单词 | malicious code | ||||||||||||||
释义 | malicious code
更多释义 收起释义 例句释义: 恶意代码,恶意程式,恶意程式码 1. Do not use a domain controller to browse the Web or to perform any other activities that may introduce malicious code. 不要使用域控制器浏览网站或执行任何可能引入恶意代码的其他活动。 support.microsoft.com 2. Thus, there is urgent need for a malicious code analysis and detection means to carry out a detailed analysis of malicious code. 于是,迫切需要一种恶意代码的分析检测手段对恶意代码进行详尽的分析。 www.fabiao.net 3. There is usually no defense against malicious code if it is granted these permissions. 如果向恶意代码授予这些权限,通常就没有防范它的措施了。 msdn2.microsoft.com 4. The truth is, hackers will always be able to locate vulnerabilities and issue new malicious code to exploit them. 事实是,黑客们永远都能够找出新的系统漏洞,并且编写新的恶意代码对其进行攻击。 dream4ever.org 5. Be careful to ensure that you do not provide any information that could be exploited by malicious code. 请务必确保您没有提供任何会被恶意代码利用的信息。 msdn2.microsoft.com 6. Application Integrity Control can prevent the possible substitution of the components of your applications for malicious code. 程序完整性保护可以预防您的程序组件被恶意代码替代。 bbs.360safe.com 7. Malicious code can be hidden in fonts that automatically load when a user opens a PDF file, allowing a hacker to take control of the device. 恶意代码可以隐藏在字体中,当用户打开PDF文档时自动加载,从而允许黑客完全控制手机。 www.bing.com 8. It is possible for malicious code to cast back to the base type and call the base class method . 恶意代码有可能会重新强制转换为基类型,并调用基类方法。 www.bing.com 9. The experiment results show that obfuscating transformation can be used to improve the survivability of the malicious code. 试验结果表明模糊变换技术可以有效地提高恶意代码的生存能力。 dictsearch.appspot.com 10. An attacker could host a Web site containing the malicious code to exploit the flaw, he said. 他说,攻击者可以在某个网站上嵌入恶意代码,一旦用户访问了有关网页,电脑就可能被渗透。 mirror.dream4ever.org 1. The deep hiding and detecting technology of malicious code has already become one of the research hotspots in computer security. 恶意代码的深层隐藏和检测技术已经成为当前计算机安全技术的一个研究热点。 degree.fzu.edu.cn 2. The firm is also said to have left its databases open to "SQL injection" , a means of inserting malicious code. 还有传言称,其数据库对“资料隐码攻击”(SQLinjection)城门洞开,恶意代码植入畅行无阻。 www.ecocn.org 3. When the stored strings are subsequently concatenated into a dynamic SQL command , the malicious code is executed . 在存储的字符串随后串连到一个动态SQL命令中时,将执行该恶意代码。 www.bing.com 4. Malicious code is a new breed of Internet threat that cannot be efficiently controlled by conventional antivirus software alone. 恶意代码是构成互联网威胁的新根源,至今传统的病毒查杀方法对此也无法根治。 www.ceps.com.tw 5. They appear as a message from a buddy with a link that looks innocent, but in fact points to malicious code somewhere on the Internet. 它们一般存在于来自好友的即时信息中,以看似正常的链接的形式出现,但实际链接指向的是一些恶意代码。 dream4ever.org 6. Unfortunately, malicious code can find its way into a Web application in many ways. 遗憾的是,恶意代码进入Web应用程序的方法多种多样。 www.ibm.com 7. If the tracking participant is third party code, ensure that this is not malicious code. 如果追踪参与者为协力厂商程式码,请确认这不是恶意程式码。 technet.microsoft.com 8. Malicious code executing on the same computer could use this as the basis of a denial-of-service attack. 在同一计算机上执行的恶意代码可能以此作为一个切入点来发动拒绝服务攻击。 msdn2.microsoft.com 9. Determine whether malicious code can use a cast to get around the link demands as described previously. 