Common web attacks protection - detecting common web application security attacks.
常见的Web攻击防护——对常见的Web应用安全攻击进行检测。
However, that ubiquity alsomakes plug-ins prime targets for browser security attacks.
然而,这种随处可用性也使插件成为浏览器安全攻击的主要目标。
Describes common types of Web-site security attacks and how to help prevent them.
描述常见的网站安全攻击类型以及如何帮助阻止这些攻击。
Describes common types of Web site security attacks and how to help prevent them.
说明常见的网站安全性攻击类型和利于避免受到攻击的方法。
This article outlined the key players and security attacks and defenses in an e-Commerce system.
本文概述了e - Commerce系统中的关键参与者,安全性攻击和防御。
Partly because they're the target of often more advanced security attacks, they're the sharp end of the stick.
部分原因是由于他们更容易成为高级安全性攻击的靶子。正所谓枪打出头鸟。
Resources access control (AC) is an essential defensive measure against a large number of security attacks.
对于分布式应用资源的大量安全攻击来说,访问控制是重要的防范手段。
That feature was introduced in .NET from the beginning to prevent security attacks coming from network locations.
当初之所以在.NET中引入这个特性,是为了阻止从网络上进行的安全攻击。
An external hacker is probably an expert in security attacks, but may not have any particular grudge against you.
外部黑客也许是安全性攻击方面的专家,但是他们对您可能没有攻击动机。
By totally disallowing any direct access to memory, an entire huge, messy class of security attacks is ruled out.
禁止程序直接访问内存,那么整整一大类安全攻击都被彻底清除了。
An external hacker is probably an expert in security attacks, but might not have any particular grudge against you.
外部黑客也许是安全性攻击方面的专家,但是他们对您可能没有攻击动机。
Security mechanism adds authentication and encryption mechanisms to MAC frame to defense MAC layer security attacks.
安全机制通过增加MAC帧的认证和保密以防御MAC层的安全攻击。
The attack, based on the buffer overflow, is a common means of security attacks and is the only most common security threats at present.
基于缓冲区溢出的攻击是一种常见的安全攻击手段,也是目前惟一最重要最常见的安全威胁。
However, without signed manifests, it is difficult to ensure that the application installer is not tampered in man-in-the-middle security attacks.
然而,在没有签名清单的情况下,很难确保应用程序安装程序在受到中间人安全攻击时不被篡改。
At first, the main methods of smartcard security attacks are discussed, and the principle and key steps of the latest attack technologies are analysed.
首先对智能卡安全攻击的主要方法进行了研究,分析了几种最新的智能卡攻击技术的原理与关键步骤。
Your computer iseven more vulnerable to security attacks if you're running plug-ins that aren'tup to date, because out-of-date plug-ins don't contain the latest securityfixes.
如果运行非最新插件,你的计算机更容易受安全攻击,因为旧插件没有最新安全补丁。
This paper first discusses the challenges and attacks in the design of embedded system security, and then studies approaches to bridging the security processing gap and resisting security attacks.
本文讨论了嵌入式系统安全设计面临的挑战以及受到的攻击方式,探讨了如何弥合安全处理的资源缺陷和抵抗攻击的方法。
Although compared with the previous, improved their safety, but when faced with security attacks (passive attacks and active attacks), the whole network system security still needs to be improved.
虽然与之前相比,其安全性有所提高,但当面临安全攻击(被动攻击和主动攻击)时,整个网络系统的安全性仍然亟待提高。
The INS should pay more attention to serving the millions of ordinary Americans who rely on the nation's border security to protect them from terrorist attacks.
移民归化局应该更关注服务于依赖国家边境安全来保护自己免受恐怖袭击的数百万普通美国人。
Wireless security providers will often take steps to help combat the threat of jamming attacks.
无线安全供应商通常会采取措施来减轻干扰攻击的威胁。
Western security sources worry they could stage attacks outside the country, of the kind that destroyed the American embassies in Kenya and Tanzania in 1998.
西方安全部门担心他们能在境外发动袭击,类似于1998年摧毁肯尼亚和坦桑尼亚美国大使馆那种情况。
One is security: such systems will be vulnerable to all sorts of hacker attacks.
有一个是安全:此类系统易受各式各样的黑客攻击。
This security restriction is to avoid cross-site scripting attacks (XSS).
这个安全限制是为了避免跨站点脚本攻击(XSS)。
Under section 1030(a)(5) of the U. S. Computer Fraud and Abuse Act, it's against the law to knowingly disseminate computer viruses, worms, denial-of-service attacks and other security intrusions.
根据美国计算机欺诈和滥用法案第1030条(a)(5),故意散布计算机病毒,蠕虫,进行拒绝服务攻击和其他安全入侵的行为是违法的。
If companies are on top of knowing their security weaknesses and communicate with the security community, APT attacks can be withstood and ultimately turned against the criminals perpetrating them.
如果企业知道他们自己的安全漏洞,并多与安全社区交流,那么它们就能抵挡住apt攻击,并最终击败黑客的网络犯罪活动。
Testing for additional security and vulnerability issues; for example, malicious attacks on a deployed application that can indirectly harm other applications in the data center.
测试额外的安全性和可攻击性问题;例如,所部署应用程序上会间接伤害数据中心中其他应用程序的恶意攻击。
Since then it has launched numerous small-scale attacks against Yemeni security forces and has struck in Saudi Arabia too.
自那时起,他们向也门安全力量发起了无数次小型袭击,他们还袭击过沙特阿拉伯。
Bashary says this was no surprise and security measures are in place to try to prevent such attacks.
巴沙里说,这次袭击在预料之中,我们为预防这样的袭击已经采取了安全措施。
Bashary says this was no surprise and security measures are in place to try to prevent such attacks.
巴沙里说,这次袭击在预料之中,我们为预防这样的袭击已经采取了安全措施。
应用推荐