If your program is a viewer or editor of data—such as a word processor or an image displayer—that data might be from an attacker, so it's an untrusted input.
如果您的程序是数据的浏览器或者编辑器——比如文字处理器或者图像显示器——那么那些数据有可能来自攻击者,所以那是不可信的输入。
Not all intermediaries are untrusted.
并不是所有中介都不可靠。
Ruthlessly check the untrusted inputs.
严格检查不可信的输入。
Don't trust file contents that can be controlled by untrusted users.
不要信任可以被不可信用户控制的文件内容。
SSL is used to provide an additional level of security across the untrusted network.
SSL用于在不可信网络中提供附加安全级别。
All messages in transit should be protected from tampering by untrusted intermediaries.
应该防止传输中的所有消息受到不可靠中介的篡改。
Sometimes your program will take data from an untrusted user and give it to another user.
有时候您的程序要从一个不信任的用户处得到数据并把它传给其他的用户。
The untrusted data is preserved for visual appearance in the browser as shown in Figure 5.
不可信的数据被保留下来用于在浏览器中可视查看,如图5所示。
The untrusted data is preserved for visual appearance in the browser as shown in Figure 5.
不可信的数据被保留下来用于在浏览器中可视查看,如图 5 所示。
ODRL can be used within trusted and untrusted systems for both digital and physical assets.
ODRL可用于可信和非可信系统中的数字和实体形式的资源。
It's a good practice to use the as much as possible to confine untrusted external contents.
尽可能多地限制不可信的外部内容是一个良好的实践。
All it takes is an application with some dynamically constructed SQL and untrusted user input.
它所利用的只是具有一些动态构造的SQL和不可信用户输入的应用程序。
Another major drawback of JSONP is that it can be quite dangerous if used with untrusted services.
JSONP的另一个主要缺陷是被不信任的服务使用时会很危险。
For example, you would become untrusted if two minutes elapsed without any activity within the bank.
例如,如果在银行您两分钟后仍无任何活动的话,将变成不可信的。
Thus, you need to ruthlessly check data on all input paths into your program from untrusted sources.
因而,您需要对来自于不可信源的输入路径的数据进行严格的检查。
Clearly, you want to consider some sort of security model to limit the loading of untrusted resources.
显然,您需要考虑某种安全模型以限制不可信资源的加载。
(However, if you're still building up other parts of the query based on untrusted input, you're still at risk).
(然而,如果您仍然将查询的其他部分建立在不受信任的输入之上,那么就仍然存在风险)。
Now that we have configured this option and restarted the application, we will try an untrusted OpenIDProvider.
我们已经配置了这个选项,现在重新启动应用程序并尝试使用一个不可信的OpenID提供者。
Untrusted processes do most of the computation. They are constrained by, but possibly unaware of, DIFC controls.
不受信任的进程完成大部分工作,它们受到DIFC控制的约束,且有可能自身并不知道DIFC的存在。
The next step that we need to do is to make sure that our children will not be able to open untrusted web sites.
下一步我们要做的是确保孩子不能打开不信任网站。
The principal security requirement is that untrusted code should not be able to change the logging configuration.
为了保证安全,日志操作需要保证不受信的代码无法修改日志控制配置。
They are all focused with sending change sets across untrusted boundaries, which doesn't make a whole lot of sense.
它们都集中在通过不可信边界发送更改集合,也并没有太大意义。
For example, a trusted program could create a file in such a directory, and an untrusted user could delete and rename.
例如,一个可信任的程序可以在这样一个目录下创建一个文件,而一个不受信任的用户可以删除或者重命名它。
When invoking the shell directly, the biggest problem is if you send the shell data that is derived from untrusted data.
当直接调用shell时,最大的问题是您发送给shell的数据是否来自于非可信的数据。
As usual, be cautious when you open attachments from untrusted sources and make sure your antivirus software is up to date.
通常情况下在打开不明来源的附件时要小心谨慎,同时要确保反病毒软件病毒库的更新。
Unfortunately, encoding all untrusted data can be resource intensive and may have a performance impact on some Web servers.
遗憾的是,对所有不可信数据编码是资源密集型的工作,而且可能对某些Web服务器产生性能方面的影响。
You should consider each of these inputs when you're writing your program, and if they are untrusted, carefully filter them.
当您编写程序的时候这些输入每一个都应该考虑,如果它们不可信,一定要谨慎对它们进行过滤。
Practically every Web application needs to be a secure application, for example, because untrusted users can send data to them.
例如,实际上我们要求每个Web应用程序都是安全的应用程序,因为不可信的用户可能向它们发送数据。
If you rely on MAC addresses, processor IDs, or cookies, remember that they are essentially self-reported by an untrusted client.
如果您依赖于MAC地址、处理器标识或cookie,请记住它们本质上是由一个不可信的客户机自我报告的。
Trusted processes, in contrast, are aware of DIFC and set up the privacy and integrity controls that constrain untrusted processes.
另一方面,受信任的进程知道系统中存在DIFC,它们设立隐私及数据完整性控制来约束不受信任的进程。
应用推荐