确定恶意代码是否能够像上面所说的那样使用强制转换来绕过这些链接要求。 msdn2.microsoft.com 10. This setting makes your computer vulnerable to potentially malicious code and is not recommended. 此设置会使计算机容易受到潜在恶意代码的攻击,因此不推荐您使用。 office.microsoft.com 1. On the study of malicious code, the automatic generation of malicious behavior speciation is still a difficult problem. 在对恶意代码的研究上,恶意行为规范的自动生成仍然是一个难题。 www.joca.cn 2. While restricting web surfing to trusted sites should reduce the risk of infection, the malicious code can be injected into any website. 尽管限制浏览器只浏览信任站点可以减少受到攻击的风险,恶意代码可以被植入任何的网站。 www.bing.com 3. This vulnerability could allow malicious code stored within the XLM macro sheet to perform harmful acts, including deleting files. 这项弱点会让储存在XLM巨集工作表中的恶意码执行破坏性行为,例如删除档案。 www.microsoft.com 4. On some of the networks I manage, I restrict traffic to exclude . DOC in favor of . RTF as prophylaxis against malicious code. 在我所管理的一些网络上,我进行了流量限制:把.DOC排除在外,而赞成使用.RTF,以预防恶意代码。 www.ibm.com 5. A Trojan or trojan horse is a software program in which harmful or malicious code is contained within another seemingly harmless program. 木马或木马是一个软件程序,其中有害或恶意代码是包含在另一个看来无害的节目。 bbs.pep.com.cn 6. With this, an attacker could have access to phone numbers, photos, and other data, as well as upload malicious code to the handset. 通过这样,攻击者就能获知手机号码、照片以及其他数据信息,还可以向手机上传恶意代码。 www.bing.com 7. Other, less trusted applications will not receive the extra permissions; this helps protect your system against malicious code. 其他受信任程度较低的应用程序将不会接收额外的权限;这有助于保护您的系统免受恶意代码的侵害。 msdn2.microsoft.com 8. The Java language was designed from day one to allow the execution of untrusted, potentially malicious code in a secure sandbox. 设计Java语言之初就是为了允许在一个安全沙箱中运行不信任的、潜在恶意的代码。 www.ibm.com 9. WebSphere sMash helps protect against malicious code by implementing system-level authentication and authorization. 通过实现系统级身份验证和授权,WebSpheresMash可以帮助防御恶意代码。 www.ibm.com 10. The modification of actual malicious code to bypass antivirus has not pleased many security-software vendors. 修改真实的恶意代码来绕开防病毒软件没能让很多安全厂商高兴。 www.bing.com 1. Use the other accounts with caution, as they run with higher privileges and increase your risk of attacks from malicious code. 使用其他帐户时需要特别小心,因此它们具有较高的特权,会增加您受到恶意代码攻击的风险。 msdn2.microsoft.com 2. A less direct attack injects malicious code into strings that are destined for storage in a table or as metadata. 一种间接的攻击会将恶意代码注入要在表中存储或作为元数据存储的字符串。 msdn2.microsoft.com 3. One way to protect yourself from malicious code is to make sure that what you expect as input is actually what you receive as input. 保护自己免于恶意代码攻击的一种方法是确保接收到预期的输入。 www.ibm.com 4. A risk exists that uncertified, poorly written or malicious code could impact the overall stability of the installation. 风险存在于不确定的,拙劣地编写或是恶意的代码能够影响安装的总的稳定性。 www-128.ibm.com 5. Payload : Downloads potentially malicious code on to the compromised computer. 有效载荷:下载潜在的恶意代码对电脑受损。 dict.bioon.com 6. Attribute and cannot be referenced by potentially malicious code outside the application. 属性,这些库也不能被应用程序之外的潜在恶意代码引用。 msdn2.microsoft.com 7. As you can see, the hacker changes the query's logic by entering the malicious code as his userid. 如您所见,黑客将恶意代码作为其userid输入,修改了查询语句的逻辑。 