• The controversial Race to Zero contest, run by New Zealand security researcher Simon Howard, allowed each team to try to obfuscate real computer viruses and exploit code samples.

    新西兰安全研究者Simon Howard运营备受争议的“病毒检测”竞赛允许各个参赛队伪装计算机病毒代码漏洞利用代码样本。

    youdao

  • Another is to find ways to ensure that software developers produce code with fewer flaws in it so that hackers have fewer security holes to exploit.

    另一种找到确保软件开发人员编写代码缺陷的方法,这样黑客更少的安全漏洞可以利用

    youdao

  • As described by one of its co-authors, John Goerzen, in a recent interview to o 'reilly, the book introduces Haskell with real code, real examples and tips to exploit in a business environment.

    作者之一johnGoerzen近日oReilly的访谈介绍此书现实代码、现实的例子技巧介绍Haskell业务环境中的应用。

    youdao

  • Macros exploit this fact by manipulating code as data before evaluating it.

    宏利这种事实,在求值之前代码作为数据操作

    youdao

  • To exploit the security hole, hackers must trick users into visiting a Web site loaded with malicious code, Microsoft said.

    微软为了利用这个安全漏洞黑客必须欺骗用户访问一个装载恶意代码网站

    youdao

  • InfoQ: Could you tell us the advantage of using JRuby over parse tree or any other solutions, to exploit Ruby code?

    InfoQ告诉我们使用JRuby而不是parsetree或者其他解决方案解析ruby代码优势吗?

    youdao

  • I don't get into the specifics of how to run each exploit or write shell code.

    并不详细介绍每个攻击如何运行或者编写shell代码

    youdao

  • Experts at Reliable Software Technologies examined the potentially vulnerable code and were unable to learn of a way to exploit any of the conditions.

    ReliableSoft wareTechnologies专家侦测了潜在易受攻击程序码并且未能掌握利用任何情况方法

    youdao

  • To exploit this, attackers send malformed JSON objects to these libraries so the eval function executes their malicious code.

    利用这点攻击者可以这些发送畸形JSON对象这样eval函数就会执行这些恶意代码

    youdao

  • Many well used UNIX applications, including LPR, xterm and eject, have been abused into giving up root through exploit of buffer overflow in suid regions of the code.

    许多得很好的UNIX应用程序包括lprxtermeject滥用,而程序码suid栏位利用缓冲区溢位放弃root权限。

    youdao

  • The developer produces Unified Modeling Language (UML) models that can be transformed to code that includes the code necessary to exploit the SOA infrastructure.

    开发人员生成统一建模语言(Unified Modeling Language,UML)模型,此类模型转换为相应的代码其中包含利用SOA基础结构所必需代码。

    youdao

  • Malicious code might be able exploit this to avoid permission checks.

    恶意代码可能利用一点避开权限检查。

    youdao

  • The recent rounds of viruses and worms that continue to plague the Internet have indicated an increasing level of activity among malicious code writers trying to exploit systems.

    最近一轮又一轮病毒蠕虫爆发因特网带来了灾难,表明恶意代码作者们企图破坏系统的活动级别不断上升。

    youdao

  • The recent rounds of viruses and worms that continue to plague the Internet have indicated an increasing level of activity among malicious code writers trying to exploit systems.

    最近一轮又一轮病毒蠕虫爆发因特网带来了灾难,表明恶意代码作者们企图破坏系统的活动级别不断上升。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定