The analysis indicates that the encryption algorithm not only can effectively resist cipher-text-only attack but also chosen-plaintext attack.
分析表明,该文所设计的加密算法不但能抵抗唯密文攻击,而且能有效地抵抗选择明文攻击。
The basic idea behind a SQL injection attack is this: you create a Web page that allows the user to enter text into a textbox that will be used to execute a query against a database.
SQLInjection攻击的基本原理如下:您创建一个网页,允许用户向文本框中输入文本,用于对数据库执行查询。
Updated the pop-up text to reflect adjusted monster attack and defense.
更新弹出式文字反映出调整巨大的攻击和防御。
The Guardian ran a helpful sketch of a drone, accompanied by the text, "Al-Awlaki's position was tracked for several days before the attack on his vehicle by a drone armed with Hellfire missiles."
《卫报》刊出了无人机的草图,很有说明性,附有文字,“搭载‘地狱之火’导弹的无人机袭击奥拉基的汽车之前,他已经被追踪好几天了。”
The most efficient reading skills in college English are word -attack skill, text -attack skill and speed reading skill.
在大学英语的学习中,最有效的阅读技巧就是猜字技巧、语篇结构技巧和快速阅读技巧。
Hashed passwords stored in a text file cannot be used to regenerate the original password, but they are potentially vulnerable to a dictionary attack.
储存在文字档中的杂凑密码无法用于重新产生原始密码,但它们可能容易受到字典攻击。
They maintain one of the largest catalogs of security advisories, cryptography, text files, and denial of service attack information.
他们保持安全警告,密码学,文本文件的最大目录之一,拒绝服务攻击的信息。
This text launch from network safety and defense measures of calculator and pointed out familiar of four kinds of network attack and its defense measures.
该文从计算机的网络安全及防御措施来展开,指出了常见的四种网络攻击及其防御措施。
Explain the text: ?It immediately ran away when she saw it, and experts confirmed that a puma will not attack a human being unless it is cornered.
它就立刻逃走了。专家证实,美洲狮非被逼得走投无路, 是决不会伤人的。
Explain the text: ?It immediately ran away when she saw it, and experts confirmed that a puma will not attack a human being unless it is cornered.
它就立刻逃走了。专家证实,美洲狮非被逼得走投无路, 是决不会伤人的。
应用推荐