• Not surprisingly most of these preventative methods are the same methods you can and should use to prevent other typical code injection attacks.

    这些预防方法多数可以类似应用预防其他类型代码注入攻击

    youdao

  • Blind SQL injection attacks are a well know and recognized form of code injection attack, but there are many other forms, some not so well documented or understood.

    SQL攻击一种为人熟知代码注入攻击形式但是很多其他形式有些尚未得到很好的记载和了解。

    youdao

  • One of the more common attacks or threats to Web applications is some form of code injection, which Wikipedia defines as.

    一种常见Web应用程序攻击威胁某种形式代码注入Wikipedia将其定义为。

    youdao

  • The code in Figure 5 employs parameterized SQL to stop injection attacks.

    5中的代码使用参数化s QL阻止Injection攻击

    youdao

  • BitDefender detects and blocks attempts to change critical system files or registry entries and warns about attacks performed by code injection (DLL injection).

    比特梵德检测阻止试图改变计算机重要系统文件注册表的行为,并代码注入(DLL注入)攻击进行警告

    youdao

  • BitDefender detects and blocks attempts to change critical system files or registry entries and warns about attacks performed by code injection (DLL injection).

    比特梵德检测阻止试图改变计算机重要系统文件注册表的行为,并代码注入(DLL注入)攻击进行警告

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定