buffer overflow attack 中文意思是什麼

buffer overflow attack 解釋
緩沖區溢滿式攻擊
  • buffer : n 1 【機械工程】緩沖器,緩沖墊;阻尼器,減震器;消聲器。2 【化學】緩沖,緩沖劑。3 緩沖者;緩沖物...
  • overflow : vt ( flowed flown; flowing) 使溢出,使泛濫,使漲滿;淹沒;人滿得走不進(房間等)。 The river ov...
  • attack : vt 1 攻擊 (opp defend)。2 非難,抨擊。3 著手,動手,投入。4 (疾病)侵襲。5 【化學】腐蝕。n 1 ...
  1. 4. presentation of buffer overflow attack model based on category theory. buffer overflow attack model based on category theory is brought forward in the paper by exploring the process of buffer overflow attack and systematically summarize its attack process

    4 .給出了以范疇論描述的緩沖區溢出攻擊模型通過對緩沖區攻擊過程的研究,提出了以范疇論描述的緩沖區溢出攻擊模型,對緩沖區溢出攻擊過程進行了系統地總結。
  2. Stack smashing is the worst sort of buffer overflow attack, especially when the stack being smashed is running in privileged mode. an elegant solution to this problem is non - executable stacks

    最終的操作取決于檢測到的安全性威脅的當前級別,並被轉發到代理服務器以傳遞給發出該請求的客戶機。
  3. 5. presentation of defensive measure against attack process three stages. corresponding defensive measure is presented against the three stages of attack process by researching of buffer overflow defense technique

    5 .針對攻擊過程的三個關鍵步驟提出了防禦方法對緩沖區溢出漏洞的防禦技術進行了研究,並針對攻擊過程的三個階段給出了相應的防禦方法。
  4. In this paper, technology of ddos and design of d - gun are introduced. totally it is divided into six parts, the first of part is introduction. the second part is interrelated technology about d - gun, including ddos principium, ports - scan, buffer overflow attack, backdoor and raw socket

    第二部分介紹相關技術基礎,主要討論了ddos原理和實現ddos自動傳播執行所需具備的相關技術,包括埠掃描技術、遠程入侵技術、后門技術,以及tcp / ip協議應用中的原始套接字。
  5. The shellcode of key technique about buffer overflow attack is realized in the paper ( including breaking through operating system and its firewall, uploading and downloading attack files )

    包括如何突破系統限制、突破防火墻、攻擊文件的上傳和下載等關鍵技術核心代碼的實現。
  6. Buffer overflow attack technology is a very efficient attack technology based on network

    緩沖區溢出攻擊技術是一項十分有效的網路攻擊技術。
  7. Buffer overflow attack mainly includes stack overflow, heap overflow and format string overflow and so on

    緩沖區溢出主要分為堆棧溢出、堆溢出和格式化字元串溢出等。
  8. The article illustrates architecture of the buffer overflow attack platform developed by our project group

    文章還介紹了項目組開發的緩沖區溢出攻擊軟體的框架和功能實現。
  9. Buffer overflow attack is the main measure of hacker ’ s attack. it has done more and more harm to information security

    緩沖區溢出攻擊是黑客攻擊的主要手段,給網路信息安全帶來了越來越大的危害。
  10. Localization formula is presented in this paper for this purpose. 3. realization of buffer overflow attack key technique

    3 .緩沖區溢出攻擊中關鍵技術的代碼實現對緩沖區溢出攻擊中關鍵部分shellcode高級代碼進行了編寫。
  11. There can also be users of your software with no privileges at all. that means any successful buffer overflow attack will give them more privileges than they previously had

    將口令表放在您的皮夾里並沒什麼錯,只要您能管好您的皮夾,從不到處亂放該口令表。
  12. In the final two columns in this series, we ll examine the engine s workings and explain how a buffer overflow attack does its dirty work on particular architectures

    一種能稍微緩解這種情況的方式是在出現登錄失敗時進行記錄。自動攻擊可能在一兩秒鐘的時間內導致許多失敗的嘗試。
  13. Programs written in java code aren t susceptible to buffer overflow attacks, but such an attack can still throw an unexpected exception or even an error - potentially shutting down a server or other program

    使用java編寫的程序對緩沖區溢出攻擊並不敏感,但這樣的攻擊會導致不斷地拋出意外異常或錯誤可能導致服務器或其他程序關閉。
分享友人