Taking MaliciousCall Tracing service as an example, this thesis explains the implementation of the SoftSwitch service with the method supplied in traditional intelligent network.
而后以恶意呼叫追踪业务为例,研究了以智能网方式结合软交换提供业务的实现;
2
One of the most common vulnerabilities that these tools detect is when programmers forget to call a sanitation routine on potential malicious input.
这些工具检测出的最常见的漏洞之一就是程序员忘记对潜在的恶意输入调用消毒例程。
3
The snippet may then make a call to a method in the reference that executes malicious code.