警方至今未能追捕到攻击者。
响亮的声音通常可以让攻击者冷静下来。
在这样的时候,可能隐藏着攻击者。
这两兄弟并肩战斗,反对攻击者。
这意味着攻击者本质上能够在一个操作中完成整个攻击!
That means the attacker can set up the entire attack in essentially one operation!
这种“帮助”也可以帮助攻击者创建用于误导程序的数据。
This "help" can also aid an attacker to create data to mislead the program.
因为这些函数让攻击者很容易就可以判断出密钥。
如果攻击者可以影响所返回的数据,就需要小心。
Be careful if an attacker could influence the data that's returned.
攻击者找到漏洞的速度比你想想的快多了。
An attacker can discover vulnerabilities much faster than you think!
这样可以让攻击者控制内部数据,甚至控制整个程序。
That will let the attacker control internal data and possibly take over the program.
现在,攻击者需要找到某个地方来输入恶意脚本。
Now, an attacker would need to find somewhere to input a malicious script.
第一种方案研究的是攻击者是心怀不满的雇员的情况。
The first scenario looks at a situation in which a disgruntled employee is the attacker.
这个信息不会给攻击者提供详细的内容。
他们做起来并不象内部攻击者那样容易。
最糟糕的是,攻击者的身份仍是一个迷。
Worst of all, the identity of the attacker may remain a mystery.
有时私人攻击者并不是为了访问信息。
Sometimes privacy attackers do not seek access to underlying information.
还有一点很清楚,攻击者实际上并不需要源代码。
It's also clear that attackers don't really need source code.
攻击者需要多少的努力与知识?
有时,攻击者隐匿在普通互联网通讯中,试图慢慢窃取信息。
Sometimes attackers try to slip information out slowly, hidden in ordinary Internet traffic.
其结果是,转帐的金额将被存入攻击者的帐户中。
As a result, the transferred money will be deposited into the attacker's account.
目前还不清楚攻击者得到哪些信息。
It was unclear what information the attackers were able to access.
攻击者接下来将密码重新设置为特定的值。
The attacker then asks for the password to be reset to a specific value.
如果您不控制,攻击者就会来控制。
让攻击者知道你有所准备。
现在假设攻击者发送了超过buffer 1所能处理的数据。
Now imagine that an attacker has sent more data than buffer1 can handle.
攻击者的另一个词汇是黑帽(black hat)。
然而,攻击者也可以通过修改email地址来接管帐户。
However, the attacker may also take over the account by changing the E-mail address.
让他们击退任何地面攻击者就把注意力转向了Virophage。
Let them fight off any ground attackers then turn their attention to the Virophage.
要问的问题是攻击者可以控制变量filename的值吗?
The question to ask is can an attacker control the value of the variable filename?
他打了那个攻击者一耳光。
应用推荐