• A secure authentication protocol can resist the cheat of malicious attacker to communication network and guarantee the security of network.

    一个安全认证协议有效抵御恶意攻击者通信网进行欺诈保证通信网的安全运行。

    youdao

  • Malicious business access is a malicious attacker to build an abnormal SQL statement, which we define as the destruction of the behavior of the model.

    恶意业务访问恶意攻击构建非正常SQL语句我们把它定义破坏模态化的行为

    youdao

  • A malicious attacker can make use of this behavior and launch a remote denial-of-service attack against a vulnerable network service over the Internet.

    恶意攻击可以利用一点,通过Internet网络服务发动远程拒绝服务攻击

    youdao

  • Software tamper resistance is the art of crafting a program such that it cannot be modified by a potentially malicious attacker without the attack being detected.

    介绍软件抗篡改编写程序艺术,使代码没有攻击检测的情况下,不会潜在的恶意攻击代码所修改

    youdao

  • A malicious attacker can still sniff the wire (note that password digest is not encrypted by default) and replay the entire UsernameToken, so nonce and timestamp checking are imperative.

    恶意攻击者可以探查连接(请注意缺省情况下密码摘要没有被加密)回复整个UsernameToken因此nonce时间戳检查缺一不可的。

    youdao

  • The attacker injects his malicious inputs to the SQL statement to change the query's logic.

    攻击者将其恶意输入注入sql语句中,修改查询语句逻辑。

    youdao

  • If the attacked program was initiated by a system administrator, the malicious code will then run as a part of the original program, giving the attacker administrator privileges on the system.

    如果攻击程序系统管理员启动的,那么恶意代码作为原始程序的一部分进行执行黑客系统中的管理员特权。

    youdao

  • Often the attacker will overrun the buffer with the malicious code the attacker wants to run, and the attacker will then change the return value to point to the malicious code they've sent.

    通常攻击使用它运行恶意代码来使缓冲区溢出然后攻击者会更改返回指向它们发送的恶意代码。

    youdao

  • Data can be stored in the session with no direct way for a malicious user to alter it. (Bugs in your code may still give an attacker an opening, of course.)

    数据可以存储会话中恶意用户无法直接修改(当然代码中的bug仍然可能产生安全漏洞)。

    youdao

  • Cookie theft occurs when the the cookie issued by the application is hijacked for malicious purposes by an attacker.

    应用程序发出cookie遭到恶意劫持时,就会发生cookie窃取

    youdao

  • If an attacker can embed malicious commands in these parameters, the external system may execute those commands on behalf of the... application.

    如果攻击可以这些参数中嵌入恶意命令,那么外部系统就可能应用程序的名义执行这些命令。

    youdao

  • In this scenario, the user unknowingly executes scripts written by an attacker when they follow a malicious link in a mail message.

    方案中用户执行邮件消息中的恶意链接时,就会不知不觉地执行攻击编写脚本

    youdao

  • Let us assume an attacker succeeded in filling a page containing malicious script to the Web site for the subscribed members.

    我们假设攻击成功地一个包含恶意脚本页面入到订阅成员使用的网站上。

    youdao

  • An attacker can connect users to a malicious server of the attacker's choice.

    攻击可以用户连接攻击者选择恶意服务器上。

    youdao

  • When an attacker introduces a malicious script to a dynamic form submitted by the user, a cross-site scripting (XSS) attack then occurs.

    攻击者用户提交动态表单引入恶意脚本时,产生跨站点脚本(XSS)攻击

    youdao

  • If the application has XSS holes, the attacker may send a malicious script that can still be executed by the application and lead to XSS intrusions.

    如果应用程序xss漏洞攻击者就可能会发送应用程序执行恶意脚本导致XSS侵入

    youdao

  • The malicious script introduced by the attacker is executed by the browser and the data is passed to the hacker's Web site.

    于是浏览器会执行攻击引入恶意代码数据被传递黑客的网站。

    youdao

  • Users can unknowingly execute malicious scripts when viewing dynamically generated pages based on content provided by an attacker.

    用户查看基于攻击提供内容而动态生成页面时,他们不知不觉地执行恶意脚本

    youdao

  • If a malicious user can overwrite the buffer, then the value of the flag can be changed, thus providing the attacker with illegal access to private files.

    如果不怀好意使用者缓冲区变更标志从而指出攻击者是非法存取专用文件。

    youdao

  • If the attacker is able to fill in just enough space with dummy data (i.e., NOPs) and then add a bit of malicious code or a value, the program will execute the malicious code or use that new value.

    如果黑客能够数据(也就是NOP填充足够空间然后添加一点恶意代码,那么程序执行恶意代码或使用值。

    youdao

  • The term attacker can be used to describe a malicious hacker.

    词汇攻击者可用描述恶意黑客

    youdao

  • An attacker could set the PATH environment variable to change where saposcol looked for other programs, and then create a malicious "expand" program for saposcol to run.

    攻击可以通过设置PATH环境变量改变saposcol寻找其他程序的位置,然后saposcol创建一个恶意的“扩展程序来运行。

    youdao

  • The attacker needs to force the client to access the malicious link. This can happen in these ways.

    黑客需要强迫客户访问恶意链接。

    youdao

  • An attacker could present a removable drive to the user with a malicious shortcut file, and an associated malicious binary.

    攻击可以提交恶意快捷方式文件用户可移动驱动器一个关联的恶意的二进制文件。

    youdao

  • Backdoor compromises system integrity by making changes to the system that allow it to by used by the attacker for malicious purposes unknown to the user.

    一个后门妥协系统完整性使更改系统,允许使用恶意攻击者目的不明用户

    youdao

  • Usually the attacker will encode the malicious portion of the link to the site in HEX (or other encoding methods) so the request is less suspicious looking to the user when clicked on.

    通常攻击者链接中的恶意内容编码HEX其他编码方法),所以减少用户点击怀疑

    youdao

  • A Backdoor compromises system integrity by making changes to the system that allow it to by used by the attacker for malicious purposes unknown to the user.

    一个完整系统后门妥协改变允许系统使用攻击对于恶意用途不明用户

    youdao

  • The vulnerability could allow an attacker to cause a victim to run malicious scripts when visiting various Web sites, resulting in information disclosure.

    用户浏览诸多网站时,漏洞导致允许袭者运行恶意脚本,进而导致信息泄露。

    youdao

  • If the string is not validated and malicious text or characters not escaped, an attacker can potentially access sensitive data or other resources on the server.

    如果字串未经验证逸出恶意文字元,攻击者就可能得以存取伺服器机密资料其他资源

    youdao

  • If the string is not validated and malicious text or characters not escaped, an attacker can potentially access sensitive data or other resources on the server.

    如果字串未经验证逸出恶意文字元,攻击者就可能得以存取伺服器机密资料其他资源

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定