www.ibm.com 8. And this has not even touched the capabilities needed to encrypt, decrypt, and morph the malicious code. 这还没提到加密解密和改变恶意代码形态所需要的能力。 www.pediy.com 9. The malicious code therefore cannot read, alter, or further damage the data on your computer. 因此,恶意代码就不能读取,更改或进一步损害计算机中的数据。 www.bing.com 10. This situation is analogous to malicious code calling your code with strange parameters, and the same precautions should be taken. 这种情况类似恶意程式码使用奇怪的参数呼叫您的程式码,也需采取相同的防范措施。 technet.microsoft.com 1. With the technique of trusted computing, designed and implemented the mechanism of resisting malicious code. 利用可信计算技术设计并实现恶意代码防御机制。 www.ceps.com.tw 2. A signed assembly makes it more difficult for malicious users to replace the application's assemblies with malicious code. 利用签名的程序集,将使恶意用户更难用恶意代码替换应用程序的程序集。 msdn2.microsoft.com 3. Guarantee that the pages in the Web site return user inputs only after validating them for any malicious code. 保证Web站点的页面只有在验证了用户输入没有恶意代码之后才返回用户输入。 www.ibm.com 4. If the data contains malicious code, sensitive data on the mashup page can fall into the wrong hands. 如果数据包含恶意代码,mashup页面上的敏感数据就有可能落入恶意用户手中。 www.ibm.com 5. This default behavior can be exploited by users who want to introduce malicious code in the database or server instance. 希望向数据库或服务器实例中引入恶意代码的用户可以使用此默认行为。 technet.microsoft.com 6. In this situation, it is impossible for a single programmer to insert malicious code into your system. 此时,单个程序员不可能将恶意代码插入到您的系统中。 www-128.ibm.com 7. Yes, it seems that to get the malicious code working, a user would still need to be surfing with IE. 是的,似乎如果想让恶意代码生效,用户还是得使用IE浏览器。 www.cnbeta.com 8. Detect whether a executable code is malicious code through the analysis of behavior. 通过对行为的分析检测其是否是恶意代码。 www.fabiao.net 9. This update addresses a vulnerability that could enable malicious code execution. 此更新解决了可能允许恶意程式码执行的安全性弱点。 www.microsoft.com 10. Always examine any themes from outside your organization for malicious code before using them on you Web site. 若要在网站上使用来自您单位外部的主题,始终都应先检查它是否包含恶意代码。 msdn2.microsoft.com 1. A computer can be made to execute potentially malicious code by feeding in extra data that is designed to flood the buffer. 某个恶意程序可以故意向指定的缓冲区以外大量写数据,而电脑常常无法阻止这类程序的运行。 mirror.dream4ever.org 2. However, the person who created the Web site has embedded malicious code that deletes data on the user's hard disk. 然而创建此Web站点的人已经嵌入了将会删除用户硬盘上数据的恶意代码。 www.microsoft.com 3. Even now, making malicious code has become a huge underground industry and formed a huge industrial chain. 甚至现在制作恶意代码已经成为了一个巨大的地下产业并形成了庞大的产业链。 www.fabiao.net 4. If the targeted Web site doesn't check for this type of malicious code, misuse of the user is probable. 如果目标Web站点不检查这类恶意代码,就可能造成恶意使用用户信息。 www.ibm.com 5. This helps to guard against situations where malicious code attempts to pass an infinite stream of bytes to the GetEntity method. 如果恶意代码尝试将无限大的字节流传递给GetEntity方法,这种方式有助于您应对这种情况。 msdn2.microsoft.com 6. An untrusted process containing malicious code has the potential to damage the machine doing the debugging. 包含恶意代码的不受信任的进程可能会损害进行调试的计算机。 msdn2.microsoft.com 7. Malicious code inside triggers can run under escalated privileges. 触发器内部的恶意代码可以在升级后的权限下运行。 