• 新西兰安全研究者Simon Howard运营备受争议的“病毒检测”竞赛允许各个参赛队伪装计算机病毒代码漏洞利用代码样本

    The controversial Race to Zero contest, run by New Zealand security researcher Simon Howard, allowed each team to try to obfuscate real computer viruses and exploit code samples.

    youdao

  • 另一种找到确保软件开发人员编写代码缺陷的方法,这样黑客更少的安全漏洞可以利用

    Another is to find ways to ensure that software developers produce code with fewer flaws in it so that hackers have fewer security holes to exploit.

    youdao

  • 微软为了利用这个安全漏洞黑客必须欺骗用户访问一个装载恶意代码网站

    To exploit the security hole, hackers must trick users into visiting a Web site loaded with malicious code, Microsoft said.

    youdao

  • JohnnyLong一位著名安全研究者,他深入研究过Google黑客他说防备可能利用代码搜索进行的寻找开发者程序中的漏洞并不容易

    Defending against the possible use of Code search to find flaws in a developer's program is not easy, said Johnny Long, a well-known security researcher that has researched Google hacking extensively.

    youdao

  • 根据微软所述,恶意站点可以利用漏洞用户机器运行代码

    According to Microsoft, the vulnerability allows a malicious web site to run code on a client's machine.

    youdao

  • 攻击成功利用漏洞可以执行任意代码

    An attacker who successfully exploited this vulnerability could run arbitrary code as the logged-on user.

    youdao

  • 红色代码利用微软软件中的一个漏洞最早网络蠕虫之一。

    Code Red "use of Microsoft software in a loophole, is one of the first network worm."

    youdao

  • 当地利用多个漏洞使攻击内核执行任意代码

    Local exploitation of multiple vulnerabilities allow an attacker to execute arbitrary code in kernel context.

    youdao

  • 该文讨论了缓冲区溢出漏洞产生原理一般攻击手段然后分析利用缓冲区溢出漏洞攻击代码给出了攻击代码主要特征

    In this paper, the principles and the attack methods of the overflows are discussed, and the main features of the exploits are given after the analysis on the exploits.

    youdao

  • 最后手工测试分析产生异常文档,分析漏洞形成原因从中寻找可以利用达到代码执行漏洞

    Finally, manually test and analyze the created exceptional document to find out the cause of the vulnerability with the aim to find the vulnerability can be used to run codes.

    youdao

  • 如果执行任何安全检查的情况下断言安全权限,则代码留下利用的安全漏洞

    Asserting a security permission without performing any security checks can leave an exploitable security weakness in your code.

    youdao

  • 如果执行任何安全检查的情况下断言安全权限,则代码留下利用的安全漏洞

    Asserting a security permission without performing any security checks can leave an exploitable security weakness in your code.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定