• SQL injection attacks are a vulnerability that tend to hurt high-value sites.

    SQL注入攻击一个可能损害高价值站点的漏洞

    youdao

  • SQL injection attacks can also be used to change data or damage the database.

    SQL Injection攻击用于更改数据损坏数据库

    youdao

  • Automatically escapes data saved to the database (to prevent SQL injection attacks).

    避免数据自动存入数据库(阻止SQL注入式攻击)。

    youdao

  • Doing so makes the SQL easier to maintain and secures your application from SQL injection attacks.

    这样做可使SQL更加易于维护可使应用程序免受SQL注入攻击。

    youdao

  • There simply is nothing to subvert, so the application is be largely immune to SQL injection attacks.

    将无法被破坏,系统应用免疫SQL注射攻击

    youdao

  • Editable Data Validation - HDIV analyzes all editable fields to remove cross-site scripting and SQL injection attacks.

    编辑数据验证——为了去除跨站点脚本SQL注入攻击HDIV分析所有的可编辑数据域

    youdao

  • Forever, many hackers attack means, such as phishing and SQL injection attacks, start from the identity authentication.

    目前的很多黑客攻击手段钓鱼攻击、SQL注入攻击等各种网络攻击方式都是身份认证开始的。

    youdao

  • Like the last example, the page is ripe for SQL injection attacks because the executed SQL is constructed dynamically from a user-entered value.

    示例一样,此页也会受到SQL Injection攻击因为执行SQL通过用户输入的值动态构造的。

    youdao

  • The characteristics of SQL injection attacks is widespread, covert means, characteristics, methods and tools nonenumerative attack civilians.

    SQL注入攻击具有广泛存在手段隐蔽特征不可枚举、攻击手段工具平民化特征。

    youdao

  • While not directly related to SQL injection attacks, BestLogin.aspx demonstrates another security best practice: the encryption of connection strings.

    虽然SQL Injection攻击直接相关但是 BestLogin.aspx演示了另一种安全最佳做法:对连接字符串进行加密

    youdao

  • Blind SQL injection attacks are a well know and recognized form of code injection attack, but there are many other forms, some not so well documented or understood.

    SQL攻击一种为人熟知代码注入攻击形式但是很多其他形式有些尚未得到很好的记载和了解。

    youdao

  • If a less-than-careful developer entered the text from Listing 5 (in the hopes of embedding the values directly), the call would be exposed to SQL injection attacks.

    如果粗心大意的开发人员输入清单5中的文本(以便直接嵌入),这个调用面临SQL注入攻击的风险。

    youdao

  • SQL injection attacks are a serious concern for application developers as they can be used to break into supposedly secure systems and steal, alter, or destroy data.

    SQL Injection攻击应用程序开发人员紧密相关,因为它们用于侵入据推测是安全系统窃取更改销毁数据。

    youdao

  • Using parameterized commands helps guard against SQL injection attacks, in which an attacker "injects" a command into a SQL statement that compromises security on the server.

    使用参数化命令有助于防范SQL投射攻击此类攻击中,攻击者会「投射命令 SQL陈述式中伺服器的安全性造成危害

    youdao

  • Most developers have heard of a good example of an anti-pattern: The improper use of Structured Query Language (SQL) libraries that result in SQL injection attacks on Web sites.

    大多数开发人员听说关于反模式一个很好的例子结构化查询语言Structured Query Language,SQL)的错误使用导致Web 站点受到 SQL注入攻击

    youdao

  • This attack functions almost exactly like the blind SQL injection attack but, unlike SQL injection attacks, few people know about XPath injection attacks or take precautions against them.

    这种攻击运作SQL攻击几乎完全相似,SQL注入攻击不同的是,几乎没什么了解XPath盲注攻击其进行预防。

    youdao

  • This new edition of DB2 on Rails adds an extra layer of security, thanks to the fact that these "safe" calls are translated into parameterized queries, which are immune to SQL Injection attacks.

    DB 2on Rails这个版本添加了额外安全性,这要归功于这样一个事实这些安全调用转换参数查询参数化查询SQL注入攻击免疫

    youdao

  • Protection against more elaborate attacks such as SQL injection and Dictionary attacks require more customized configuration, such as user-defined dictionaries containing allowable syntax.

    保护免受复杂的攻击(SQL注入字典攻击)需要更多定义的配置用户自定义字典允许语法

    youdao

  • The code in Figure 5 employs parameterized SQL to stop injection attacks.

    5中的代码使用参数化s QL阻止Injection攻击

    youdao

  • In the malicious attack statement, two kinds of attacks, SQL injection and middleware channel multiplexing, are hard and heavy.

    恶意攻击语句中,SQL注入中间件通道复用攻击中难,同时也是中重。

    youdao

  • There are hidden dangers of information security in the process of network communication in smart cities, such as Trojans, denial of service attacks, spoofing attacks, SQL injection and worms.

    智慧城市网络通信过程存在信息安全隐患,主要有木马程序拒绝服务攻击欺骗攻击、SQL注入蠕虫病毒

    youdao

  • It includes all the currently known information about these attacks and significant insight from its contributing team of SQL injection experts.

    包括所有目前已知这些攻击SQL注入有贡献专家团队重大洞察力信息

    youdao

  • It includes all the currently known information about these attacks and significant insight from its contributing team of SQL injection experts.

    包括所有目前已知这些攻击SQL注入有贡献专家团队重大洞察力信息

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定