technet.microsoft.com 8. This reduces the threat that comes from attached databases with malicious code in them. 这会减少来自包含恶意代码的附加数据库的隐患。 msdn2.microsoft.com 9. This puts your build server at some risk from bugs and malicious code committed to source trees. 这就把构建服务器置于提交给源树的bug和恶意代码的风险之下。 www.ibm.com 10. Inserted malicious code can do all sorts of harm by stealing session information or cookies. 所插入的恶意代码可以通过窃取会话信息或cookie进行各种破坏。 www.ibm.com 1. If you do, malicious code can alter the boundary definitions and use your code in unexpected ways. 否则,恶意代码可能会更改边界定义并以出乎意料的方式使用您的代码。 msdn2.microsoft.com 2. They said that the phone's users cannot detect that it is receiving the malicious code. 他们称,手机用户无法察觉接收到的是恶意代码。 cn.reuters.com 3. This approach can run malicious code with elevated permissions. 此方法可以使用提升的权限运行恶意代码。 technet.microsoft.com 4. If malicious code harms your data or your computer, Access cannot undo that damage. 如果恶意代码损坏了数据或计算机,Access无法弥补。 office.microsoft.com 5. Disabling code access security makes the system vulnerable to attacks by malicious code such as viruses and worms. 禁用代码访问安全性会使系统容易受到恶意代码(如病毒和蠕虫)的攻击。 msdn2.microsoft.com 6. They may contain malicious code with damaging potential. 它们可能包含具有破坏性的恶意代码。 www.ibm.com 7. When some part of the mashup is written under malicious intent (or has been hacked), it can inject malicious code into the application. 当mashup中的某些部分是出于恶意目的编写的(或者被攻击了),它可以将恶意代码注入到应用程序中。 www.ibm.com 8. Discusses how to use the. NET Framework to erect barriers to malicious code and undesirable actions on the part of others. 讨论如何使用.NETFramework建立阻止恶意代码和其他人的不当操作的屏障。 msdn2.microsoft.com 9. Another argument is that with freely available blueprints, crackers will have it easy writing malicious code to attack systems. 另一条理由是:有了可免费获得的设计,解密高手在编写攻击系统的恶意代码时将更为容易。 www-128.ibm.com 10. SQL injection is an attack in which malicious code is inserted into strings that are later passed to SQL Server for parsing and execution. SQL注入是一种攻击方式,在这种攻击方式中,有害代码被插入到字符串中,然后将该字符串传递到SQLServer以进行分析和执行。 msdn2.microsoft.com 1. If a buffer overrun is detected, the process is terminated as quickly as possible to minimize the chance that malicious code is executed. 如果检测到缓冲区溢出,进程将尽快终止,以最大限度地减小执行恶意代码的机会。 technet.microsoft.com 2. the Software will be uninterrupted or error-free or free from malicious code. 该软件将被中断或无差错或免于恶意代码。 wenwen.soso.com 3. However, remember that malicious code can call your code. 然而,请记住,恶意代码可以调用您的代码。 msdn2.microsoft.com 4. In this way, malicious code can achieve higher security access than it should be allowed. 这样,恶意代码获得的安全访问权限可以比它被允许的要高。 msdn.microsoft.com 5. This is because malicious code can be entered as a part of the keyword search input that is executed when the user submits the search. 因为恶意代码可作为搜索关键字的一部分。因此,用户提交搜索时,就会执行恶意的搜索关键字。 www.ibm.com 6. Haley said news of the Apple botnet is significant in part because it's something other authors of malicious code can build from. 哈利说,苹果病毒的新闻意义重大,部分是因为恶意程序的作者可以开发出编码。 item.feedsky.com 7. As we have discussed, the JVM serves to prevent malicious code from entering an enterprise system. 正如我们已经讨论的,JVM提供了防止恶意代码进入企业系统的服务。 www.ibm.com 8. If malicious code somehow gains access to that area of memory, it is more difficult to make use of the data. 