In 2007, there were 0.6 million new malicious code threats.
2007年,有60万新的恶意代码病毒。
Also, the malicious code can gain control of the mashup page.
而且,这个恶意代码还可能控制该mashup页面。
Unfortunately, malicious code can find its way into a Web application in many ways.
遗憾的是,恶意代码进入Web应用程序的方法多种多样。
The same is true on a dynamically generated page if a link has malicious code in it.
对于链接内含有恶意代码的动态生成页面,情况也是一样的。
For example, a hacker could use malicious code to take control of PCs using the software.
例如,黑客可以利用恶意代码控制使用该软件的电脑。
He can get inside a neighbor's virtual machine and add malicious code to PaaS applications.
他可以进入邻居的虚拟机并在PaaS应用程序中添加恶意代码。
The malicious code therefore cannot read, alter, or further damage the data on your computer.
因此,恶意代码就不能读取,更改或进一步损害计算机中的数据。
This puts your build server at some risk from bugs and malicious code committed to source trees.
这就把构建服务器置于提交给源树的 bug和恶意代码的风险之下。
As we have discussed, the JVM serves to prevent malicious code from entering an enterprise system.
正如我们已经讨论的,JVM提供了防止恶意代码进入企业系统的服务。
As you can see, the hacker changes the query's logic by entering the malicious code as his userid.
如您所见,黑客将恶意代码作为其userid输入,修改了查询语句的逻辑。
Yes, it seems that to get the malicious code working, a user would still need to be surfing with IE.
是的,似乎如果想让恶意代码生效,用户还是得使用IE浏览器。
If the data contains malicious code, sensitive data on the mashup page can fall into the wrong hands.
如果数据包含恶意代码,mashup页面上的敏感数据就有可能落入恶意用户手中。
This inadvertent interpretation can lead to malicious code execution and possible security violations.
这种不小心的解释会导致恶意代码的执行和潜在的安全侵犯。
On-demand scripts can include malicious code aimed at exploiting security vulnerabilities such as XSS.
按需脚本可能包含打算攻击XXS等安全漏洞的恶意代码。
The same techniques allow Microsoft to find malicious code that may have been injected in its products.
同样的技术使得微软可发现注入其产品的恶意代码。
If the targeted Web site doesn't check for this type of malicious code, misuse of the user is probable.
如果目标Web站点不检查这类恶意代码,就可能造成恶意使用用户信息。
The modification of actual malicious code to bypass antivirus has not pleased many security-software vendors.
修改真实的恶意代码来绕开防病毒软件没能让很多安全厂商高兴。
Guarantee that the pages in the Web site return user inputs only after validating them for any malicious code.
保证Web站点的页面只有在验证了用户输入没有恶意代码之后才返回用户输入。
On some of the networks I manage, I restrict traffic to exclude.doc in favor of.rtf as prophylaxis against malicious code.
在我所管理的一些网络上,我进行了流量限制:把. DOC排除在外,而赞成使用.RTF,以预防恶意代码。
To exploit the security hole, hackers must trick users into visiting a Web site loaded with malicious code, Microsoft said.
微软说,为了利用这个安全漏洞,黑客必须欺骗用户访问一个装载了恶意代码的网站。
To exploit this, attackers send malformed JSON objects to these libraries so the eval function executes their malicious code.
要利用这点,攻击者可以向这些库发送畸形的JSON对象,这样eval函数就会执行这些恶意代码。
However, another team started later but successfully obfuscated all nine samples of malicious code in 2 hours 25 minutes.
然而,另一个稍晚开始比赛的小组用了两小时二十五分成功的完成了所有九个病毒代码样本的伪装。
One way to protect yourself from malicious code is to make sure that what you expect as input is actually what you receive as input.
保护自己免于恶意代码攻击的一种方法是确保接收到预期的输入。
This is because malicious code can be entered as a part of the keyword search input that is executed when the user submits the search.
因为恶意代码可作为搜索关键字的一部分。 因此,用户提交搜索时,就会执行恶意的搜索关键字。
When some part of the mashup is written under malicious intent (or has been hacked), it can inject malicious code into the application.
当mashup中的某些部分是出于恶意目的编写的(或者被攻击了),它可以将恶意代码注入到应用程序中。
While restricting web surfing to trusted sites should reduce the risk of infection, the malicious code can be injected into any website.
尽管限制浏览器只浏览信任站点可以减少受到攻击的风险,恶意代码可以被植入任何的网站。
Malicious code can be hidden in fonts that automatically load when a user opens a PDF file, allowing a hacker to take control of the device.
恶意代码可以隐藏在字体中,当用户打开PD F文档时自动加载,从而允许黑客完全控制手机。
Last September, a group of computer scientists demonstrated just how easy it was to sneak malicious code into the computers of Facebook users.
去年九月,一组计算机专家证实了向“脸谱”用户的电脑植入恶意编码的“便捷性”。
Most especially, don't even try to suppress the status or URL bars of a new window; that's just asking for malicious code to phish your users.
尤其是,不要试图禁用新窗口的状态栏或URL 栏;这无疑是在邀请恶意代码侵害您的用户。
CSRF attacks originate from malicious code from an intruder site that tricks a browser into transmitting unprovoked requests to a trusted site.
CSRF攻击由一个入侵站点的恶意代码发起,该代码欺骗浏览器,使其将无关的请求传输到一个受信任站点。
应用推荐