malicious use 中文意思是什麼

malicious use 解釋
惡意使用
  • malicious : adj 有惡意的,存心不良的,有敵意的;蓄意的;預謀的。 malicious mischief 蓄意破壞他人財產的行為。 ...
  • use : n 1 使用,利用,應用;使用的機會[需要]。2 使用的能力。3 使用的自由,使用權。4 使用法。5 用途;效...
  1. " as hackers sometimes take advantage of the holidays to launch their malicious programmes by concealing their viruses in festive greeting notes, parents should show their children how to guard against unauthorised intrusions into their system and ensure that they abide by the ethics and regulations on the proper use of computers and access to the cyber world on the internet

    由於黑客有時會利用假期發動惡意程式,把這些病毒隱藏於節日祝賀郵件內,家長應該教導子女怎樣保護系統免受未經授權的入侵,並確保他們遵守正確使用電腦及在上網的道德操守和規則。
  2. The vulnerability could allow a malicious user to use repeated attempts to guess an account password even if the domain administrator had set an account lockout policy

    該漏洞使惡意用戶可以反復嘗試猜測某個帳戶的密碼,即使是在域管理員已設置了帳戶鎖定策略的情況下。
  3. Malicious code executing on the same computer could use this as the basis of a denial - of - service attack

    在同一計算機上執行的惡意代碼可能以此作為一個切入點來發動拒絕服務攻擊。
  4. Discusses how to use the. net framework to erect barriers to malicious code and undesirable actions on the part of others

    討論如何使用. net framework建立阻止惡意代碼和其他人的不當操作的屏障。
  5. It checks out, and the malicious code appears safe for use

    它進行檢測,而惡意程式看起來安全可供使用。
  6. If you do, malicious code can alter the boundary definitions and use your code in unexpected ways

    否則,惡意代碼可能會更改邊界定義並以出乎意料的方式使用您的代碼。
  7. To avoid malicious attacks, the system provided are required to have id verification function and to prevent reproduction and protect intelligence property rights. a digital signature is required before the use of a service. the system should be able to track the invader and set up a blacklist

    要求提供的系統具有身份認證功能,以防惡意攻擊;享受服務要通過數字簽名,以防復制,保護知識產權;系統要能對侵入者進行追蹤,以便確定黑名單。
  8. Any code that passes the test and can reference your code can potentially break security by allowing malicious code to call using the authorized code. therefore, do not use

    時,任何通過了測試並且可以引用您的代碼的代碼,都可能會因為允許惡意代碼利用已授權的代碼進行調用而破壞安全性。
  9. Adding an assembly to the skip verification list creates a security vulnerability. a malicious assembly could use the fully specified assembly name assembly name, version, culture, and public key token of the assembly added to the skip verification list to fake its identity

    如果將某程序集添加到跳過驗證列表中,則惡意的程序集可以通過使用該程序集的完全限定程序集名稱來隱藏身份,完全限定程序集名稱由程序集名稱、版本、區域性和公鑰標記組成。
  10. Usually associated with young teens who collect and use simple malicious programs obtained from the internet

    通常,電腦黑客是那些收集和使用因特網上簡單惡意程序的十幾歲的年輕人。
  11. If you would like to run this tool more than once a month, run the version that is available from this web page or use the version on the malicious software removal tool web site

    如果您想要每月運行此工具多次,可以運行此網頁提供的版本或者使用惡意軟體刪除工具網站上的版本。
  12. However, because cookies are sent to the browser s computer, they are vulnerable to spoofing or other malicious use

    但是,由於cookie會被發送到瀏覽器所在的計算機,因此它們容易被假冒或用於其他惡意用途。
分享友人