The controversial Race to Zero contest, run by New Zealand security researcher Simon Howard, allowed each team to try to obfuscate real computer viruses and exploit code samples.
由新西兰安全研究者Simon Howard运营的备受争议的“零病毒检测”竞赛允许各个参赛队伪装计算机病毒代码和漏洞利用代码样本。
Another is to find ways to ensure that software developers produce code with fewer flaws in it so that hackers have fewer security holes to exploit.
另一种是找到确保软件开发人员编写的代码中有更少的缺陷的方法,这样黑客就有更少的安全漏洞可以利用。
As described by one of its co-authors, John Goerzen, in a recent interview to o 'reilly, the book introduces Haskell with real code, real examples and tips to exploit in a business environment.
作者之一johnGoerzen近日在与oReilly的访谈中介绍,此书用现实的代码、现实的例子和技巧去介绍Haskell在业务环境中的应用。
Macros exploit this fact by manipulating code as data before evaluating it.
宏利用这种事实,在求值之前将代码作为数据操作。
To exploit the security hole, hackers must trick users into visiting a Web site loaded with malicious code, Microsoft said.
微软说,为了利用这个安全漏洞,黑客必须欺骗用户访问一个装载了恶意代码的网站。
InfoQ: Could you tell us the advantage of using JRuby over parse tree or any other solutions, to exploit Ruby code?
InfoQ:你能告诉我们使用JRuby而不是parsetree或者其他解决方案来解析ruby代码的优势吗?
I don't get into the specifics of how to run each exploit or write shell code.
我并不会详细介绍每个攻击如何运行或者编写shell代码。
Experts at Reliable Software Technologies examined the potentially vulnerable code and were unable to learn of a way to exploit any of the conditions.
ReliableSoft wareTechnologies的专家侦测了潜在的易受攻击的程序码,并且未能掌握利用任何情况的方法。
To exploit this, attackers send malformed JSON objects to these libraries so the eval function executes their malicious code.
要利用这点,攻击者可以向这些库发送畸形的JSON对象,这样eval函数就会执行这些恶意代码。
Many well used UNIX applications, including LPR, xterm and eject, have been abused into giving up root through exploit of buffer overflow in suid regions of the code.
许多用得很好的UNIX应用程序,包括lpr、xterm和eject,都被滥用,而在程序码的suid栏位中利用缓冲区溢位放弃了root权限。
The developer produces Unified Modeling Language (UML) models that can be transformed to code that includes the code necessary to exploit the SOA infrastructure.
开发人员生成统一建模语言(Unified Modeling Language,UML)模型,此类模型可转换为相应的代码,其中包含利用SOA基础结构所必需的代码。
Malicious code might be able exploit this to avoid permission checks.
恶意代码可能会利用这一点避开权限检查。
The recent rounds of viruses and worms that continue to plague the Internet have indicated an increasing level of activity among malicious code writers trying to exploit systems.
最近一轮又一轮的病毒和蠕虫爆发给因特网带来了灾难,表明了恶意代码作者们企图破坏系统的活动级别不断上升。
The recent rounds of viruses and worms that continue to plague the Internet have indicated an increasing level of activity among malicious code writers trying to exploit systems.
最近一轮又一轮的病毒和蠕虫爆发给因特网带来了灾难,表明了恶意代码作者们企图破坏系统的活动级别不断上升。
应用推荐