For example, a buffer overflow in a network server program that can be tickled by outside users may provide an attacker with a login on the machine.
例如,外部使用者可以利用的网路伺服器程序中的缓冲区溢位,可能使攻击者登入到机器。
Buffer overflow attack technology is a very efficient attack technology based on network.
缓冲区溢出攻击技术是一项十分有效的网络攻击技术。
Buffer overflow attacks have been the most popular methods of attacking network.
缓冲区溢出攻击已经成为网络攻击的主要方式。
In the current network and distributed system security, buffer overflow is widely used by more than 50%.
在当前网络与分布式系统安全中,被广泛利用的50%以上都是缓冲区溢出。
The buffer overflow attacks have been the most common form in the network attacks and become a predominant problem in the system and network security area.
缓冲区溢出攻击是网络攻击事件中最常用的一种攻击方式,成为系统和网络安全中亟待解决的重要问题。
Network security has been paid more attention to and hackers often take advantage of buffer overflow to attack other systems or spread virus.
网络安全日益引起人们的重视,而利用缓冲区溢出进行攻击是黑客和病毒较为常用的手段。
Network security has been paid more attention to and hackers often take advantage of buffer overflow to attack other systems or spread virus.
网络安全日益引起人们的重视,而利用缓冲区溢出进行攻击是黑客和病毒较为常用的手段。
应用推荐