This type of attack was what Albert Gonzalez used to steal 130 million credit card Numbers.
这就是AlbertGonzalez用来盗取1.3亿信用卡号的那类攻击。
This type of attack is only possible if the database or password store is already compromised.
这种类型的攻击只可能在数据库或密码存储已经暴露的情况下进行。
In 2002, the White House described 9/11 as “a new type of attack that had not been foreseen.”
白宫在2002年形容911是“无法预料的新型袭击”。
In another type of attack, the attacker might modify the stylesheet to hide information from users.
在另一种攻击类型中,攻击者可能会修改样式表,把信息隐藏起来不让用户发现。
In recent years, there has been an increase of a particular type of attack: client-side attacks.
在最近几年,网络上出现一种新的攻击类型:客户端攻击,攻击的对象是客户端应用程序。
The appropriate key(s) will be shaded to indicate the type of attack(s) each technique helps to prevent.
对于每种技术,适当的方块将加上底纹,表示这种技术有助于防范的攻击类型。
The best way to prevent this type of attack is to enforce policies that make passwords difficult to guess.
防止这种类型攻击的最佳方法是加强策略,使口令很难被猜中。
The four squares will be shaded as appropriate to represent the type of attack this technique helps to prevent
这四个方块加了适当的底纹,以代表这种技术有助于防范的攻击类型
Systems used in this type of attack can be compromised in any number of ways and infected with a worm or virus.
此类型攻击中使用的系统可能以多种方式被破坏并受到蠕虫或病毒感染。
Unless otherwise specified, a followup attack is considered to be the same type of attack as the initial attack.
除非另外指出,不然后续攻击被视为和一开始攻击的类型相同。
The length of the key determines the number of possible keys — and hence the feasibility — of this type of attack.
键的长度决定了许多可能的钥匙——因此可行性——这种类型的攻击。
While in Laser Lock mode, the Javelin Soldier is extremely vulnerable to any type of attack because of the 3 second pre-attack delay.
处于激光锁定模式时,由于3秒的攻击前延迟,标枪兵对于任何形式的攻击都相当的脆弱。
Consider Example 1 (a), which is paraphrased from the Windows exploit, of course, that forms the basis for this type of attack vector.
考虑示例1 (a),当然,这改写自Windows攻击,它构成了此类攻击载体的基础。
One of the most famous instances of this type of attack is the Windows animated cursor attack, and it's this pattern that I examine here.
此类攻击最著名的示例之一就是Windows动画光标攻击,这正是本文要讨论的模式。
LM Hash is vulnerable to this type of attack because it does not use today's common method of introducing "salt" to the encryption process.
LMHash容易被此类攻击攻破,是因为它没有使用现今常用的给加密过程引入“salt”的方式。
If the server CPU and memory seem to be running excessively high, the Domino Web logs should be checked for a Denial of Service type of attack.
如果服务器CPU和内存的运用率极高,那么应该检查DominoWeb日志是否存在拒绝服务型攻击。
In addition to the overflow exploits, SQL injection is one other type of attack that relies on developer oversight by not testing incoming data.
除了溢出的利用以外,SQL注入是另一类依赖于开发人员没测试输入数据的疏漏的攻击。
While polyinstantiation will not prevent every type of attack, it is a useful addition to your security toolkit that is straightforward to configure.
尽管多实例化不能防止所有攻击,但它是您的安全工具包的一个有用的补充,而且配置十分简单。
We know that Twitter's architecture has made it more vulnerable to this type of attack than Google or even Facebook, but in situations like this, communication is key.
我们知道Twitter的构架使得Twitter比Google和Facebook更容易遭到攻击,但是在这种情况下,沟通至关重要。
If you are concerned about this type of attack, which is easily prevented through code inspections, you can prevent untrusted clients from connecting to the Web container.
如果您担心这种类型的攻击(可以通过代码检查轻松地加以防止),则可以阻止任何不受信任的客户端连接到web容器。
What we're most interested in is seeing if we can get any insight into any terrorist plot that might be underway so that we can take the measures to stop any type of attack planning.
我们最想知道的是,我们能否获知任何可能正在策划的恐怖行为,以便于我们能够采取措施阻止任何形式的攻击计划。
Although I can't get into the specifics of how to pull this type of attack off, you can look it up if you have SQL knowledge, which—if you're hosting database on your Web server—you should have.
虽然我不能详细解释这种攻击是如何实施的,但如果您了解SQL 的话,就可以找到相关的答案。 如果您在Web服务器上驻留数据库的话,一定要了解这种攻击。
The focus of this article is a specific type of code injection attack: the Blind XPath injection.
本文主要介绍代码注入攻击的一种特殊类型:XPath盲注。
One common type of malware, called a buffer overflow attack, overwhelms programs that accept input, like the address line in a Web browser or a search window for a database.
恶意软件的一种常见攻击类型,所谓的缓冲区溢出攻击,会使接受输入的程序崩溃,如web浏览器的地址栏或数据库的搜索窗口。
So I immediately type up the paragraph, see what it looks like on a clean sheet of paper, and then attack that sheet of paper with my pencil again.
所以我会立刻把写好的一段打印出来,看看它在一张干净的白纸上是什么样子,然后再用铅笔在纸上涂涂改改。
For example, if you look at the drugs people take for Type 2 diabetes, certain drugs have recently been linked to increased risk of heart attack.
例如,如果留心人们为治疗2型糖尿病服用的药物,某些药物近来已与加剧心脏病发作的风险联系起来。
In a buffer overflow attack, the hacker takes advantage of specific type of computer program bug that involves the allocation of storage during program execution.
在缓冲溢出攻击中,黑客利用了程序执行期间存储分配中的特定计算机程序漏洞。
A type of statistical analysis used to study high-energy physics and stock market fluctuations could yield a new Angle of attack in the fight against the virus that causes AIDS.
一种统计方法主要用于研究高能物理和股市波动,现在有可能在人类对抗艾滋病的战役中开辟新的战场。
In 2004, for instance, Sunil Rao of Duke University Medical Centre, in North Carolina, carried out a study of people suffering from acute coronary syndrome (a specific type of heart attack).
对此2004年,北卡杜克大学医学中心(Duke University Medical Center)的桑尼饶(Sunil Rao),对冠状动脉综合症(心脏病的一种)患者进行了一项调查。
In 2004, for instance, Sunil Rao of Duke University Medical Centre, in North Carolina, carried out a study of people suffering from acute coronary syndrome (a specific type of heart attack).
对此2004年,北卡杜克大学医学中心(Duke University Medical Center)的桑尼饶(Sunil Rao),对冠状动脉综合症(心脏病的一种)患者进行了一项调查。
应用推荐