The attacker threatened them with a gun.
袭击者用枪威胁他们。
They think the attacker was very tall—so that lets you out.
他们认为歹徒是个高个子,这样就没你什么事儿了。
The attacker enters the input in Listing 8.
攻击者可以提供清单8所示的输入。
The attacker died, and the children survived.
袭击者丧生,孩子则活了下来。
Again, the attacker requires very few resources.
同样,攻击者只需要很少的资源。
It allows the attacker to impersonate the victim.
这将允许黑客冒充受害者。
The attacker cracked the racks and stacked them on the track.
攻击者打裂搁板并把它们堆在跑道上.
The attacker was later subdued by the police, and no one died.
这次攻击后来被警察所制服,没有人死亡。
The attacker can automate to go against multiple sites at one time.
攻击者可以自动的在多个站点上进行测试。
Think of the problem from two perspectives: the server, and the attacker.
请从两方面来考虑这个问题:服务器和攻击者。
As the name suggests, the attacker opens the connection only halfway.
顾名思义,攻击者只是部分地打开连接。
Reports said the attacker, a local caretaker and receptionist, was not armed.
报道称袭击者是当地一名管理员和接待员,没有携带武器。
This will always result in a match so that the attacker gains entry to the system.
这个条件会一直匹配,因此攻击者可以进入系统。
The attacker analyzes the site to find what types of software are used on the site.
攻击者分析该站点来查找站点上使用的软件。
But that attack was rare in another way: It was easy enough to identify the attacker.
但是,这次袭击从另一方面来看却是极为少见的:袭击者很轻易地就被发现。
This attack USES password cracking to penetrate the systems that the attacker wants to deface.
这一攻击使用密码破解来渗透攻击者想破坏的系统。
The attacker injects his malicious inputs to the SQL statement to change the query's logic.
攻击者将其恶意输入注入到sql语句中,以修改查询语句的逻辑。
XHR: Browser cross-domain rules prevent the attacker from making the request in the first place.
XHR:浏览器跨域规则一开始就阻止了攻击者发出请求
A vulnerability is a weakness in the system, but it is not necessarily known by the attacker.
弱点是系统的缺点,但是攻击者可能不知道。
The attacker cannot access all the packets of a request and cannot decipher what message was sent.
攻击者不能访问一个请求中所有的包,也就不能破译发送的消息。
First, the attacker needs to make sure that the fake packets will actually be routed to the target.
首先,攻击者需要确保假的信息包确实被路由到目标机器。
In this case, nothing terrible happens, and the attacker simply sees an error message in the client.
在这个示例中,没有发生什么可怕的事情,攻击者只是在客户机上看到了一条错误消息。
Determining the identity of the attacker was a matter of narrowing down the line of potential suspects.
确定攻击者的身份需要逐渐缩小一连串嫌疑人的范围。
In another type of attack, the attacker might modify the stylesheet to hide information from users.
在另一种攻击类型中,攻击者可能会修改样式表,把信息隐藏起来不让用户发现。
Manual attacks are laborious, and only successful if the attacker knows something about the shopper.
手动的攻击是非常艰苦的,并且只有当攻击者知道关于购物者某些信息的时候才能成功。
If an attacker can cause a buffer to overflow, then the attacker can control other values in the program.
如果攻击者能够导致缓冲区溢出,那么它就能控制程序中的其他值。
But once an attacker can run code on such a machine, the attacker instantly attains complete control.
但是,一旦攻击者可以在这样的机器上运行代码,就可以立即获取完全控制。
The driver pulled over and passengers fled from the bus, bracing the door to keep the attacker inside.
司机将车停在一边,其余乘客逃离巴士,将袭击者堵在车里。
The attacker simply goes to a workstation and tries to attack the IIS server with an HTML editing tool.
攻击者只要转至工作站并尝试使用HTML编辑工具攻击IIS服务器。
That's probably exactly how he wanted to be seen. Do your headlines, for instance, glorify the attacker?
那可能正是他希望人们看到的,比如,那些新闻提要是否让袭击者显得荣耀呢?
应用推荐