To exploit the security hole, hackers must trick users into visiting a Web site loaded with malicious code, Microsoft said.
微软说,为了利用这个安全漏洞,黑客必须欺骗用户访问一个装载了恶意代码的网站。
Yet some of the best hackers I know are night-owls. They hack away their code and leave the rest to management.
虽然我知道有许多最好的黑客们都是夜猫子,他们只管他们的代码,将剩余的事情留给管理层。
Software is the same: complex code creates more opportunities for hackers and attackers.
软件也是一样的道理:复杂的代码会给黑客或攻击者创造更多的机会。
This aptly named tool is essentially a patch to the kernel code that lets hackers access kernel memory and data structures.
这个恰如其名的工具实质上是内核代码的补丁,它允许高手访问内核内存和数据结构。
Over the years, dissatisfied hackers have created alternate ways to bridge this gap between Web servers and application code.
这些年来,不满的黑客已经创造了多种替代方式来在Web服务器和应用程序代码之间架起桥梁。
According to the MediaWiki guide for hackers, the code base is "large and ugly."
根据MediaWiki黑客指南,代码库“既庞大又不美观”。
At the MIT lab, he and other hackers were allowed to modify code on printers so that they sent convenient alert messages.
在麻省的实验室,他和其他的黑客可以改动打印机上的密码,这样他们就可以很方便的相互发送提示信息。
Port probing by hackers is usually an attempt to execute malicious code on a server or to take control of the server by looking for vulnerable ports.
黑客进行的端口探测通常是尝试在服务器上执行恶意代码或者通过寻找易攻击的端口来控制服务器。
The hackers copied and removed mainly intellectual property, including hardware designs and software code.
黑客拷贝和移走的主要是知识产权,包括硬件设计和软件代码。
Thanks to a bit of sloppy code, it also could have let hackers access the banking information for 118,000 customers who downloaded the app.
但其中一些写的“稀松”的代码,使得118 000个该软件用户的银行信息直接暴露给了黑客们。
Thanks to a bit of sloppy code, it also could have let hackers access the banking information for 118, 000 customers who downloaded the app.
但其中一些写的“稀松”的代码,使得118,000个该软件用户的银行信息直接暴露给了黑客们。
This can lead to an insecure system, as hackers may be able to write code to call the EJB directly and bypass the Web tier.
这可能导致系统不安全,因为黑客可以编写代码来直接调用EJB,而得以绕过web层。
By reading this Code, hackers can recognize themselves and each other, and understand better the group they are a part of. This will be beneficial to all hackers.
了解了这些准则,黑客们能够赏识自己或相互赏识,并相当明白他们是这个团体的一部分。这会让所有的黑客受益。
By reading this Code, hackers can recognize themselves and each other, and understand better the group they are a part of. This will be beneficial to all hackers.
了解了这些准则,黑客们能够赏识自己或相互赏识,并理解他们所在的团体。这会让所有的黑客受益。
Microsoft acknowledged Friday that hackers had accessed source code to programs in development, but company representatives said the intruders did not see code for existing products.
微软公司周五承认,计算机骇客已经取得该公司开发中程序之来源密码。但该公司的代表们表示,侵入者并未看到现有产品的密码。
It has also been suggested that the hackers responsible originally put the code up for sale.
也有人认为,最初的黑客负责出售该守则。
It has also been suggested that the hackers responsible originally put the code up for sale.
也有人认为,最初的黑客负责出售该守则。
应用推荐