单词 | malicious user | ||||
释义 | malicious user
例句释义: 恶意使用者,恶意用户 1. If you display error information, do not include information such as a user name that a malicious user might be able to take advantage of. 如果您显示错误信息,则不要包括像用户名之类的信息,因为恶意用户可能会加以利用这样的信息。 msdn.microsoft.com 2. It is possible for a malicious user to use the postback script to send arbitrary post events to server controls. 恶意使用者可能会利用回传指令码传送任意张贴事件至伺服器控制项。 technet.microsoft.com 3. This update prevents a malicious user from running VBScript in an unauthorized Web site to read the contents of files on your computer. 该更新可防止恶意的用户从未经授权的网站用VBScript读取您本机的内容。 www.microsoft.com 4. If a malicious user gets hold of this key information, then the security of that host machine can be compromised very easily. 如果恶意用户获得了这些密钥信息,那么主机的安全性就很容易受到威胁。 www.ibm.com 5. In most cases, the vulnerability would not allow the malicious user to read the files unless they already had read permission to do so. 在多数情况下,漏洞不会允许恶意用户读取文件,除非他们已经有了这样做的读权限。 www.microsoft.com 6. This vulnerability could potentially enable a malicious user to cause a program of his choice to run on another user's computer. 此漏洞可以潜在使得恶意用户根据他的选择在其他用户的计算机上运行程序。 www.microsoft.com 7. Thus, the presence of a monitoring system is not evident to the malicious user and can therefore not be easily evaded. 这样,监视系统的存在对恶意用户并不明显,因而,不容易被避开。 www-128.ibm.com 8. A malicious user can create a callback request and get data for the nodes of the TreeView control that the page developer is not displaying. 恶意用户可以创建回调请求并获取页面开发人员没有显示的TreeView控件的节点数据。 msdn2.microsoft.com 9. Download now to help prevent a malicious user from sending invalid input information to your Telnet Server. 请立即下载更新,以防止恶意用户向您的Telnet服务器发送无效的输入信息。 www.microsoft.com 10. The vulnerability could enable a malicious user to run operating system commands on an affected web server. 此缺失让怀有恶意的使用者能够在受感染的web伺服器上执行作业系统指令。 www.microsoft.com 1. As a result, a malicious user on the system could read the file as it was being created. 结果,系统上的恶意用户便能够在文件生成时读取这个文件。 www.microsoft.com 2. A determined, malicious user equipped with a network-monitoring tool can intercept user names and passwords. 一个蓄意破坏的用户可以使用网络监视工具截获用户名和密码。 www.kuenglish.info 3. The vulnerability could allow a malicious user with physical access to a domain controller to install malicious software on it. 该漏洞使恶意用户可以通过物理方式将恶意软件装入域控制器。 www.microsoft.com 4. The vulnerability could allow a malicious user to gain additional privileges on a machine that he could log onto at the keyboard. 恶意用户可利用该漏洞在他能够通过键盘登录的计算机上获取对该计算机的额外特权。 www.microsoft.com 5. The default permissions could allow a malicious user to gain additional privileges on an affected machine. 默认权限可使恶意用户获得受攻击的计算机的其他特权。 www.microsoft.com 6. The URL associated with an ImageButton control can be tampered with by a malicious user. 与ImageButton控件相关联的URL可能会被用户恶意篡改。 msdn2.microsoft.com 7. Download now to prevent a malicious user from using an unauthorized Web site to read the contents of files on your local computer. 请立即进行下载以防恶意的用户使用未经授权的网站读取您本机的内容。 www.microsoft.com 8. A malicious user could record communication between the client and the server and then use that information to replay the transaction. 恶意使用者可以记录用户端和伺服器之间的通讯,并使用该资讯来重新执行交易。 technet.microsoft.com 9. Download now help prevent a malicious user from disrupting the operation of your server . 请立即下载更新,可防止恶意用户中断服务器的操作。 www.bing.com 10. This brings up a few questions: What if a malicious user hacks the underlying security mechanism itself? 这会带来几个问题:如果恶意用户攻破了底层安全机制本身,那么会怎么样? www.ibm.com 1. For example, do not keep a password or other sensitive information in a cookie, where a malicious user can easily find or modify it. 例如,不将密码或其他敏感信息保存在Cookie中,因为恶意用户可以轻松地在其中找到或修改它。 msdn2.microsoft.com 2. A malicious user manages to get code (script) to execute by masking it as user input from a page or as a link. 恶意用户设法获取要执行的代码(脚本),方法是将其屏蔽为页面中的用户输入或屏蔽为链接。 