• Malicious behavior is even harder to control, if a member of staff decides to smuggle a virus out of a facility.

    如果工作人员决意把病毒偷偷带出实验室,那么这种恶意行为更加难以控制

    youdao

  • Intrusion Prevention System (IPS) not only can detect malicious behavior, but also can stop the malicious behavior.

    入侵防御系统不仅检测网络中的入侵和攻击行为并且能够及时地阻断入侵和攻击行为。

    youdao

  • The protocols are efficient and provable secure and can tolerate the malicious behavior of up to half of the proxies.

    协议有效的、可安全并且可以容忍至多一半代理恶意行为

    youdao

  • On the study of malicious code, the automatic generation of malicious behavior speciation is still a difficult problem.

    恶意代码研究上,恶意行为规范的自动生成仍然一个难题

    youdao

  • HTML5 sandbox - a security feature to sandbox third party content on the website, to prevent malicious behavior like cookie stealing, form submission or page redirection.

    HTML5SandBox——该安全特性可以将网站第三内容放在沙箱当中,防止诸如Cookie窃取表单提交或是页面重定向等恶意行为

    youdao

  • The species identified are not conducive to the protection of legitimate rights and interests of victims, nor conducive to effective action to contain malicious behavior.

    该种认定不利于保护受害人合法权益不利于有效遏制恶意诉讼行为的发生。

    youdao

  • How will the virtual machines on the telecommuter's computer and on the back-end systems get protected from malicious behavior that may have impact on guaranteed uptime availability?

    远程办公者计算机系统虚拟如何抵御影响系统正常运行的恶意行为

    youdao

  • This statement is vulnerable to SQL injection - quotes in $_GET['username'] are not escaped and will be concatenated as part of the statement text, which can result in malicious behavior.

    语句容易受到SQL注入的威胁 —— $_GET['username'] 中的引号没有转义,因此加入到语句文本中,这样可以导致恶意的行为。

    youdao

  • These services scan for Web sites exhibiting unusual behavior or known malicious activity and block those sites from users.

    可以网站进行扫描监测其是否有不正常行为是否存在已知恶意行为阻挡用户访问这些站点

    youdao

  • A malicious attacker can make use of this behavior and launch a remote denial-of-service attack against a vulnerable network service over the Internet.

    恶意攻击可以利用一点,通过Internet网络服务发动远程拒绝服务攻击

    youdao

  • Typical functional testing approaches are, after all, designed to verify expected behavior in software, not to find or experiment with unexpected reactions to malicious activities.

    毕竟典型测试方法基于验证软件是否按照预期运行的思路设计的,而不是根据发现或者试验预期之外的反应而设计的。

    youdao

  • Malicious business access is a malicious attacker to build an abnormal SQL statement, which we define as the destruction of the behavior of the model.

    恶意业务访问恶意攻击构建非正常SQL语句我们把它定义破坏模态化的行为

    youdao

  • Most Trojans exhibit some form of malicious, hostile, or harmful functionality or behavior.

    大多数木马展品某种形式恶意敌意有害功能行为

    youdao

  • At the same time, the current technology or malicious code was found to signature-based scanning, supplemented by heuristic scanning, behavior detection, supplemented by other detection methods.

    同时当前恶意代码发现技术还是以特征码扫描为主,辅助启发式扫描,行为检测法检测方法为辅

    youdao

  • The malicious prosecution is a wrongful action made use of national litigation procedure and a civil infringement behavior which is different from the abuse of processes.

    恶意诉讼滥用诉权并不完全相同,恶意诉讼利用国家诉讼机制提起的场不合法的诉讼。

    youdao

  • To research and implement the unknown malicious code detection system based on network behavior analysis, in order to detect unknown malicious code effectively.

    研究实现基于网络行为分析未知恶意代码检测系统有效地对未知恶意代码进行检测

    youdao

  • To research and implement the unknown malicious code detection system based on network behavior analysis, in order to detect unknown malicious code effectively.

    研究实现基于网络行为分析未知恶意代码检测系统有效地对未知恶意代码进行检测

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定