A secure authentication protocol can resist the cheat of malicious attacker to communication network and guarantee the security of network.
一个安全的认证协议能有效抵御恶意的攻击者对通信网进行的欺诈,保证通信网的安全运行。
Malicious business access is a malicious attacker to build an abnormal SQL statement, which we define as the destruction of the behavior of the model.
而恶意的业务访问是恶意攻击者构建非正常的SQL语句,我们把它定义为破坏模态化的行为。
A malicious attacker can make use of this behavior and launch a remote denial-of-service attack against a vulnerable network service over the Internet.
恶意攻击者可以利用这一点,通过Internet对网络服务发动远程拒绝服务攻击。
Software tamper resistance is the art of crafting a program such that it cannot be modified by a potentially malicious attacker without the attack being detected.
介绍软件抗篡改是编写程序的艺术,使代码在没有攻击检测的情况下,不会被潜在的有恶意的攻击代码所修改。
A malicious attacker can still sniff the wire (note that password digest is not encrypted by default) and replay the entire UsernameToken, so nonce and timestamp checking are imperative.
恶意攻击者仍可以探查连接(请注意,缺省情况下密码摘要没有被加密)并回复整个UsernameToken,因此nonce和时间戳检查是缺一不可的。
The attacker injects his malicious inputs to the SQL statement to change the query's logic.
攻击者将其恶意输入注入到sql语句中,以修改查询语句的逻辑。
If the attacked program was initiated by a system administrator, the malicious code will then run as a part of the original program, giving the attacker administrator privileges on the system.
如果受攻击的程序是由系统管理员启动的,那么恶意代码将作为原始程序的一部分进行执行,给黑客系统中的管理员特权。
Often the attacker will overrun the buffer with the malicious code the attacker wants to run, and the attacker will then change the return value to point to the malicious code they've sent.
通常攻击者会使用它想要运行的恶意代码来使缓冲区溢出,然后攻击者会更改返回值以指向它们已发送的恶意代码。
Data can be stored in the session with no direct way for a malicious user to alter it. (Bugs in your code may still give an attacker an opening, of course.)
数据可以存储在会话中,恶意用户无法直接修改它(当然,代码中的bug仍然可能产生安全漏洞)。
Cookie theft occurs when the the cookie issued by the application is hijacked for malicious purposes by an attacker.
当应用程序发出的cookie遭到恶意劫持时,就会发生cookie窃取。
If an attacker can embed malicious commands in these parameters, the external system may execute those commands on behalf of the... application.
如果攻击者可以在这些参数中嵌入恶意的命令,那么外部系统就可能以应用程序的名义执行这些命令。
In this scenario, the user unknowingly executes scripts written by an attacker when they follow a malicious link in a mail message.
在本方案中,当用户执行邮件消息中的恶意链接时,就会不知不觉地执行攻击者编写的脚本。
Let us assume an attacker succeeded in filling a page containing malicious script to the Web site for the subscribed members.
让我们假设攻击者成功地将一个包含恶意脚本的页面填入到订阅成员使用的网站上。
Now, an attacker would need to find somewhere to input a malicious script.
现在,攻击者需要找到某个地方来输入恶意脚本。
An attacker can connect users to a malicious server of the attacker's choice.
攻击者可以将用户连接到攻击者选择的恶意服务器上。
When an attacker introduces a malicious script to a dynamic form submitted by the user, a cross-site scripting (XSS) attack then occurs.
当攻击者向用户提交的动态表单引入恶意脚本时,就会产生跨站点脚本(XSS)攻击。
If the application has XSS holes, the attacker may send a malicious script that can still be executed by the application and lead to XSS intrusions.
如果应用程序有xss漏洞,攻击者就可能会发送能被应用程序执行的恶意脚本,导致XSS侵入。
The malicious script introduced by the attacker is executed by the browser and the data is passed to the hacker's Web site.
于是浏览器会执行攻击者引入的恶意代码,数据将被传递到黑客的网站。
Users can unknowingly execute malicious scripts when viewing dynamically generated pages based on content provided by an attacker.
当用户查看基于攻击者提供的内容而动态生成的页面时,他们会不知不觉地执行恶意脚本。
If a malicious user can overwrite the buffer, then the value of the flag can be changed, thus providing the attacker with illegal access to private files.
如果有不怀好意的使用者覆写缓冲区,则会变更标志的值,从而指出攻击者是非法存取专用文件。
If the attacker is able to fill in just enough space with dummy data (i.e., NOPs) and then add a bit of malicious code or a value, the program will execute the malicious code or use that new value.
如果黑客能够用伪数据(也就是,NOP)填充足够的空间,然后添加一点恶意代码或值,那么程序将执行恶意代码或使用新值。
The term attacker can be used to describe a malicious hacker.
词汇攻击者可用来描述恶意黑客。
An attacker could set the PATH environment variable to change where saposcol looked for other programs, and then create a malicious "expand" program for saposcol to run.
攻击者可以通过设置PATH环境变量来改变saposcol寻找其他程序的位置,然后为saposcol创建一个恶意的“扩展”程序来运行。
The attacker needs to force the client to access the malicious link. This can happen in these ways.
黑客需要强迫客户端访问恶意链接。
An attacker could present a removable drive to the user with a malicious shortcut file, and an associated malicious binary.
攻击者可以提交一个恶意的快捷方式文件到用户的可移动驱动器,和一个关联的恶意的二进制文件。
Backdoor compromises system integrity by making changes to the system that allow it to by used by the attacker for malicious purposes unknown to the user.
一个后门妥协系统的完整性,使更改的系统,允许它的使用的恶意攻击者的目的不明给用户。
Usually the attacker will encode the malicious portion of the link to the site in HEX (or other encoding methods) so the request is less suspicious looking to the user when clicked on.
通常攻击者会把链接中的恶意内容编码成HEX(或其他编码方法),所以减少了用户点击时的怀疑。
A Backdoor compromises system integrity by making changes to the system that allow it to by used by the attacker for malicious purposes unknown to the user.
一个完整的系统后门妥协改变,允许它的系统使用了攻击对于恶意用途不明的用户。
The vulnerability could allow an attacker to cause a victim to run malicious scripts when visiting various Web sites, resulting in information disclosure.
用户浏览诸多网站时,该漏洞可导致允许来袭者运行恶意脚本,进而导致信息泄露。
The vulnerability could allow an attacker to cause a victim to run malicious scripts when visiting various Web sites, resulting in information disclosure.
用户浏览诸多网站时,该漏洞可导致允许来袭者运行恶意脚本,进而导致信息泄露。
应用推荐