Malicious behavior is even harder to control, if a member of staff decides to smuggle a virus out of a facility.
如果一名工作人员决意把病毒偷偷带出实验室,那么这种恶意行为就会更加难以控制。
Intrusion Prevention System (IPS) not only can detect malicious behavior, but also can stop the malicious behavior.
入侵防御系统不仅能检测网络中的入侵和攻击行为,并且能够及时地阻断入侵和攻击行为。
The protocols are efficient and provable secure and can tolerate the malicious behavior of up to half of the proxies.
该协议是有效的、可证安全的,并且可以容忍至多一半代理的恶意行为。
On the study of malicious code, the automatic generation of malicious behavior speciation is still a difficult problem.
在对恶意代码的研究上,恶意行为规范的自动生成仍然是一个难题。
HTML5 sandbox - a security feature to sandbox third party content on the website, to prevent malicious behavior like cookie stealing, form submission or page redirection.
HTML5SandBox——该安全特性可以将网站上的第三方内容放在沙箱当中,防止诸如Cookie窃取、表单提交或是页面重定向等恶意行为。
The species identified are not conducive to the protection of legitimate rights and interests of victims, nor conducive to effective action to contain malicious behavior.
该种认定不利于保护受害人的合法权益,也不利于有效遏制恶意诉讼行为的发生。
How will the virtual machines on the telecommuter's computer and on the back-end systems get protected from malicious behavior that may have impact on guaranteed uptime availability?
远程办公者的计算机和后端系统上的虚拟机如何抵御影响系统正常运行的恶意行为?
This statement is vulnerable to SQL injection - quotes in $_GET['username'] are not escaped and will be concatenated as part of the statement text, which can result in malicious behavior.
这条语句就容易受到SQL注入的威胁 —— $_GET['username'] 中的引号没有转义,因此将被加入到语句文本中,这样可以导致恶意的行为。
These services scan for Web sites exhibiting unusual behavior or known malicious activity and block those sites from users.
它可以对网站进行扫描,监测其是否有不正常的行为或是否存在已知的恶意行为,并阻挡用户访问这些站点。
A malicious attacker can make use of this behavior and launch a remote denial-of-service attack against a vulnerable network service over the Internet.
恶意攻击者可以利用这一点,通过Internet对网络服务发动远程拒绝服务攻击。
Typical functional testing approaches are, after all, designed to verify expected behavior in software, not to find or experiment with unexpected reactions to malicious activities.
毕竟,典型的测试方法是基于验证软件是否按照预期运行的思路设计的,而不是根据发现或者试验预期之外的反应而设计的。
Malicious business access is a malicious attacker to build an abnormal SQL statement, which we define as the destruction of the behavior of the model.
而恶意的业务访问是恶意攻击者构建非正常的SQL语句,我们把它定义为破坏模态化的行为。
Most Trojans exhibit some form of malicious, hostile, or harmful functionality or behavior.
大多数木马展品某种形式的恶意,敌意,或有害的功能或行为。
At the same time, the current technology or malicious code was found to signature-based scanning, supplemented by heuristic scanning, behavior detection, supplemented by other detection methods.
同时,当前的恶意代码发现技术还是以特征码扫描为主,辅助以启发式扫描,行为检测法等检测方法为辅。
The malicious prosecution is a wrongful action made use of national litigation procedure and a civil infringement behavior which is different from the abuse of processes.
恶意诉讼与滥用诉权并不完全相同,恶意诉讼是利用国家的诉讼机制提起的一场不合法的诉讼。
To research and implement the unknown malicious code detection system based on network behavior analysis, in order to detect unknown malicious code effectively.
研究并实现基于网络行为分析的未知恶意代码检测系统,有效地对未知恶意代码进行检测。
To research and implement the unknown malicious code detection system based on network behavior analysis, in order to detect unknown malicious code effectively.
研究并实现基于网络行为分析的未知恶意代码检测系统,有效地对未知恶意代码进行检测。
应用推荐