• 攻击程序使用常见方式之一就是利用这些程序其他程序发出请求的方式。

    And one of the most common ways to attack programs is to exploit how they make requests to other programs.

    youdao

  • 实例一个系统攻击程序。仅供读者学习测试之用,否则后果自负

    This example is to attack a system process. Readers for learning and testing, or else at your peril.

    youdao

  • 如果程序数据浏览器或者编辑器——比如文字处理器或者图像显示器——那么那些数据有可能来自攻击者,所以可信输入

    If your program is a viewer or editor of datasuch as a word processor or an image displayer—that data might be from an attacker, so it's an untrusted input.

    youdao

  • 然后收集到的信息可以用来分配资源识别那些可能恶意用户程序攻击机器

    The information harvested can then be used to allocate resources and identify machines that may be vulnerable to attack by rogue users and programs.

    youdao

  • 使用这种模式可以一个已知网络攻击或者病毒程序沿着网络传播期间暂时地锁定电脑

    Use this mode to temporarily lock down computers during a known network attack or when a malicious program is spreading.

    youdao

  • 由于这个事实所有可执行代码转移包含0地址会使得攻击程序困难了。

    Since that's the case, moving all executable code to addresses with a 0 in it makes attacking the program far more difficult.

    youdao

  • 异常的系统调用序列就是程序漏洞受到攻击的确凿证据。

    An aberrant system call sequence would be a dead giveaway that the program has a bug or is being attacked.

    youdao

  • SQL注入攻击中,程序会创建一个SQL命令其发送给SQL解释器。

    In an SQL injection attack, a program creates an SQL command and sends it to an SQL interpreter.

    youdao

  • 如果不让恶意数据进入程序或者至少不在程序处理,您的程序面对攻击时将更加健壮。

    If you can keep malicious data from entering your program, or at least keep it from being processed, your program becomes much harder to attack.

    youdao

  • 这个程序允许攻击包括可以修改SQL命令意义字符

    The program allows an attacker to include characters that change the meaning of that SQL command.

    youdao

  • 当天工作时间快要结束时候,公司里的用户打开垃圾邮箱里邮件打开了然后程序攻击开始了。

    At the end of the day, a user within that company opened an email. It went into his spam box, he opened it, and that launched the attack.

    youdao

  • 如果攻击程序系统管理员启动的,那么恶意代码作为原始程序一部分进行执行黑客系统中的管理员特权

    If the attacked program was initiated by a system administrator, the malicious code will then run as a part of the original program, giving the attacker administrator privileges on the system.

    youdao

  • 网站访问量收到了绊倒安全机制觉得这个搜索引擎在受到一个垃圾邮件程序攻击

    The volume of searches the site received tripped safety mechanisms and made the search engine think it was under attack from a spambot.

    youdao

  • 问题如果攻击可以控制程序用到底层,那么攻击者就可以控制整个程序

    The problem is that if an attacker can control the underlying libraries used by a program, the attacker can completely control the program.

    youdao

  • 缓冲区溢出攻击实例程序内部溢出,从而改变程序的运行方式。

    In the instance of a buffer overflow attack, an internal value in a program is overflowed to alter how the program runs.

    youdao

  • 缓冲溢出攻击黑客利用程序执行期间存储分配中的特定计算机程序漏洞

    In a buffer overflow attack, the hacker takes advantage of specific type of computer program bug that involves the allocation of storage during program execution.

    youdao

  • 模糊测试中,随机数据(也称做fuzz)攻击一个程序然后等着观察哪里遭到了破坏

    In fuzz testing, you attack a program with random bad data (aka fuzz), then wait to see what breaks.

    youdao

  • 根据veracodeWysopal所说,搜索gets函数——一个臭名昭著不安全字符串操作——可以揭示可能内存溢出攻击程序

    And, searching for the function "gets" — a notoriously insecure string operationcan reveal programs that are likely vulnerable to a memory overflow, said Veracode's Wysopal.

    youdao

  • 同样并非所有黑客都是攻击-许多黑客编写保护程序

    Also, not all hackers are attackersmany hackers write the programs that defend you!

    youdao

  • 最近爆发几起重大数据失窃事件,就是电子邮件数据系统网络应用程序遭受黑客攻击结果

    Yet, most of the major data breaches in recent news have been the result of attacks on Web apps like email and data systems.

    youdao

  • 从根本上讲所有这些方法都能减轻程序接管攻击拒绝服务攻击缓冲区溢出攻击所带来的破坏

    Fundamentally, all these approaches reduce the damage of a buffer overflow attack from a program-takeover attack into a denial-of-service attack.

    youdao

  • 或者FLOSS是否安全因为攻击者获得了更多信息-这会使得进行程序攻击更容易吗?

    Or, will FLOSS be less secure because attackers have more informationmaking it easier to create attacks against the program?

    youdao

  • 动态分析工作方法黑客攻击一个应用程序所使用方法十分相似

    Dynamic analysis works in a way very similar to the one a hacker would employ when attacking an application.

    youdao

  • 不如永久地去除特权好,因为如果攻击可以控制程序攻击者就可以重新启用特权利用

    This isn't as good as permanently dropping the privilege, since if an attacker can take control of your program, the attacker can re-enable the privilege and exploit it.

    youdao

  • 这样做可使SQL更加易于维护可使应用程序免受SQL注入攻击

    Doing so makes the SQL easier to maintain and secures your application from SQL injection attacks.

    youdao

  • 记住内部应用程序总是可以利用外部攻击方法进行攻击

    Keep in mind that internal applications can always take advantage of external methods of attack as well.

    youdao

  • 测试额外安全性攻击问题例如所部署应用程序上会间接伤害数据中心其他应用程序恶意攻击

    Testing for additional security and vulnerability issues; for example, malicious attacks on a deployed application that can indirectly harm other applications in the data center.

    youdao

  • 然而研究人员往往可以研究语言恶意软件程序特点,获悉攻击国籍线索

    However, researchers can often learn clues about the attackers' country of origin by studying the language and other signs in the malicious software's programming.

    youdao

  • 黑客的目的就是利用自动攻击寻找应用程序中的漏洞进而破解应用程序,将数据直接转移自己手中

    The goal for hackers is to break applications with automated attacks searching for vulnerabilities until the apps crack and spill data straight into the hands of the hackers.

    youdao

  • 黑客的目的就是利用自动攻击寻找应用程序中的漏洞进而破解应用程序,将数据直接转移自己手中

    The goal for hackers is to break applications with automated attacks searching for vulnerabilities until the apps crack and spill data straight into the hands of the hackers.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定