In your case you will open other page and will let know to attacker the username.
在你的情况下,你将打开其他页面,让知道攻击者的用户名。
The police have so far failed to track down the attacker.
警方至今未能追捕到攻击者。
The attacker may have been waiting around for an opportunity to strike.
袭击者可能一直在等待着一个下手的机会。
The attacker then tried to throttle her with wire.
那名袭击者然后试图用电线勒死她。
He tried to use his own weight to push his attacker off but he was off balance.
他试图利用自己的重量推开袭击者,但他失去了平衡。
It was inconceivable to me that Toby could have been my attacker.
托比竟会是袭击我的人,这对我来说简直是匪夷所思。
She was able to identify her attacker.
她认出了袭击她的人。
He finally managed to break free from his attacker.
他终于设法摆脱了袭击他的人。
She was barely able to stammer out a description of her attacker.
她只能勉强结结巴巴地说一说袭击她的人是什么模样。
The drawing is said to be a good likeness of the girl's attacker.
据说那幅画像很像袭击那个女孩的歹徒。
Her loud scream scared the attacker and people came to help.
她的尖叫声把袭击者吓了一跳,人们赶来帮忙。
The particular design of muscles and bones in the neck and limbs of the turtle allow that it can draw in its exposed parts such that an attacker can find nothing but hard shell to bite.
海龟颈部和四肢的肌肉及骨骼的特殊设计使它能把暴露在外的部分缩回去,这样攻击者只能去咬坚硬的外壳。
Luckily, Zhang had just learned how to escape from an attacker, a person who plans to hurt someone.
幸运的是,张刚学会了如何从计划伤害他人的袭击者手中逃脱。
If an attacker can cause a buffer to overflow, then the attacker can control other values in the program.
如果攻击者能够导致缓冲区溢出,那么它就能控制程序中的其他值。
To make an attack, the attacker needs to buy several SSL certificates from CAs who sign certificates with the MD5 algorithm.
要实现攻击,攻击者需要先从使用MD 5算法签署证书的CA购买若干ssl证书。
The driver pulled over and passengers fled from the bus, bracing the door to keep the attacker inside.
司机将车停在一边,其余乘客逃离巴士,将袭击者堵在车里。
Bodyguards can use one or two blows to stop an attacker.
保镖要有能力通过三拳两脚就能阻止袭击者”,北京VSS保安咨询公司总裁迈克尔-翟说。
Essentially, if you allow an attacker to run code on such a machine through any means, the attacker can completely take over the machine.
从本质上说,如果您允许攻击者在这样的机器上以任何方式运行代码,则攻击者完全可以接管该机器。
Although this example demonstrates an SQL injection in its simplest form, you can see just how easy it is for an attacker to use.
尽管本例以最简单的形式演示了一个SQL注入,但是您可以看出攻击者利用SQL注入有多么容易。
Social Engineering is the tricking of an unsuspecting administrator into giving the account ID and passwords over to an attacker.
社交工程是哄骗一个毫无疑虑的管理员向攻击者说出帐户标识和密码的欺骗方法。
Often, it's best to check in both places; that way, if an attacker manages to slip around one defense, they'll still encounter the other.
通常,最好在这两处都对其进行检查;这样,即使一个攻击者成功地突破了一道防线,他们还会遇到另一条。
When attacked from the side, the crickets stridulated and tried to bite their attacker.
当从侧边进攻时,蟋蟀会发出鸣叫声,并且试图去咬进攻者。
But that attack was rare in another way: It was easy enough to identify the attacker.
但是,这次袭击从另一方面来看却是极为少见的:袭击者很轻易地就被发现。
This "help" can also aid an attacker to create data to mislead the program.
这种“帮助”也可以帮助攻击者创建用于误导程序的数据。
They make it easy for an attacker to determine the key.
因为这些函数让攻击者很容易就可以判断出密钥。
Often the attacker will overrun the buffer with the malicious code the attacker wants to run, and the attacker will then change the return value to point to the malicious code they've sent.
通常攻击者会使用它想要运行的恶意代码来使缓冲区溢出,然后攻击者会更改返回值以指向它们已发送的恶意代码。
This attack USES password cracking to penetrate the systems that the attacker wants to deface.
这一攻击使用密码破解来渗透攻击者想破坏的系统。
Attacking using a buffer overflow can change this process and allow an attacker to execute any function they wish.
利用缓冲区溢出进行攻击可以改变这个过程,并且允许黑客执行任何他们期望的函数。
Think in terms of the assets you're trying to protect and what an attacker might want to do to them.
根据您正设法保护的资产以及攻击者可能会如何处理这些资产来考虑安全性。
Think in terms of the assets you're trying to protect and what an attacker might want to do to them.
根据您正设法保护的资产以及攻击者可能会如何处理这些资产来考虑安全性。
应用推荐