• As with the applet sandbox, this guarantees that a malicious application cannot do any harm.

    如同使用applet沙箱(sandbox),这样可以保证恶意应用程序不能造成任何破坏

    youdao

  • Skype has no evidence to suggest that this was a malicious attack. We've identified a bug in the Skype software which was the root cause of the downtime.

    个发言人排除了一次破坏行为可能性,Skype没有证据显示是一次蓄意攻击,相反,我们Skype的软件发现了一个bug,该bug是导致此次全球宕机的根源。

    youdao

  • Testing for additional security and vulnerability issues; for example, malicious attacks on a deployed application that can indirectly harm other applications in the data center.

    测试额外安全性可攻击性问题例如所部署应用程序上会间接伤害数据中心其他应用程序的恶意攻击

    youdao

  • For example, a hacker can enter in the guise of a privileged user with administrative access controls and perform malicious activities that a legitimate system administrator did not initially notice.

    例如黑客可以伪装成具有管理访问特权用户进入系统执行恶意操作,真正的系统管理员不会马上注意到。

    youdao

  • If I accept a malicious piece of code that wreaks havoc on my computer, whose fault is it?

    如果接受了一段恶意代码,其破坏计算机那又是谁的呢?

    youdao

  • If a malicious user gets hold of this key information, then the security of that host machine can be compromised very easily.

    如果恶意用户获得了这些密钥信息那么主机安全性容易受到威胁。

    youdao

  • Here it is: "As we've said from the beginning, it's sad that someone would fabricate such a malicious, defamatory, and demonstrably false claim."

    声明如下:“就像我们一开始所说那样,有人伪造这样恶意的、诽谤性质、很显然是虚假的控诉是件很悲哀的事情。”

    youdao

  • The authors also consider server retaliation, whereby a server that detects a malicious client could send the client any sort of response, including malicious content.

    作者考虑到服务器反馈,由此检测到一个恶意客户端的服务器可以发送给客户任意种类响应信息,包括恶意的内容

    youdao

  • Yes, it seems that to get the malicious code working, a user would still need to be surfing with IE.

    是的似乎如果恶意代码生效,用户还是使用IE浏览器

    youdao

  • How many malicious users can a tagging system tolerate before results significantly degrade?

    在服务质量明显变坏之前,一个标签系统忍受多少恶意用户

    youdao

  • After you disentangle these systems and enable SOA, malicious users have a simpler architecture that is easier to compromise.

    这些系统进行分解启用SOA恶意用户所面对体系结构就会简单一些,从而便于进行破坏。

    youdao

  • A malicious proxy can make it appear that the connection is tunneled when it actually is not.

    恶意代理可以并不存在隧道伪装成仿佛隧道真正存在一样。

    youdao

  • That means that someone was searching for a legitimate website by name and ended up visiting a malicious website instead.

    意味着一些人搜索正常站点的过程中最终访问恶意站点。

    youdao

  • Trusting a malicious certification authority will put your computer at risk, so use discretion.

    信任一个恶意证书颁发机构将计算机造成威胁,所以请妥善使用。

    youdao

  • Execution of malicious scripts within a trusted domain or context.

    恶意代码一个受信任上下文中执行

    youdao

  • Rather, it is "being distributed from a malicious website," according to Kaspersky researcher Denis Maslennikov.

    通过一个恶意网站传播的,”根据卡巴斯基研究员DenisMaslennikov的说法。

    youdao

  • It's someone trying to make malicious use of a command-line executable.

    而是试图恶意利用一个命令行可执行文件

    youdao

  • The just man frowns, but never smiles with a malicious sneer.

    公正蹙起眉头从不会那种恶意微笑

    youdao

  • For example, once a malicious party has somehow stolen a legitimate message created by a sender, the message could be forwarded to anyone.

    例如一旦恶意的一以某种方式窃取发送方创建合法消息消息有可能被转发给任何人。

    youdao

  • Without this protection, a malicious web page could compromise the integrity of another web page.

    没有这个保护的话,恶意网页可能危害到另外一个正常的网页。

    youdao

  • Use this mode to temporarily lock down computers during a known network attack or when a malicious program is spreading.

    使用这种模式可以一个已知网络攻击或者病毒程序沿着网络传播期间暂时地锁定电脑

    youdao

  • Consider a malicious recipient who claims that it has received a message twice from a sender even though the sender has actually sent it only once.

    请设想一下恶意接收方声称次收到来自发送方的消息尽管发送方发送过一次。

    youdao

  • There is nothing to stop a malicious client from sending options that cover almost all of the data in the window.

    如果恶意客户机发送选项覆盖窗口几乎全部数据,则无法对此加以阻止

    youdao

  • Tencent said it was defending itself against a malicious software attack, but the move triggered accusations that Tencent had too much power.

    腾讯表示这么做针对恶意软件攻击防御举措,此举引发大量指责,称腾讯权势过大。

    youdao

  • This brings up a few questions: What if a malicious user hacks the underlying security mechanism itself?

    这会带来几个问题如果恶意用户攻破底层安全机制本身,那么会怎么样?

    youdao

  • In this scenario, the user unknowingly executes scripts written by an attacker when they follow a malicious link in a mail message.

    方案中用户执行邮件消息中的恶意链接时,就会不知不觉地执行攻击编写脚本

    youdao

  • Again, consider a malicious recipient who receives a signed SOAP message and forwards it to another malicious party.

    请再设想一下,恶意接收方收到经签名的SOAP消息将其转发另一个恶意方。

    youdao

  • In such cases, if a malicious user exploits these sessions, the user can potentially disrupt the system.

    这些情况下如果恶意用户利用这些会话,用户就潜在地换系统。

    youdao

  • An attacker can connect users to a malicious server of the attacker's choice.

    攻击可以用户连接攻击者选择恶意服务器上。

    youdao

  • This enables you to find issues in the third party components, along with issues from a malicious file input source and more.

    这样能够使第三控件找出问题,并伴随着来自恶意文件中更多的问题。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定