• Buffer overflow attack technology is a very efficient attack technology based on network.

    缓冲区溢出攻击技术一项十分有效的网络攻击技术。

    youdao

  • Buffer overflow attack mainly includes stack overflow, heap overflow and format string overflow and so on.

    缓冲区溢出主要分为堆栈溢出、溢出格式化字符串溢出

    youdao

  • This tracking or recomputation is easy to get wrong, and any mistake can open the door to a buffer overflow attack.

    这种跟踪重新计算容易出错任何错误都可能缓冲区攻击打开方便之门

    youdao

  • In the instance of a buffer overflow attack, an internal value in a program is overflowed to alter how the program runs.

    缓冲区溢出攻击实例程序内部溢出,从而改变程序的运行方式。

    youdao

  • Fundamentally, all these approaches reduce the damage of a buffer overflow attack from a program-takeover attack into a denial-of-service attack.

    从根本上讲所有这些方法都能减轻程序接管攻击拒绝服务攻击缓冲区溢出攻击所带来的破坏

    youdao

  • The danger is that if you forget to take the available buffer space into account, you can still permit a buffer overflow attack even when usingstrncpy(3).

    这样的危险之处在于,如果忘了考虑可用缓冲区空间那么即使在使用strncpy(3)可能会留下缓冲区攻击隐患。

    youdao

  • In a buffer overflow attack, the hacker takes advantage of specific type of computer program bug that involves the allocation of storage during program execution.

    缓冲溢出攻击黑客利用程序执行期间存储分配中的特定计算机程序漏洞

    youdao

  • Undoubtedly, in this networked information era, these bugs make the Buffer Overflow Attack very easy propagate, it threatens the systematic security greatly.

    无疑这个网络化信息时代这些漏洞使得缓冲区溢出攻击极易传播和蔓延,极大地威胁系统安全性

    youdao

  • In the final two columns in this series, we'll examine the engine's workings and explain how a buffer overflow attack does its dirty work on particular architectures.

    系列最后两个专栏检查引擎工作说明缓冲区溢位攻击特定系统架构上是如何进行破坏的。

    youdao

  • For instance, to describe a buffer overflow attack, he asks us to imagine an office worker who follows the instructions listed in a manual without questioning them.

    例如描述缓冲溢出攻击时我们想像一些懂得质疑,仅仅是无条件遵循手工列出条例的办公室工作人员

    youdao

  • One common type of malware, called a buffer overflow attack, overwhelms programs that accept input, like the address line in a Web browser or a search window for a database.

    恶意软件一种常见攻击类型所谓缓冲区溢出攻击,会使接受输入程序崩溃,web浏览器地址数据库搜索窗口

    youdao

  • Buffer overflow is one of most common attack on Internet.

    缓冲区溢出安全漏洞最为常见一种攻击形式。

    youdao

  • The attack, based on the buffer overflow, is a common means of security attacks and is the only most common security threats at present.

    基于缓冲区溢出攻击一种常见安全攻击手段也是目前惟一最重要最常见的安全威胁

    youdao

  • Network security has been paid more attention to and hackers often take advantage of buffer overflow to attack other systems or spread virus.

    网络安全日益引起人们重视,而利用缓冲区溢出进行攻击是黑客病毒较为常用的手段。

    youdao

  • Network security has been paid more attention to and hackers often take advantage of buffer overflow to attack other systems or spread virus.

    网络安全日益引起人们重视,而利用缓冲区溢出进行攻击是黑客病毒较为常用的手段。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定