注入式攻擊 的英文怎麼說

中文拼音 [zhùshìgōng]
注入式攻擊 英文
sql server injection attack sql server
  • : Ⅰ動詞1 (灌入) pour; irrigate 2 (集中) concentrate on; fix on; focus on 3 (用文字來解釋字句)...
  • : Ⅰ動詞1 (進來或進去) enter 2 (參加) join; be admitted into; become a member of 3 (合乎) conf...
  • : 名詞1 (樣式) type; style 2 (格式) pattern; form 3 (儀式; 典禮) ceremony; ritual 4 (自然科...
  • : Ⅰ動詞1 (攻打) attack; assault; take the offensive 2 (指責別人的過錯; 駁斥別人的議論) accuse; ...
  • 注入 : pour into; empty into; inpouring; injection; infusion [拉丁語]; infunde [法國]; abouchement; influxion
  • 攻擊 : 1 (進攻) attack; assault; launch an offensive 2 (惡意指責) attack; accuse; charge; slander; v...
  1. Sql server injection attack sql server

    注入式攻擊
  2. Follow best practices to help avoid attacks, such as sql injection attacks

    遵循最佳做法有助於避免一些,如sql注入式攻擊
  3. Specifies whether asp. net should check the request header for potential injection attacks

    指定asp . net是否應檢查請求標頭,以檢測可能的注入式攻擊
  4. This defeats header - injection attacks by making the injected material part of the same header line

    這會使的內容成為同一標頭行的一部分,從而使標頭注入式攻擊失效。
  5. That are found in response headers. this is to avoid injection attacks that exploit an application that echoes untrusted data contained by the header

    這是為了避免利用能回顯標頭中包含的不受信任數據的應用程序進行注入式攻擊
  6. You need to plan for security during the design phase of the project, as well as plan how security will be maintained over the lifetime of the application

    因此,必須確保用戶輸不會插到已在執行的命令。遵守這些原則可以幫助您抵禦sql注入式攻擊
  7. When creating a custom role provider, ensure that you follow security best practices to avoid attacks such as sql injection attacks when working with a database

    創建自定義角色提供程序時,請確保遵循安全性最佳實踐,以避免受到(如在使用數據庫時受到sql注入式攻擊) 。
  8. When creating a custom membership provider, ensure that you follow security best practices to avoid attacks such as sql - injection attacks when working with a database

    創建自定義成員資格提供程序時,請確保遵循安全最佳做法,以避免在使用數據庫時受到,如sql注入式攻擊
  9. When creating a custom session - state store provider, ensure that you follow security best practices to avoid attacks such as sql injection attacks when working with a database

    創建自定義會話狀態存儲提供程序時,確保遵循安全性最佳做法以避免在使用數據庫時遭受(如sql注入式攻擊) 。
  10. An application that does not properly validate user input can suffer from many types of malformed input attacks, including cross - site scripting and microsoft sql server injection attacks

    如果應用程序不能正確驗證用戶輸,則可能會受到多種類型的格錯誤的輸,包括跨站點腳本和microsoft sql server注入式攻擊
  11. But this presents some risk, because a malicious user could insert inappropriate data, or attempt a script injection attack, using the ability to edit string - typed properties. as a security practice, if you create custom

    不過,這一功能帶來了一定的風險,因為惡意用戶可以藉助此功能編輯字元串類型的屬性,從而插不恰當的數據或者試圖發起腳本注入式攻擊
  12. For the sake of achieving the whole view of attacker ' s action, so as to keep away the intrusion of attacker ultimately, we must open up our eyes on multiple network and multiple kinds of defending system, and perform intrusion detection to obtain the whole view of attacker ' s action from multiple distributed system, as opposed to a much more common network centered viewpoint

    為了獲得者行為的更加完整的圖象,從根本上防範者的侵,我們必須把視野拓展到多個網路和多個類型的防護系統,這樣不再把單一網路作為關焦點,而是從多個分散系統收集和分析數據以獲得者行為的完整圖象。
  13. At the same time, it also realizes interaction among ids, honeypot and firewall. this article also brings forward the embedded honey technology projects, which enhances the network camouflaging effect and increases hacker ' s work remarkably. besides, it sets forth the concept of lan simulation for the first time and mocks every network service to attract the attention of hacker in order to let them attack the dummy net

    在863計劃- - -黑客監控系統中,提出了嵌honey的技術方案,增強了欺騙效果,顯著的增大了黑客的工作量,進一步提出了局域網模擬的概念,設計和實現了模擬局域網,用一臺或少量幾臺主機模擬出了一個網路,並模擬出了各種網路服務,用以吸引黑客的意力,誘使黑客虛擬網。
分享友人