攻擊程序 的英文怎麼說
中文拼音 [gōngjīchéngxù]
攻擊程序
英文
attacker- 攻 : Ⅰ動詞1 (攻打) attack; assault; take the offensive 2 (指責別人的過錯; 駁斥別人的議論) accuse; ...
- 程 : 名詞1 (規章; 法式) rule; regulation 2 (進度; 程序) order; procedure 3 (路途; 一段路) journe...
- 攻擊 : 1 (進攻) attack; assault; launch an offensive 2 (惡意指責) attack; accuse; charge; slander; v...
- 程序 : 1 (進行次序) order; procedure; course; sequence; schedule; ground rule; routing process 2 [自動...
-
The software vendors argued that public disclosure gave attackers the blueprints to create exploitative programs and viruses
軟體銷售商認為公開披露為攻擊者提供了建立可開發程序的設計圖和病毒。In the past ten years, stack overflow has become one of most common attacks. smashing stack is a kind of systemly attack, which usually write overlong contents in application frame in order to change the control flow to invader
堆棧溢出指的是一種系統攻擊的手段,通過往程序的堆棧寫超出其長度的內容,造成堆棧的溢出,使程序轉而執行其它指令,以達到攻擊的目的。There is a time limit of ten seconds for posting one post after another, in order to prevent some malicious users to attack our forum by way of excessive posting
發布兩個帖子的最小時間間隔目前設定為10秒,這是為了防止惡意用戶使用灌水程序對論壇進行攻擊。These attacks are made using a web browser and knowledge of web applications, using them in ways that were not intended by the developers. they pass right through the firewall and go undetected by intrusion - detection solutions, which do not monitor this line of communication
利用網站瀏覽器和網站應用程序的知識構成這些攻擊,以開發人員不是刻意用的方法使用這些攻擊,它們正確通過防火墻和沒有被入侵探測解決方案檢測到,因為這些方案沒有監視這行通信。The following six threat categories can help you identify vulnerabilities and potential attack vectors in your own applications
以下六種威脅類別可以幫助您確定自己的應用程序中的漏洞以及可能受到的攻擊范圍。Attackers can use this fact to " slip through " data validators to attack programs
攻擊者可以利用這一點來「騙過」數據驗證來攻擊程序。And one of the most common ways to attack programs is to exploit how they make requests to other programs
攻擊程序使用的最常見方式之一就是利用這些程序向其他程序發出請求的方式。On the one hand, the combination of information techenology with governmant management, finance, public service, education, medical treatment, traditional business brings a big new market ; on the other hand, although the computerization brings high efficiency and friendly service, it also brings the threat, risk and duty. the information on web is often to be wiretapped, to be tampered or to be destroyed. all kinds of network attack programs are to be diffused
一方面,信息技術與政府管理、金融、公共服務、教育、醫療和傳統商務的結合帶來了一個巨大的新市場;另一方面,信息化在帶來高效率和友好服務的同時,也帶來了威脅、風險和責任,網上信息被竊、被篡改、被破壞的事件時有發生,各種網路攻擊程序的廣泛傳播更使人們憂心忡忡。The characteristic of anomaly traffics is that it breaks out without any omen and can destroy networks and computers in a short time ( for instance, the outburst of traffic behavior caused by specific attack programs or worm burst ). therefore, to detect anomaly rapidly and accurately is one of the precondition of ensuring the efficient network operation and detection of anomalous traffic has become the attractive and valuable subject in the present academic and industrial circles
異常流量的特點是發作突然,先兆特徵未知,可以在短時間內給網路或網路上的計算機帶來極大的危害(例如由特定的攻擊程序或蠕蟲爆發所引起的突發流量行為) ,因此準確、快速地檢測網路流量的異常行為,並做出合理的響應是保證網路有效運行的前提之一,也是目前學術界和工業界共同關注的前沿課題之一。Completely blocking hacker attacks, trojans and other network risks, the protection of the internet account, qq passwords, online account information such as not being stolen
徹底阻擋黑客攻擊、木馬程序等網路危險,保護上網帳號、 qq密碼、網游帳號等信息不被竊取。That are found in response headers. this is to avoid injection attacks that exploit an application that echoes untrusted data contained by the header
這是為了避免利用能回顯標頭中包含的不受信任數據的應用程序進行注入式攻擊。When creating a custom role provider, ensure that you follow security best practices to avoid attacks such as sql injection attacks when working with a database
創建自定義角色提供程序時,請確保遵循安全性最佳實踐,以避免受到攻擊(如在使用數據庫時受到sql注入式攻擊) 。When creating a custom membership provider, ensure that you follow security best practices to avoid attacks such as sql - injection attacks when working with a database
創建自定義成員資格提供程序時,請確保遵循安全最佳做法,以避免在使用數據庫時受到攻擊,如sql注入式攻擊。When creating a custom session - state store provider, ensure that you follow security best practices to avoid attacks such as sql injection attacks when working with a database
創建自定義會話狀態存儲提供程序時,確保遵循安全性最佳做法以避免在使用數據庫時遭受攻擊(如sql注入式攻擊) 。An application that does not properly validate user input can suffer from many types of malformed input attacks, including cross - site scripting and microsoft sql server injection attacks
如果應用程序不能正確驗證用戶輸入,則可能會受到多種類型的格式錯誤的輸入的攻擊,包括跨站點腳本攻擊和microsoft sql server注入式攻擊。Police clew, fund investor does business in the bank on the net when, should open virus real time supervisory system, do not visit doubtful website at the same time, download runs doubtful file and program to prevent virus to atttack, input password should use soft keyboard as far as possible
警方提示,基金投資者在網上銀行進行交易時,應開啟病毒實時監控系統,同時不要訪問可疑網站,下載運行可疑的文件和程序防止病毒攻擊,輸入密碼應盡可能使用軟鍵盤。Getting access to the wireless network should not give someone the " keys to the kingdom. " more importantly, critical applications that depend on real - time transactions cannot be protected from denial of service attacks and should not run on a wireless network
接入無線網路應該不是給予某人「王國的鑰匙」 。更重要的是,依賴于實時事務的關鍵應用程序不能免受拒絕服務攻擊,因此它不應該在無線網路上運行。Note : sql server 2000 evaluation edition release a contains an update that protects against the slammer worm
說明: sql server 2000評估版版本a包含抵禦slammer蠕蟲病毒攻擊的更新程序。Sql critical update scans the computer on which it is running for instances of sql server 2000 and msde 2000 that are vulnerable to the slammer worm, and updates the affected files
Sql關鍵更新掃描運行容易受到slammer蠕蟲程序攻擊的sql server 2000和msde 2000實例的計算機,並更新被感染的文件。Sql scan sqlscan. exe scans an individual computer, a windows domain, or a range of ip addresses for instances of sql server 2000 and msde 2000, and identifies instances that may be vulnerable to the slammer worm
Sql掃描程序sqlscan . exe可以掃描單獨的計算機windows域或特定范圍的ip地址,並可以識別出易受slammer蠕蟲程序攻擊的sql server實例。分享友人