恶意代码在一个受信任的域或上下文中执行。
Execution of malicious scripts within a trusted domain or context.
同样的技术使得微软可发现注入其产品的恶意代码。
The same techniques allow Microsoft to find malicious code that may have been injected in its products.
例如,黑客可以利用恶意代码控制使用该软件的电脑。
For example, a hacker could use malicious code to take control of PCs using the software.
恶意代码会被在会发生任何糟糕情况的服务器上执行。
And that code executes on a server, where it can do all kinds of bad things.
微软警告公众,泄露版本可能带有恶意代码,可攻击电脑。
Microsoft has warned that the leaked software may get infected with malicious codes which could then attack computers.
按需脚本可能包含打算攻击XXS等安全漏洞的恶意代码。
On-demand scripts can include malicious code aimed at exploiting security vulnerabilities such as XSS.
这种不小心的解释会导致恶意代码的执行和潜在的安全侵犯。
This inadvertent interpretation can lead to malicious code execution and possible security violations.
对于链接内含有恶意代码的动态生成页面,情况也是一样的。
The same is true on a dynamically generated page if a link has malicious code in it.
修改真实的恶意代码来绕开防病毒软件没能让很多安全厂商高兴。
The modification of actual malicious code to bypass antivirus has not pleased many security-software vendors.
是的,似乎如果想让恶意代码生效,用户还是得使用IE浏览器。
Yes, it seems that to get the malicious code working, a user would still need to be surfing with IE.
保护自己免于恶意代码攻击的一种方法是确保接收到预期的输入。
One way to protect yourself from malicious code is to make sure that what you expect as input is actually what you receive as input.
他可以进入邻居的虚拟机并在PaaS应用程序中添加恶意代码。
He can get inside a neighbor's virtual machine and add malicious code to PaaS applications.
正如我们已经讨论的,JVM提供了防止恶意代码进入企业系统的服务。
As we have discussed, the JVM serves to prevent malicious code from entering an enterprise system.
供电设施和私人供电公司并没有给防毒软件打补丁以应对恶意代码攻击。
Utilities and private power firms have failed to install patches in security software against malware threats.
于是浏览器会执行攻击者引入的恶意代码,数据将被传递到黑客的网站。
The malicious script introduced by the attacker is executed by the browser and the data is passed to the hacker's Web site.
这就把构建服务器置于提交给源树的 bug和恶意代码的风险之下。
This puts your build server at some risk from bugs and malicious code committed to source trees.
就算你打开一个恶意网页,浏览器的沙箱也会阻止恶意代码安装到硬盘上。
If you open a malicious web page, the browser's sandbox prevents that malicious code from leaving the browser and installing itself to your hard drive.
如果目标Web站点不检查这类恶意代码,就可能造成恶意使用用户信息。
If the targeted Web site doesn't check for this type of malicious code, misuse of the user is probable.
如果我接受了一段恶意代码,其破坏了我的计算机,那又是谁的错呢?
If I accept a malicious piece of code that wreaks havoc on my computer, whose fault is it?
如您所见,黑客将恶意代码作为其userid输入,修改了查询语句的逻辑。
As you can see, the hacker changes the query's logic by entering the malicious code as his userid.
保证Web站点的页面只有在验证了用户输入没有恶意代码之后才返回用户输入。
Guarantee that the pages in the Web site return user inputs only after validating them for any malicious code.
微软说,为了利用这个安全漏洞,黑客必须欺骗用户访问一个装载了恶意代码的网站。
To exploit the security hole, hackers must trick users into visiting a Web site loaded with malicious code, Microsoft said.
如果数据包含恶意代码,mashup页面上的敏感数据就有可能落入恶意用户手中。
If the data contains malicious code, sensitive data on the mashup page can fall into the wrong hands.
但对普通计算机用户来说,只需采取一些常识性步骤即可免受病毒和其它恶意代码的侵扰。
But for the average computer user there are some common-sense steps that can help protect against viruses and other malicious computer code.
含有恶意代码或问题代码的广告会阻塞网络、降低性能、锁死整个页面甚至让浏览器崩溃。
An AD containing malicious or poorly written code could hog the network connection, degrade performance, freeze the entire page, or crash the browser.
尽管限制浏览器只浏览信任站点可以减少受到攻击的风险,恶意代码可以被植入任何的网站。
While restricting web surfing to trusted sites should reduce the risk of infection, the malicious code can be injected into any website.
硅谷专门制作电脑、服务器安保软件的赛门铁克公司在一个全球恶意代码捕获系统捕捉到了它。
The Symantec Corporation, a maker of computer security software and services based in Silicon Valley, snared it in a global malware collection system.
这个让罪犯在受害者电脑上运行恶意代码的漏洞,于2008年首次被发现,并已用于黑客竞赛。
The hole, which potentially allows criminals to run malicious code on their victim's computers, was first discovered in 2008 and has been used in hacking competitions.
恶意代码可以隐藏在字体中,当用户打开PD F文档时自动加载,从而允许黑客完全控制手机。
Malicious code can be hidden in fonts that automatically load when a user opens a PDF file, allowing a hacker to take control of the device.
恶意代码可以隐藏在字体中,当用户打开PD F文档时自动加载,从而允许黑客完全控制手机。
Malicious code can be hidden in fonts that automatically load when a user opens a PDF file, allowing a hacker to take control of the device.
应用推荐