If your program is a viewer or editor of data—such as a word processor or an image displayer—that data might be from an attacker, so it's an untrusted input.
如果您的程序是数据的浏览器或者编辑器——比如文字处理器或者图像显示器——那么那些数据有可能来自攻击者,所以那是不可信的输入。
Not all intermediaries are untrusted.
并不是所有中介都不可靠。
Ruthlessly check the untrusted inputs.
严格检查不可信的输入。
You must check all untrusted inputs — but what are they?
您必须检查所有不可信的输入——但是什么是不可信的输入呢?
Don't trust file contents that can be controlled by untrusted users.
不要信任可以被不可信用户控制的文件内容。
If data comes from a network, you should usually treat it as highly untrusted.
如果数据来自于网络,您应该认为它是高度不可信的。
The first line of defense in a secure program is to check every untrusted input.
安全的程序中第一道防线是检查每一个不可信的输入。
In most cases, this network is the Internet, which must be considered untrusted.
在大多数情况下,这个网络即互联网,必须被看作是不可信的。
SSL is used to provide an additional level of security across the untrusted network.
SSL用于在不可信网络中提供附加安全级别。
All messages in transit should be protected from tampering by untrusted intermediaries.
应该防止传输中的所有消息受到不可靠中介的篡改。
Sometimes your program will take data from an untrusted user and give it to another user.
有时候您的程序要从一个不信任的用户处得到数据并把它传给其他的用户。
The untrusted data is preserved for visual appearance in the browser as shown in Figure 5.
不可信的数据被保留下来用于在浏览器中可视查看,如图5所示。
The untrusted data is preserved for visual appearance in the browser as shown in Figure 5.
不可信的数据被保留下来用于在浏览器中可视查看,如图 5 所示。
ODRL can be used within trusted and untrusted systems for both digital and physical assets.
ODRL可用于可信和非可信系统中的数字和实体形式的资源。
It's a good practice to use the as much as possible to confine untrusted external contents.
尽可能多地限制不可信的外部内容是一个良好的实践。
People who feel untrusted have little inclination to bond together into a cooperative team.
感觉不被信任的人很难被纳入一个合作的团队。
All it takes is an application with some dynamically constructed SQL and untrusted user input.
它所利用的只是具有一些动态构造的SQL和不可信用户输入的应用程序。
Another major drawback of JSONP is that it can be quite dangerous if used with untrusted services.
JSONP的另一个主要缺陷是被不信任的服务使用时会很危险。
For example, you would become untrusted if two minutes elapsed without any activity within the bank.
例如,如果在银行您两分钟后仍无任何活动的话,将变成不可信的。
Thus, you need to ruthlessly check data on all input paths into your program from untrusted sources.
因而,您需要对来自于不可信源的输入路径的数据进行严格的检查。
Clearly, you want to consider some sort of security model to limit the loading of untrusted resources.
显然,您需要考虑某种安全模型以限制不可信资源的加载。
Now that we have configured this option and restarted the application, we will try an untrusted OpenIDProvider.
我们已经配置了这个选项,现在重新启动应用程序并尝试使用一个不可信的OpenID提供者。
Untrusted processes do most of the computation. They are constrained by, but possibly unaware of, DIFC controls.
不受信任的进程完成大部分工作,它们受到DIFC控制的约束,且有可能自身并不知道DIFC的存在。
The next step that we need to do is to make sure that our children will not be able to open untrusted web sites.
下一步我们要做的是确保孩子不能打开不信任网站。
The principal security requirement is that untrusted code should not be able to change the logging configuration.
为了保证安全,日志操作需要保证不受信的代码无法修改日志控制配置。
They are all focused with sending change sets across untrusted boundaries, which doesn't make a whole lot of sense.
它们都集中在通过不可信边界发送更改集合,也并没有太大意义。
For example, a trusted program could create a file in such a directory, and an untrusted user could delete and rename.
例如,一个可信任的程序可以在这样一个目录下创建一个文件,而一个不受信任的用户可以删除或者重命名它。
As usual, be cautious when you open attachments from untrusted sources and make sure your antivirus software is up to date.
通常情况下在打开不明来源的附件时要小心谨慎,同时要确保反病毒软件病毒库的更新。
Unfortunately, encoding all untrusted data can be resource intensive and may have a performance impact on some Web servers.
遗憾的是,对所有不可信数据编码是资源密集型的工作,而且可能对某些Web服务器产生性能方面的影响。
You should consider each of these inputs when you're writing your program, and if they are untrusted, carefully filter them.
当您编写程序的时候这些输入每一个都应该考虑,如果它们不可信,一定要谨慎对它们进行过滤。
应用推荐