如果恶意程式码以某种方法取得该记忆体区域的存取权,则使用此资料会较困难。 technet.microsoft.com 9. The same is true on a dynamically generated page if a link has malicious code in it. 对于链接内含有恶意代码的动态生成页面,情况也是一样的。 www.ibm.com 10. IM worm and malicious code attacks are happening more than ever before. 现在IM蠕虫以及恶意代码攻击大肆泛滥,数量堪称历史之最。 dream4ever.org 1. It can sometimes be manipulated to perform actions on behalf of malicious code that does not have permission to access a resource. 它有时会受到操控,而去执行代表恶意程式码的没有使用权限的存取资源动作。 technet.microsoft.com 2. On-demand scripts can include malicious code aimed at exploiting security vulnerabilities such as XSS. 按需脚本可能包含打算攻击XXS等安全漏洞的恶意代码。 www.ibm.com 3. The rich edit control provides an additional barrier to malicious code that is transmitted using e-mail. RichEdit控件提供了额外的屏障,可以阻止用电子邮件传输的恶意代码。 support.microsoft.com 4. Now there are more and more malicious code, with the attendant, the possibility of snapshot unsafe code presence greatly increases. 现在网页上的恶意代码越来越多,随之而来的,网页快照上存在不安全代码的可能性也大大增加。 www.juhe8.com 5. It provides strong protection against all kinds of viruses, worms, backdoors, Trojan horses and other kinds of malicious code. 它能够提供超强的防护对抗各种病毒,网虫,后门病毒,木马病毒和其他种类的恶意代码。 avast.com.cn 6. In addition, if we know of a site that is infected, we focus on having the malicious code removed. 此外,如果我们知道了某一网站被感染了,我们的注意力在于怎样隔离这些恶意代码。 newyz.com 7. He can get inside a neighbor's virtual machine and add malicious code to PaaS applications. 他可以进入邻居的虚拟机并在PaaS应用程序中添加恶意代码。 www.ibm.com 8. The reason for this is that many porn pictures and sites contain malicious code. 原因是,许多色情图片和网站都包含恶意代码(maliciouscode)。 www.ftchinese.com 9. For example, a hacker could use malicious code to take control of PCs using the software. 例如,黑客可以利用恶意代码控制使用该软件的电脑。 www.bing.com 10. In computer security, a variant of the Trojan horse in which malicious code is inserted to BE triggered later 在计算机安全学中,特洛伊木马程序的一个变种,其插入的恶性代码过一段时间将会发作。 dict.ebigear.com 1. Research on Obfuscating Transformation Technology for Malicious Code 恶意代码模糊变换技术研究 scholar.ilib.cn 2. A few great series on malicious code in the wired and wireless world 有关有线和无线领域中恶意代码的优秀系列文章 www-128.ibm.com 3. Study of technologies to prevent and eliminate malicious code 恶意代码及防护技术探讨 ilib.cn 4. Trojans Worms and Spyware: Professionals Guide to Malicious Code 木马、蠕虫、监控软件:恶意代码拆解 www.newebug.com 5. Research On Behavior Blocking Against Malicious Code 针对恶意代码的行为阻断方法研究 service.ilib.cn 6. The Analysis, Prevention and Cure of the Web Page Malicious Code Web网页恶意代码的分析与防治 www.ilib.cn 7. injects malicious code deep inside this reorganized code; 将恶意代码深层次地插入这个重新排序以后的代码; dictsearch.appspot.com 8. However, to prevent malicious code from entering other application domains, the, 但是,为了防止恶意代码进入其他应用程序域, msdn2.microsoft.com 9. Prevention Analysis on Malicious Code of Mobile Phone 手机恶意代码分析及预防 www.ilib.cn 10. Email propagation of malicious code 恶意代码邮件传播 www.qiyeku.com 1. Design and implementation of malicious code detection system based on AEC 基于AEC的恶意代码检测系统的设计与实现 www.ilib.cn 2. A Malicious Code Detection System Based on Localization 一种基于本地化特征的恶意代码检测系统设计 www.ilib.cn |
||||||||||||||
随便看 |
|
英汉双解词典包含2704715条英汉词条,基本涵盖了全部常用单词的翻译及用法,是英语学习的有利工具。