攻擊程序 的英文怎麼說

中文拼音 [gōngchéng]
攻擊程序 英文
attacker
  • : Ⅰ動詞1 (攻打) attack; assault; take the offensive 2 (指責別人的過錯; 駁斥別人的議論) accuse; ...
  • : 名詞1 (規章; 法式) rule; regulation 2 (進度; 程序) order; procedure 3 (路途; 一段路) journe...
  • 攻擊 : 1 (進攻) attack; assault; launch an offensive 2 (惡意指責) attack; accuse; charge; slander; v...
  • 程序 : 1 (進行次序) order; procedure; course; sequence; schedule; ground rule; routing process 2 [自動...
  1. The software vendors argued that public disclosure gave attackers the blueprints to create exploitative programs and viruses

    軟體銷售商認為公開披露為者提供了建立可開發的設計圖和病毒。
  2. In the past ten years, stack overflow has become one of most common attacks. smashing stack is a kind of systemly attack, which usually write overlong contents in application frame in order to change the control flow to invader

    堆棧溢出指的是一種系統的手段,通過往的堆棧寫超出其長度的內容,造成堆棧的溢出,使轉而執行其它指令,以達到的目的。
  3. There is a time limit of ten seconds for posting one post after another, in order to prevent some malicious users to attack our forum by way of excessive posting

    發布兩個帖子的最小時間間隔目前設定為10秒,這是為了防止惡意用戶使用灌水對論壇進行
  4. These attacks are made using a web browser and knowledge of web applications, using them in ways that were not intended by the developers. they pass right through the firewall and go undetected by intrusion - detection solutions, which do not monitor this line of communication

    利用網站瀏覽器和網站應用的知識構成這些,以開發人員不是刻意用的方法使用這些,它們正確通過防火墻和沒有被入侵探測解決方案檢測到,因為這些方案沒有監視這行通信。
  5. The following six threat categories can help you identify vulnerabilities and potential attack vectors in your own applications

    以下六種威脅類別可以幫助您確定自己的應用中的漏洞以及可能受到的范圍。
  6. Attackers can use this fact to " slip through " data validators to attack programs

    者可以利用這一點來「騙過」數據驗證來攻擊程序
  7. And one of the most common ways to attack programs is to exploit how they make requests to other programs

    攻擊程序使用的最常見方式之一就是利用這些向其他發出請求的方式。
  8. On the one hand, the combination of information techenology with governmant management, finance, public service, education, medical treatment, traditional business brings a big new market ; on the other hand, although the computerization brings high efficiency and friendly service, it also brings the threat, risk and duty. the information on web is often to be wiretapped, to be tampered or to be destroyed. all kinds of network attack programs are to be diffused

    一方面,信息技術與政府管理、金融、公共服務、教育、醫療和傳統商務的結合帶來了一個巨大的新市場;另一方面,信息化在帶來高效率和友好服務的同時,也帶來了威脅、風險和責任,網上信息被竊、被篡改、被破壞的事件時有發生,各種網路攻擊程序的廣泛傳播更使人們憂心忡忡。
  9. The characteristic of anomaly traffics is that it breaks out without any omen and can destroy networks and computers in a short time ( for instance, the outburst of traffic behavior caused by specific attack programs or worm burst ). therefore, to detect anomaly rapidly and accurately is one of the precondition of ensuring the efficient network operation and detection of anomalous traffic has become the attractive and valuable subject in the present academic and industrial circles

    異常流量的特點是發作突然,先兆特徵未知,可以在短時間內給網路或網路上的計算機帶來極大的危害(例如由特定的攻擊程序或蠕蟲爆發所引起的突發流量行為) ,因此準確、快速地檢測網路流量的異常行為,並做出合理的響應是保證網路有效運行的前提之一,也是目前學術界和工業界共同關注的前沿課題之一。
  10. Completely blocking hacker attacks, trojans and other network risks, the protection of the internet account, qq passwords, online account information such as not being stolen

    徹底阻擋黑客、木馬等網路危險,保護上網帳號、 qq密碼、網游帳號等信息不被竊取。
  11. That are found in response headers. this is to avoid injection attacks that exploit an application that echoes untrusted data contained by the header

    這是為了避免利用能回顯標頭中包含的不受信任數據的應用進行注入式
  12. When creating a custom role provider, ensure that you follow security best practices to avoid attacks such as sql injection attacks when working with a database

    創建自定義角色提供時,請確保遵循安全性最佳實踐,以避免受到(如在使用數據庫時受到sql注入式) 。
  13. When creating a custom membership provider, ensure that you follow security best practices to avoid attacks such as sql - injection attacks when working with a database

    創建自定義成員資格提供時,請確保遵循安全最佳做法,以避免在使用數據庫時受到,如sql注入式
  14. When creating a custom session - state store provider, ensure that you follow security best practices to avoid attacks such as sql injection attacks when working with a database

    創建自定義會話狀態存儲提供時,確保遵循安全性最佳做法以避免在使用數據庫時遭受(如sql注入式) 。
  15. An application that does not properly validate user input can suffer from many types of malformed input attacks, including cross - site scripting and microsoft sql server injection attacks

    如果應用不能正確驗證用戶輸入,則可能會受到多種類型的格式錯誤的輸入的,包括跨站點腳本和microsoft sql server注入式
  16. Police clew, fund investor does business in the bank on the net when, should open virus real time supervisory system, do not visit doubtful website at the same time, download runs doubtful file and program to prevent virus to atttack, input password should use soft keyboard as far as possible

    警方提示,基金投資者在網上銀行進行交易時,應開啟病毒實時監控系統,同時不要訪問可疑網站,下載運行可疑的文件和防止病毒,輸入密碼應盡可能使用軟鍵盤。
  17. Getting access to the wireless network should not give someone the " keys to the kingdom. " more importantly, critical applications that depend on real - time transactions cannot be protected from denial of service attacks and should not run on a wireless network

    接入無線網路應該不是給予某人「王國的鑰匙」 。更重要的是,依賴于實時事務的關鍵應用不能免受拒絕服務,因此它不應該在無線網路上運行。
  18. Note : sql server 2000 evaluation edition release a contains an update that protects against the slammer worm

    說明: sql server 2000評估版版本a包含抵禦slammer蠕蟲病毒的更新
  19. Sql critical update scans the computer on which it is running for instances of sql server 2000 and msde 2000 that are vulnerable to the slammer worm, and updates the affected files

    Sql關鍵更新掃描運行容易受到slammer蠕蟲的sql server 2000和msde 2000實例的計算機,並更新被感染的文件。
  20. Sql scan sqlscan. exe scans an individual computer, a windows domain, or a range of ip addresses for instances of sql server 2000 and msde 2000, and identifies instances that may be vulnerable to the slammer worm

    Sql掃描sqlscan . exe可以掃描單獨的計算機windows域或特定范圍的ip地址,並可以識別出易受slammer蠕蟲的sql server實例。
分享友人