Buffer overflow attack mainly includes stack overflow, heap overflow and format string overflow and so on.
缓冲区溢出主要分为堆栈溢出、堆溢出和格式化字符串溢出等。
This tracking or recomputation is easy to get wrong, and any mistake can open the door to a buffer overflow attack.
这种跟踪或重新计算很容易出错,而任何错误都可能给缓冲区攻击打开方便之门。
In the instance of a buffer overflow attack, an internal value in a program is overflowed to alter how the program runs.
在缓冲区溢出攻击的实例中,程序的内部值溢出,从而改变程序的运行方式。
Fundamentally, all these approaches reduce the damage of a buffer overflow attack from a program-takeover attack into a denial-of-service attack.
从根本上讲,所有这些方法都能减轻从程序接管攻击到拒绝服务攻击的缓冲区溢出攻击所带来的破坏。
The danger is that if you forget to take the available buffer space into account, you can still permit a buffer overflow attack even when usingstrncpy(3).
这样的危险之处在于,如果忘了考虑可用的缓冲区空间,那么即使在使用strncpy(3)时也可能会留下缓冲区攻击隐患。
In a buffer overflow attack, the hacker takes advantage of specific type of computer program bug that involves the allocation of storage during program execution.
在缓冲溢出攻击中,黑客利用了程序执行期间存储分配中的特定计算机程序漏洞。
Undoubtedly, in this networked information era, these bugs make the Buffer Overflow Attack very easy propagate, it threatens the systematic security greatly.
无疑,在这个网络化的信息时代,这些漏洞使得缓冲区溢出攻击极易传播和蔓延,极大地威胁了系统的安全性。
In the final two columns in this series, we'll examine the engine's workings and explain how a buffer overflow attack does its dirty work on particular architectures.
本系列的最后两个专栏,将检查引擎的工作并说明缓冲区溢位的攻击在特定系统架构上是如何进行破坏的。
For instance, to describe a buffer overflow attack, he asks us to imagine an office worker who follows the instructions listed in a manual without questioning them.
例如,在描述缓冲溢出攻击时,他让我们想像一些不懂得质疑,仅仅是无条件遵循手工列出的条例的办公室工作人员。
One common type of malware, called a buffer overflow attack, overwhelms programs that accept input, like the address line in a Web browser or a search window for a database.
恶意软件的一种常见攻击类型,所谓的缓冲区溢出攻击,会使接受输入的程序崩溃,如web浏览器的地址栏或数据库的搜索窗口。
The attack, based on the buffer overflow, is a common means of security attacks and is the only most common security threats at present.
基于缓冲区溢出的攻击是一种常见的安全攻击手段,也是目前惟一最重要最常见的安全威胁。
Network security has been paid more attention to and hackers often take advantage of buffer overflow to attack other systems or spread virus.
网络安全日益引起人们的重视,而利用缓冲区溢出进行攻击是黑客和病毒较为常用的手段。
Network security has been paid more attention to and hackers often take advantage of buffer overflow to attack other systems or spread virus.
网络安全日益引起人们的重视,而利用缓冲区溢出进行攻击是黑客和病毒较为常用的手段。
应用推荐