• I have already described important structures of the kernel memory, so now we can use this knowledge to find evidence in the physical memory of the compromised machine.

    目前为止,已经所有内核进行内存管理重要数据结构介绍了一遍,接下来,我们就可以前面所讲的知识对目标计算机进行物理内存镜像的分析了。

    youdao

  • Earlier this month, a problem was discovered in Google's new web browser, Google Chrome, that would have allowed an attacker to launch and run scripts on a compromised machine.

    本月初的时候,有人GoogleChrome浏览器里发现了一个问题允许攻击在中招的电脑上启动运行脚本。

    youdao

  • So, what happens when data stored on a virtual machine get compromised?

    那么如果存储虚拟数据失去安全保障时怎么办?

    youdao

  • If a malicious user gets hold of this key information, then the security of that host machine can be compromised very easily.

    如果恶意用户获得了这些密钥信息那么主机安全性容易受到威胁。

    youdao

  • As with any other Web applications, it is best to end the browser session to be safe of any future exploits, if the user's machine is compromised.

    任何其他Web应用程序一样如果用户机器安全性受到威胁的话,最好结束浏览器会话规避将来安全隐患。

    youdao

  • Similarly, storing the database or database-access information on the machine on which the Web server is running can introduce security problems if that system is penetrated and compromised.

    同样如果系统侵入并受到破坏,那么数据库数据库访问信息存储正在运行Web服务器机器上会引发安全性问题

    youdao

  • Then there's also the legality of taking action against a hacker who has compromised a machine, after all the heavy forensics are done.

    然后还有已经损害台机器一位黑客采取行动合法性终究沉重辩论学

    youdao

  • Then there's also the legality of taking action against a hacker who has compromised a machine, after all the heavy forensics are done.

    然后还有已经损害台机器一位黑客采取行动合法性终究沉重辩论学

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定