注入攻擊 的英文怎麼說
中文拼音 [zhùrùgōngjī]
注入攻擊
英文
implant attack- 注 : Ⅰ動詞1 (灌入) pour; irrigate 2 (集中) concentrate on; fix on; focus on 3 (用文字來解釋字句)...
- 入 : Ⅰ動詞1 (進來或進去) enter 2 (參加) join; be admitted into; become a member of 3 (合乎) conf...
- 攻 : Ⅰ動詞1 (攻打) attack; assault; take the offensive 2 (指責別人的過錯; 駁斥別人的議論) accuse; ...
- 注入 : pour into; empty into; inpouring; injection; infusion [拉丁語]; infunde [法國]; abouchement; influxion
- 攻擊 : 1 (進攻) attack; assault; launch an offensive 2 (惡意指責) attack; accuse; charge; slander; v...
-
Because the inserted command may have additional strings appended to it before it is executed, the malefactor terminates the injected string with a comment mark " - "
由於插入的命令可能在執行前追加其他字元串,因此攻擊者將用注釋標記「 - - 」來終止注入的字元串。Sql server injection attack sql server
注入式攻擊In chapter 2, a general digital watermarking frame is presented, including the generation, embedding and detection of watermark. in chapter 3, the concept of watermarking channel is presented, the modes of watermarking channel and image dct coefficients is proposed, the capacity of watermarking channel is evaluated by embedding watermarks to selected still image dct coefficients in direct spread spectrum. in chapter 4, a watermarking algorithms based wavelet multi - resolution is presented, by conjunction with human visual model, it keeps invisibility of watermark in host image and need not original image during detection
數字水印是一種新的數字媒體保護技術,它是將特定的信息(如版權信息、秘密消息等)嵌入到圖象、語音、視頻等各種數字媒體中,以達到版權保護等目的,同時,這種信息對宿主媒體的影響不足以引起人們的注意且有特定的恢復方法,此信息對非法接收者應該是不可見的,本文主要對數字水印的一般框架,靜止圖象dct系數的理論容量,圖象水印的嵌入和檢測,數字媒體防篡改以及數字水印的攻擊等問題進行了研究,提出了兩個新的水印算演算法。Follow best practices to help avoid attacks, such as sql injection attacks
遵循最佳做法有助於避免一些攻擊,如sql注入式攻擊。Specifies whether asp. net should check the request header for potential injection attacks
指定asp . net是否應檢查請求標頭,以檢測可能的注入式攻擊。This defeats header - injection attacks by making the injected material part of the same header line
這會使注入的內容成為同一標頭行的一部分,從而使標頭注入式攻擊失效。That are found in response headers. this is to avoid injection attacks that exploit an application that echoes untrusted data contained by the header
這是為了避免利用能回顯標頭中包含的不受信任數據的應用程序進行注入式攻擊。You need to plan for security during the design phase of the project, as well as plan how security will be maintained over the lifetime of the application
因此,必須確保用戶輸入不會插入到已在執行的命令。遵守這些原則可以幫助您抵禦sql注入式攻擊:When creating a custom role provider, ensure that you follow security best practices to avoid attacks such as sql injection attacks when working with a database
創建自定義角色提供程序時,請確保遵循安全性最佳實踐,以避免受到攻擊(如在使用數據庫時受到sql注入式攻擊) 。When creating a custom membership provider, ensure that you follow security best practices to avoid attacks such as sql - injection attacks when working with a database
創建自定義成員資格提供程序時,請確保遵循安全最佳做法,以避免在使用數據庫時受到攻擊,如sql注入式攻擊。To avoid sql injection attacks, follow these guidelines
若要避免sql注入攻擊,請遵循以下準則:To avoid script injection attacks, follow these guidelines
若要避免腳本注入攻擊,請遵循以下準則:Using the execute statement to execute a string facilitates sql injection attacks
使用execute語句執行字元串容易受到sql注入攻擊。This topic provides examples of injection attacks, and specific steps you can take to prevent them
本主題提供了注入攻擊的示例以及防範這種攻擊所需的具體步驟。Property to ensure that it renders properly, and to protect against script injection attacks
屬性的字元串進行編碼,以確保它正確呈現並保護它不受腳本注入攻擊。Property of a response to the default setting
屬性的默認設置,可以部分避免標頭注入攻擊。Inject content of the attacker ' s choosing
注入攻擊者所選的內容。For example, the stored procedure that is created by the following script is vulnerable to injection enabled by truncation
例如,以下腳本創建的存儲過程容易受到由截斷啟用的注入攻擊。A script injection attack attempts to send executable script to your application with the intent of having other users run it
腳本注入攻擊試圖向應用程序發送可執行的腳本,意欲使其他用戶運行該腳本。Custom profile providers when creating a custom profile provider for database access, ensure that you follow security best practices to prevent attacks such as sql injection attacks
在創建用於數據庫訪問的自定義配置文件提供程序時,請確保遵守最佳安全做法以防止如sql注入攻擊等一些攻擊。分享友人