• However this mode should not be used in live deployment as it could give an attacker a lot of information about the services that you export.

    但是模式导出服务许多信息都暴露攻击者,真正部署的时候应该避免使用这种模式。

    youdao

  • Once so compromised, a computer can surreptitiously download other code that can log a victim's key strokes, giving an attacker a path to potentially wide network access.

    一旦入侵成功,电脑能够暗中下载其它代码这些代码记录入侵电脑数据,这将给攻击者潜在宽广网络进入权

    youdao

  • The attacker knocked on their door and made a lunge for Wendy when she answered.

    袭击者他们温迪开门,向猛冲过去。

    《柯林斯英汉双解大词典》

  • The attacker threatened them with a gun.

    袭击者威胁他们

    《牛津词典》

  • If your program is a viewer or editor of datasuch as a word processor or an image displayer—that data might be from an attacker, so it's an untrusted input.

    如果程序数据浏览器或者编辑器——比如文字处理器或者图像显示器——那么那些数据有可能来自攻击者,所以可信的输入。

    youdao

  • Luckily, Zhang had just learned how to escape from an attacker, a person who plans to hurt someone.

    运的是,张刚学会了如何从计划伤害他人的袭击者手中逃脱。

    youdao

  • A creative attacker can take advantage of a buffer overflow vulnerability through stack-smashing and then run arbitrary code (anything at all).

    创造力的攻击者透过摧毁堆叠利用缓冲区溢位弱点然后执行任何程序码。

    youdao

  • The attacker then calls a customer service representative at the site, posing as the shopper and providing personal information.

    攻击者接下来网站调用客户服务作为购物者登录并且提供个人信息。

    youdao

  • The sophisticated attacker finds a weakness in a similar type of software, and tries to use that to exploit the system.

    富有经验的攻击者可以发现同类软件缺点并且尝试利用这些弱点进入系统

    youdao

  • A common scenario is that the attacker calls the shopper, pretending to be a representative from a site visited, and extracts information.

    一个常见场景攻击者打电话购物者假装购物者所访问站点代表并且提取信息。

    youdao

  • The attacker then sends a packet full of SACK options designed to force the other host to scan that entire queue to process each option.

    然后攻击者发送充满SACK选项目的是使方主机扫描整个队列处理每个选项

    youdao

  • But missile attacks on ships are rare, so it is difficult to know just how safe a ship really is-especially if an attacker launches a dozen or so missiles at once.

    舰船受到导弹攻击的案例非常因此很难判断条战舰躲过导弹攻击的劫数多大,特别是在攻击者一次发射多枚导弹的情况下。

    youdao

  • To accomplish this, the attacker sends a TCP packet with the SYN flag set to the target host, just like when opening a regular TCP connection.

    实现一点,攻击者目标主机发送设置了SYN标志tcp打开常规tCP连接一样。

    youdao

  • Determining the identity of the attacker was a matter of narrowing down the line of potential suspects.

    确定攻击者身份需要逐渐缩小一连串嫌疑人的范围。

    youdao

  • Women were cooking dinner, men were praying and children were playing nearby when the attacker struck, a witness said.

    妇女烹饪晚餐男子祈祷孩子附近攻击者击中一位目击者说。

    youdao

  • Because the percent sign (%) itself can be URL encoded, an attacker can submit a carefully crafted request to a server that is basically double-encoded.

    由于百分号(%)本身可以URL编码的,所以攻击者可以服务器提交一个精心制作的、基本上双重编码请求

    youdao

  • To log into the Web site, the attacker first enters a test user ID (" test ") and password (" test ").

    要想登录这个站点攻击者首先要输入一个测试用户ID (“test ”)密码(“ test ”)。

    youdao

  • Essentially, if you allow an attacker to run code on such a machine through any means, the attacker can completely take over the machine.

    从本质上说如果允许攻击这样机器任何方式运行代码,则攻击者完全可以接管机器。

    youdao

  • But once an attacker can run code on such a machine, the attacker instantly attains complete control.

    但是一旦攻击可以这样机器上运行代码,就可以立即获取完全控制

    youdao

  • Even if an attacker broke into a game program, all he could do would be to change the score files.

    即使攻击者攻击并进入一个游戏程序所有的事情修改分数文件。

    youdao

  • If this occurred, the sequence Numbers would definitely be different than what we expected. This also protects us from an attacker dropping a message.

    如果这么干,序列号一定我们所期待的不一样保护了我们不受攻击者们扔消息的攻击。

    youdao

  • If an attacker can cause a buffer to overflow, then the attacker can control other values in the program.

    如果攻击能够导致缓冲区溢出那么它就控制程序中的其他

    youdao

  • Let us assume an attacker succeeded in filling a page containing malicious script to the Web site for the subscribed members.

    我们假设攻击成功地一个包含恶意脚本页面入到订阅成员使用的网站上。

    youdao

  • The problem is that if an attacker can control the underlying libraries used by a program, the attacker can completely control the program.

    问题如果攻击可以控制程序用到底层,那么攻击者就可以控制整个程序。

    youdao

  • By splitting systems apart like this, you avoid the probability (or at least lessen the risk) of an attacker breaching a server and getting access to data or even internal systems.

    通过以这种方式分开系统,就可以避免(至少降低风险)攻击进入服务器,然后访问数据内部系统。

    youdao

  • The attacker, a veteran systems administrator, has a problem with her job and takes it out on the systems she is trusted to administer, manage, and protect.

    攻击者名经验丰富系统管理员工作中遇到问题自己管理、保护系统发泄

    youdao

  • In most cases, if you create a list of "illegal" characters, an attacker will find a way to exploit your program.

    绝大多数情况下如果创建了一个非法字符列表攻击者还是可以找到利用的程序的方法

    youdao

  • If a system authenticates based solely on fingerprints, an attacker could reasonably construct a fake hand after carefully gathering fingerprints of an authorized user of the system.

    如果系统认证基于指纹,则攻击可以仔细搜集系统已认证用户指纹后适当地构造只假手

    youdao

  • The second step is to identify vulnerabilities that a hacker or attacker could maliciously exploit.

    第二确定电脑黑客攻击可能恶意攻击的漏洞。

    youdao

  • In the real world, we validate signatures by sight, even though a skilled attacker can reliably forge a signature that most people cannot distinguish from the original.

    现实世界中,我们通过视觉验证签名即使如此,老练攻击者还是可以伪造一个签名大多数都无法将它与原始签名区别开来。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定