首先,分析了武装直升机火箭对地射击的特点,确定了可攻击区;
Firstly, characteristics of air-to-land firing airborne rockets loaded in armed helicopter are analyzed and allowable attack area is defined.
让他们咬钩的关键在于给饵不规则的动作,并且让饵停留在攻击区更长的时间。
The key to getting them to bite is to use erratic presentations and lures that stay in the strike zone longer.
分析了连续波半主动雷达制导导弹导引头工作电磁环境和对武器系统攻击区的影响。
The magnetic environment in which the CW semi active radar guided missile's Homer works is analyzed and its influence on the attacking envelope of the weapon system is given.
该方法简洁实用,而且使用先进的快速模拟法计算导弹允许攻击区,使计算速度大大提高。
The method is concise and practical, and uses advanced "fast simulation method" to calculate missile launch boundary which makes calculating velocity much faster.
建立了空对地攻击的数学模型,导出了可攻击区、首攻概率、目标识别率和效能指标等计算方法。
A mathematical model of air-to-ground attack was thus developed, with which the accessible zone, probability of first attack destruction, rate of target recognition and CEP were derived.
提出在攻击航线与攻击区的相交段上,以综合杀伤概率最大化原则来选择多目标攻击的最佳发射点。
It is put forward that the optimal launch point should be selected in the common segment of attacking path and attacking area according to the rule of maximizing the overall kill probability.
研究的方法和结论,可供研究激光制导武器参考,为进一步研究其它条件下投放激光制导武器的攻击区打下基础。
The methods and conclusions herein researched can be for reference for studying laser guided weapons and lay a foundation for further research on dropping laser guided weapons in other conditions.
人类跟机器人战斗,人类在第九区攻击外星人,人类登上宇宙船。
Humans battling transforming robots. Humans attacking aliens in District 9. Humans aboard the Starship Enterprise.
可以将此检查与客户端的最大大小检查(以防止缓冲区过载攻击)一起运行,但由于有人能够使这些措施失效,因此还要在服务器端进行检查。
You can run this check along with a check for maximum size (to avoid buffer overload attacks) on the client side, but because anyone can thwart these measures, you also check on the server side.
如果程序无论如何还是使用了结果数据,那么攻击者会尝试填满缓冲区,以便在数据被截断时使用他希望的任何内容来填充缓冲区。
If the program USES the resulting data anyway, an attacker will try to fill up the buffer so that when the data is truncated, the attacker will fill the buffer with what the attacker wanted.
这种跟踪或重新计算很容易出错,而任何错误都可能给缓冲区攻击打开方便之门。
This tracking or recomputation is easy to get wrong, and any mistake can open the door to a buffer overflow attack.
基本上,如果攻击者能够溢出缓冲区的边界,麻烦或许就会找上你了。
Basically, if an attacker can overflow the bounds of a buffer, you're probably in trouble.
利用缓冲区溢出进行攻击可以改变这个过程,并且允许黑客执行任何他们期望的函数。
Attacking using a buffer overflow can change this process and allow an attacker to execute any function they wish.
在假日期间,两人聚首,一定程度上是因为市场对意大利发起攻击后接着对法国(核心的AAA -级欧元区成员国)发动攻击了。
The two came together in the holiday season partly because the markets had moved on from an assault on Italy to attack France, a core AAA-rated euro member.
有创造力的攻击者会透过摧毁堆叠利用缓冲区溢位的弱点,然后执行任何程序码。
A creative attacker can take advantage of a buffer overflow vulnerability through stack-smashing and then run arbitrary code (anything at all).
从根本上讲,所有这些方法都能减轻从程序接管攻击到拒绝服务攻击的缓冲区溢出攻击所带来的破坏。
Fundamentally, all these approaches reduce the damage of a buffer overflow attack from a program-takeover attack into a denial-of-service attack.
攻击者也许能够通过改变函数中其他数据的值来利用缓冲区溢出;没有哪种方法能够防止这点。
An attacker may be able to exploit a buffer overflow by changing the value of other data in the function; none of these approaches counter that.
内存空间缺口——通过栈溢出、缓冲区溢出或堆错误来实现,以宿主进程的权限执行攻击者提供的任何代码。
Memory space breach — Accomplished via stack overflow, buffer overrun, or heap error, enables execution of arbitrary code supplied by the attacker with the permissions of the host process.
任何允许外部实体来输入数据的程序都容易受到恶意的攻击,例如缓冲区溢出和嵌入式控制字符。
Any program that allows an external entity to input data is vulnerable to malicious activity, such as buffer overflows and embedded control characters.
例如,将一个ASCII 0字符压入缓冲区通常是很困难的,而该文介绍了攻击者一般如何能够解决这个问题。
For example, it's often difficult to put an ASCII 0 (NUL) character into a buffer, and the article shows how attackers can normally get around this problem.
在缓冲区溢出攻击的实例中,程序的内部值溢出,从而改变程序的运行方式。
In the instance of a buffer overflow attack, an internal value in a program is overflowed to alter how the program runs.
本系列的最后两个专栏,将检查引擎的工作并说明缓冲区溢位的攻击在特定系统架构上是如何进行破坏的。
In the final two columns in this series, we'll examine the engine's workings and explain how a buffer overflow attack does its dirty work on particular architectures.
这样使得操纵返回地址困难多了,但它不会阻止改变调用函数的数据的缓冲区溢出攻击。
This makes it much harder to manipulate the return address, but it doesn't defend against buffer overflow attacks that change the data of calling functions.
通常攻击者会使用它想要运行的恶意代码来使缓冲区溢出,然后攻击者会更改返回值以指向它们已发送的恶意代码。
Often the attacker will overrun the buffer with the malicious code the attacker wants to run, and the attacker will then change the return value to point to the malicious code they've sent.
如果攻击者能够导致缓冲区溢出,那么它就能控制程序中的其他值。
If an attacker can cause a buffer to overflow, then the attacker can control other values in the program.
如果有不怀好意的使用者覆写缓冲区,则会变更标志的值,从而指出攻击者是非法存取专用文件。
If a malicious user can overwrite the buffer, then the value of the flag can be changed, thus providing the attacker with illegal access to private files.
国家情报处将他们在部落区遭遇的大部分困难都归咎于美军的攻击。
Senior ISI officers attribute most of their troubles in the tribal areas to anger over the American strikes.
例如,外部使用者可以利用的网路伺服器程序中的缓冲区溢位,可能使攻击者登入到机器。
For example, a buffer overflow in a network server program that can be tickled by outside users may provide an attacker with a login on the machine.
例如,外部使用者可以利用的网路伺服器程序中的缓冲区溢位,可能使攻击者登入到机器。
For example, a buffer overflow in a network server program that can be tickled by outside users may provide an attacker with a login on the machine.
应用推荐