注入攻擊 的英文怎麼說

中文拼音 [zhùgōng]
注入攻擊 英文
implant attack
  • : Ⅰ動詞1 (灌入) pour; irrigate 2 (集中) concentrate on; fix on; focus on 3 (用文字來解釋字句)...
  • : Ⅰ動詞1 (進來或進去) enter 2 (參加) join; be admitted into; become a member of 3 (合乎) conf...
  • : Ⅰ動詞1 (攻打) attack; assault; take the offensive 2 (指責別人的過錯; 駁斥別人的議論) accuse; ...
  • 注入 : pour into; empty into; inpouring; injection; infusion [拉丁語]; infunde [法國]; abouchement; influxion
  • 攻擊 : 1 (進攻) attack; assault; launch an offensive 2 (惡意指責) attack; accuse; charge; slander; v...
  1. Because the inserted command may have additional strings appended to it before it is executed, the malefactor terminates the injected string with a comment mark " - "

    由於插的命令可能在執行前追加其他字元串,因此者將用釋標記「 - - 」來終止的字元串。
  2. Sql server injection attack sql server

  3. In chapter 2, a general digital watermarking frame is presented, including the generation, embedding and detection of watermark. in chapter 3, the concept of watermarking channel is presented, the modes of watermarking channel and image dct coefficients is proposed, the capacity of watermarking channel is evaluated by embedding watermarks to selected still image dct coefficients in direct spread spectrum. in chapter 4, a watermarking algorithms based wavelet multi - resolution is presented, by conjunction with human visual model, it keeps invisibility of watermark in host image and need not original image during detection

    數字水印是一種新的數字媒體保護技術,它是將特定的信息(如版權信息、秘密消息等)嵌到圖象、語音、視頻等各種數字媒體中,以達到版權保護等目的,同時,這種信息對宿主媒體的影響不足以引起人們的意且有特定的恢復方法,此信息對非法接收者應該是不可見的,本文主要對數字水印的一般框架,靜止圖象dct系數的理論容量,圖象水印的嵌和檢測,數字媒體防篡改以及數字水印的等問題進行了研究,提出了兩個新的水印算演算法。
  4. Follow best practices to help avoid attacks, such as sql injection attacks

    遵循最佳做法有助於避免一些,如sql
  5. Specifies whether asp. net should check the request header for potential injection attacks

    指定asp . net是否應檢查請求標頭,以檢測可能的
  6. This defeats header - injection attacks by making the injected material part of the same header line

    這會使的內容成為同一標頭行的一部分,從而使標頭失效。
  7. That are found in response headers. this is to avoid injection attacks that exploit an application that echoes untrusted data contained by the header

    這是為了避免利用能回顯標頭中包含的不受信任數據的應用程序進行
  8. You need to plan for security during the design phase of the project, as well as plan how security will be maintained over the lifetime of the application

    因此,必須確保用戶輸不會插到已在執行的命令。遵守這些原則可以幫助您抵禦sql
  9. When creating a custom role provider, ensure that you follow security best practices to avoid attacks such as sql injection attacks when working with a database

    創建自定義角色提供程序時,請確保遵循安全性最佳實踐,以避免受到(如在使用數據庫時受到sql) 。
  10. When creating a custom membership provider, ensure that you follow security best practices to avoid attacks such as sql - injection attacks when working with a database

    創建自定義成員資格提供程序時,請確保遵循安全最佳做法,以避免在使用數據庫時受到,如sql
  11. To avoid sql injection attacks, follow these guidelines

    若要避免sql注入攻擊,請遵循以下準則:
  12. To avoid script injection attacks, follow these guidelines

    若要避免腳本注入攻擊,請遵循以下準則:
  13. Using the execute statement to execute a string facilitates sql injection attacks

    使用execute語句執行字元串容易受到sql注入攻擊
  14. This topic provides examples of injection attacks, and specific steps you can take to prevent them

    本主題提供了注入攻擊的示例以及防範這種所需的具體步驟。
  15. Property to ensure that it renders properly, and to protect against script injection attacks

    屬性的字元串進行編碼,以確保它正確呈現並保護它不受腳本注入攻擊
  16. Property of a response to the default setting

    屬性的默認設置,可以部分避免標頭注入攻擊
  17. Inject content of the attacker ' s choosing

    注入攻擊者所選的內容。
  18. For example, the stored procedure that is created by the following script is vulnerable to injection enabled by truncation

    例如,以下腳本創建的存儲過程容易受到由截斷啟用的注入攻擊
  19. A script injection attack attempts to send executable script to your application with the intent of having other users run it

    腳本注入攻擊試圖向應用程序發送可執行的腳本,意欲使其他用戶運行該腳本。
  20. Custom profile providers when creating a custom profile provider for database access, ensure that you follow security best practices to prevent attacks such as sql injection attacks

    在創建用於數據庫訪問的自定義配置文件提供程序時,請確保遵守最佳安全做法以防止如sql注入攻擊等一些
分享友人