• There are other ways that malicious users can exploit script.

    恶意用户可以使用其他方法来利用脚本。

    youdao

  • One reason for their being afraid of making a name is that malicious people will become jealous.

    其中的原因就是他们害怕居心不轨产生嫉妒之心。

    youdao

  • Also, please note that malicious programming can also violate certain security and reliability features of the JVM.

    同样需要注意是,恶意程序设计可能会违反JVM的某些安全性可靠性特征

    youdao

  • Be sure to think outside the box and consider any tools that malicious users may employ to penetrate your security.

    确保摆脱思维束缚,考虑恶意用户可能采用渗透安全层的任何工具

    youdao

  • NET Web pages automatically validate that malicious users are not attempting to send script to your application.

    NET网页将自动验证恶意用户没有尝试脚本发送给应用程序

    youdao

  • In the introduction of the article, the author indicates that malicious prosecution appears together with civil litigation.

    本文引言部分,笔者指出恶意诉讼民事诉讼相伴而生。

    youdao

  • If you open a malicious web page, the browser's sandbox prevents that malicious code from leaving the browser and installing itself to your hard drive.

    就算打开一个恶意网页浏览器沙箱也会阻止恶意代码安装硬盘上。

    youdao

  • Replacement operators ensure that malicious scripts can't append SQL into queries to override the existing code and get access to data that they shouldn't see.

    替换操作符确保恶意脚本不能SQL附加查询覆盖现有代码访问它们应该看到的数据

    youdao

  • The results show that malicious code using obfuscating transformation can be free of most of malicious code detecting tools who adopt the misuse intrusion detection.

    测试结果表明经过模糊变换恶意代码能够逃避大部分基于误用检测恶意代码对抗工具

    youdao

  • The security researcher also stressed that dealing with easily searchable repositories might take time and that malicious researchers might temporarily get a leg up on developers.

    这位安全研究者强调处理搜索的代码需要时间恶意研究者可能暂时开发者前列

    youdao

  • That might merely have been malicious gossip.

    可能只是恶意闲言

    《柯林斯英汉双解大词典》

  • If I accept a malicious piece of code that wreaks havoc on my computer, whose fault is it?

    如果接受了一段恶意代码,其破坏计算机那又是谁的呢?

    youdao

  • That means more potential victims of malware—as in malicious softwareand more customers for the security companies that protect against it.

    意味着潜在更大智能手机恶意软件威胁智能手机病毒软件市场。

    youdao

  • The same techniques allow Microsoft to find malicious code that may have been injected in its products.

    同样技术使得微软发现注入产品恶意代码

    youdao

  • The authors also consider server retaliation, whereby a server that detects a malicious client could send the client any sort of response, including malicious content.

    作者考虑到服务器反馈,由此检测到一个恶意客户端的服务器可以发送给客户任意种类响应信息,包括恶意的内容

    youdao

  • In other words, in spite of the fact that the women realized malicious gossip wasn't socially appropriate, this was nevertheless their preferred first point of attack.

    就是说,虽然妇女意识到恶毒闲话适应社会性仍然她们首选攻击点。

    youdao

  • Usually, these files look legit when opened so it is quite easy to fall prey and not even notice that something malicious ran in the background.

    通常这些文件看起来没有什么问题,打开之后会毫无通知的情况在后台运行恶意软件

    youdao

  • Yes, it seems that to get the malicious code working, a user would still need to be surfing with IE.

    是的似乎如果恶意代码生效,用户还是使用IE浏览器

    youdao

  • It should address mitigating risks of SaaS applications that are vulnerable to an attack by a malware application that allocates malicious instance resources.

    黑客可能通过分配恶意实例资源的恶意软件攻击SaaS应用程序,策略应该降低这种风险

    youdao

  • But it shows that a malicious programmer can cause a lot of harm quite easily.

    但是显示一个恶意程序员可以容易导致许多损害

    youdao

  • The class loader has a fairly tight security manager in place that restricts malicious calls.

    加载器一个十分严格安全管理器限制恶意调用

    youdao

  • What happens if the malicious party claims that it has received the signed message from the sender?

    如果恶意声称发送方收到签名的消息的话,会发生什么情况呢?

    youdao

  • Although I understand there is curiosity, the many false, unfounded and malicious rumors that are currently circulating about my family and me are irresponsible.

    知道肯定有人感到好奇,但现在风传的有关家人很多不实、没有根据恶意传闻都是不负责任的。

    youdao

  • The first step is to identify critical system assetsintangible or tangiblethat are vulnerable to malicious attacks.

    一步确定易遭到恶意攻击的关键系统资产——无形或者有形

    youdao

  • She found that these patients did not get upset with people who had malicious intentions that didn't go as planned.

    发现这些病人对于那些恶毒动机但没实施成功的案例并没有感到不安。

    youdao

  • She found that these patients did not get upset with people who had malicious intentions that didn't go as planned.

    发现这些病人对于那些恶毒动机但没实施成功的案例并没有感到不安。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定