用户在给出信息时应该进行良好的判断,并且接受可能的网页仿冒方式以及一些社会工程攻击的培训。
Users need to use good judgement when giving out information, and be educated about possible phishing schemes and other social engineering attacks.
SQLInjection攻击的基本原理如下:您创建一个网页,允许用户向文本框中输入文本,用于对数据库执行查询。
The basic idea behind a SQL injection attack is this: you create a Web page that allows the user to enter text into a textbox that will be used to execute a query against a database.
处理网页威胁的安全系统没有切入到SCADA系统,这给黑客攻击留下了漏洞。
Security systems to deal with Web threats have been bolted on rather than incorporated into SCADA systems, leaving holes that hackers can penetrate.
当他修改email地址之后,他会去一个忘记密码网页,可能一个新的密码就会被发送到攻击者的电子邮箱里了。
After he changed it, he will go to the forgotten-password page and the (possibly new) password will be mailed to the attacker's E-mail address.
更加严重的是,Twitter在被黑客攻击窃取走部分网页上的文件后,最近正遭受一系列信息泄漏事件。
More seriously, Twitter recently suffered a series of leaks after hackers accessed documents stored on the web.
用户不需要做任何事情,才会受到感染;仅仅渲染一个网页网页感染任何可以发动僵尸网络攻击。
Users do not have to do anything to become infected; simply rendering a Web page can launch a botnet exploit.
下列哪一种方法,以抵御拒绝服务攻击,在受害者的网页?
Which of the following is a method to defend against denial of service attacks at the victim's website?
分布式拒绝服务攻击并没有用来侵入后台数据库,这一攻击多用来阻止用户正常进入某些网页,或者阻止一些功能性服务的正常使用。
Although distributed denial of service attacks do not harm a database, they are generally carried out to prevent people having access to an Internet site or to prevent a service from functioning.
如今网络黑客窃取数据的花样很多:非法接入、木马攻击、IP欺骗、网页仿冒、僵尸网络、网络嗅探、网址嫁接等。
Now the network hackers to steal data many tricks: illegal access, Trojan attacks, phishing, spoofing, IP Botnet, network sniffer, pharming etc...
去年一年,由于遭到黑客攻击,导致该神社网页瘫痪了5次。
The past year due to hacker attacks there have been 5 total blocks of the site.
这个安全漏洞似乎影响到所有咨询网页,可以使用个人发布的恶意软件,进行钓鱼或各种不同的恶意攻击。
The flaw seems to affect all advisory pages and can be used by ill-intentioned individuals to distribute malware, launch phishing campaigns, or instrument various malicious attacks.
他说:“我们在网页上的受攻击面实在太大了。”
"The number of attack surfaces we have on a Web page is just enormous," he says.
入侵者并非是通过Google的安全漏洞进行攻击,而极有可能是通过在用户的电脑内植入钓鱼网页或是恶意软件来达到目的。
These accounts have not been accessed through any security breach at Google, but most likely via phishing scams or malware placed on the users computers.
入侵者并非是通过Google的安全漏洞进行攻击,而极有可能是通过在用户的电脑内植入钓鱼网页或是恶意软件来达到目的。
These accounts have not been accessed through any security breach at Google, but most likely via phishing scams or malware placed on the users computers.
应用推荐