL解释器。

    youdao

  • In an SQL injection attack, Mallory finds a Web site that Alice has created to sell electronics.

    SQL注入攻击中,Mallory找到Alice创建一个Web站点

    youdao

  • Doing so makes the SQL easier to maintain and secures your application from SQL injection attacks.

    这样做可使SQL更加易于维护可使应用程序免受SQL注入攻击。

    youdao

  • If your application exclusively USES prepared statements, you can be sure that no SQL injection will occur.

    如果应用程序独占地使用预处理语句,那么可以确保没有SQL入侵发生。

    youdao

  • Ruby on Rails has some clever helper methods, for example against SQL injection, so that this is hardly a problem.

    Rubyon Rails许多聪明的helper方法例如防止注入攻击的方法,sql注入变成了困难的事情。

    youdao

  • Editable Data Validation - HDIV analyzes all editable fields to remove cross-site scripting and SQL injection attacks.

    编辑数据验证——为了去除跨站点脚本SQL注入攻击HDIV分析所有的可编辑数据域

    youdao

  • The SQL injection attack shown in Figure 3 resulted in the display of user names and passwords from the Users table.

    3SQL Injection攻击导致显示users中的用户密码

    youdao

  • Using the Hacme Casino site again, let's look at the vulnerability that WebScarab found: an SQL injection exploit at the login.

    再次使用Hacme Casino站点我们来看一下WebScarab发现漏洞:在登录时出现一个SQL注入exploit。

    youdao

  • SQL injection is the second most popular vulnerability, primarily because of the growing dependence Web sites have on databases.

    SQL注入第二流行漏洞这主要是因为Web站点数据库的依赖性日益增加

    youdao

  • SQL injection is essentially the same problem as the shell meta-character one, but with an SQL interpreter instead of the shell.

    SQL注入本质上shell字符问题相同不过SQL解释器进行解释的,而不是由shell进行解释

    youdao

  • Although this example demonstrates an SQL injection in its simplest form, you can see just how easy it is for an attacker to use.

    尽管简单的形式演示了一个SQL注入,但是可以看出攻击者利用SQL注入有多么容易

    youdao

  • Like the SQL injection attack, you can often easily deal with the threat if you follow best practices to develop secure applications.

    SQL注入攻击类似如果使用最佳实践开发安全应用程序通常可以轻松地处理该威胁

    youdao

  • Many intrusion vulnerabilities such as SQL injection, CSRF, and XSS are preventable using a comprehensive input-validation framework.

    如果使用一个综合的输入验证框架许多输入漏洞SQL注入CSRFXSS都是可以避免的。

    youdao

  • In addition to the overflow exploits, SQL injection is one other type of attack that relies on developer oversight by not testing incoming data.

    除了溢出的利用以外,SQL注入一类依赖开发人员测试输入数据疏漏攻击

    youdao

  • By supporting parameterized statements, you exploit the advanced features provided by these, like access path reuse and SQL injection prevention.

    由于支持参数化语句可以利用这种语句提供高级特性例如访问路径重用SQL注入预防

    youdao

  • Like the last example, the page is ripe for SQL injection attacks because the executed SQL is constructed dynamically from a user-entered value.

    示例一样,此页也会受到SQL Injection攻击因为执行SQL通过用户输入的值动态构造的。

    youdao

  • Max shows in this use case that Flume tackles problems well beyond known vulnerability types (buffer overrun, cross-site scripting and SQL injection).

    Max以此说明Flume能解决的问题不止已知缺陷类型(缓冲区溢出跨站脚本以及SQL注入)。

    youdao

  • Cross-site scripting (XSS) and SQL Injection are considered the weakest points in software, while the buffer overflow comes third, according to cwe.

    根据CWE的列表,跨平台脚本攻击(XSS)SQL注入认为是软件薄弱环节,位于第三位的是缓冲区溢出

    youdao

  • An attacker may use directory traversal and cross-site ccripting during a scan phase and then hit it with an SQL injection or an RFI in the exploit phase.

    扫描阶段攻击者可能利用路径遍历站点脚本;攻击阶段,黑客可能会利用SQL注入远程文件包含进行攻击。

    youdao

  • While not directly related to SQL injection attacks, BestLogin.aspx demonstrates another security best practice: the encryption of connection strings.

    虽然SQL Injection攻击直接相关但是 BestLogin.aspx演示了另一种安全最佳做法:对连接字符串进行加密

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定