msdn2.microsoft.com 3. Download now to help prevent a malicious user from causing your server to fail. 立即下载此更新,以防止恶意用户致使您的服务器失败。 www.microsoft.com 4. This vulnerability could, under certain circumstances, allow a malicious user to execute arbitrary code on another users system. 在某些情况下,该漏洞可能允许恶意用户在另一个用户的系统上执行任意代码。 www.microsoft.com 5. Consider the scenario in which a malicious user uses proxy tools to hijack data sent by the browser. 考虑恶意用户用代理工具劫持由浏览器发送的数据这一情况。 www-128.ibm.com 6. For example, a malicious user could gain access to a user's resources if the user walks away from his machine and leaves it logged in. 例如,如果用户登录之后离开了他的机器,恶意用户就可以访问他的资源。 www.ibm.com 7. To prevent a malicious user from hijacking HTML static contents in a Web page, the framework applies a server-side validation technique. 为了防止恶意用户劫持Web页中的HTML静态内容,这个框架使用了服务器端验证技术。 www-128.ibm.com 8. The vulnerability could allow a malicious user to gain control of an affected server. 这项弱点会让恶意的使用者控制受影响的伺服器。 www.microsoft.com 9. A malicious user crippling a system and getting superuser rights is a nightmare for any system administrator. 破坏系统并获得超级用户权限的恶意用户对所有的系统管理员都将是一场恶梦。 www-128.ibm.com 10. If this service is installed, the vulnerability could allow a malicious user to disrupt printing services. 如果安装了此项服务,该漏洞可能允许恶意用户破坏打印服务。 www.microsoft.com 1. The malicious user can keep the application too busy to service other users, or if nothing else can simply crash the application. 恶意用户可以使应用程序太忙而无法为其他用户提供服务,或者仅仅使应用程序出现故障。 msdn2.microsoft.com 2. Download now to prevent a malicious user from running an executable e-mail attachment on your computer. 立即下载以防止恶意用户在您的计算机上运行可执行的电子邮件附件。 www.microsoft.com 3. Download now to prevent a malicious user from running an unauthorized program on your computer. 请立即下载此更新程序,以防止恶意用户在您的计算机上运行未授权的程序。 www.microsoft.com 4. If you are not careful, a malicious user can deduce important information about your application from the error messages it displays. 如果您不小心,恶意用户就可以从应用程序显示的错误信息推断出有关您的应用程序的重要信息。 msdn2.microsoft.com 5. The malicious user can keep the application too busy to service other users, or if can simply cause the application to crash. 恶意用户可以使应用程序太忙而无法为其他用户提供服务,或者仅仅导致应用程序崩溃。 msdn2.microsoft.com 6. The vulnerability could allow enable a malicious user to potentially run code on another users machine. 此项弱点让恶意的使用者能够在另一名使用者的电脑上执行程式。 www.microsoft.com 7. These folder names may be useful to a malicious user. 这些文件夹名称可能会对恶意用户非常有用。 msdn2.microsoft.com 8. Provides information on guarding against malicious user input in an ASP. NET Web page. 提供有关防止恶意用户在ASP.NET网页中进行输入的信息。 msdn2.microsoft.com 9. Even the most elaborate application security can fail if a malicious user can use simple ways to gain access to your computers. 如果恶意用户可以使用简单方法进入您的计算机,即使是最精心设计的应用程序安全性也会失败。 msdn2.microsoft.com 10. How will your application behave if an errant or malicious user enters a 10-megabyte MPEG file where your application expects a postal code? 如果一个用户在需要邮政编码的位置无意中或恶意地输入了一个10MB的MPEG文件,应用程序会做出什么反应? msdn2.microsoft.com 1. Download now to prevent a malicious user from running programs on your computer. 立即下载以防止恶意用户在您的计算机上运行程序。 www.microsoft.com 2. In such cases, if a malicious user exploits these sessions, the user can potentially disrupt the system. 在这些情况下,如果恶意用户利用这些会话,用户就会潜在地破换系统。 www.ibm.com 3. Information that is passed in a query string can be tampered with by a malicious user. 在查询字符串中传递的信息可能会被恶意用户篡改。 msdn2.microsoft.com 4. The vulnerability could allow a malicious user to prevent an affected server from providing useful service. 此漏洞允许恶意用户阻止受攻击的服务器提供有用的服务。 www.microsoft.com 5. A malicious user might insert a rogue executable with the same name earlier in the path. 恶意用户可能在该路径中插入同名的欺诈性可执行文件。 technet.microsoft.com 6. The form is posted and the malicious user's comment is stored in a database. 发送窗体,恶意用户的评论将存储在数据库中。 msdn2.microsoft.com 7. Provides information on guarding against malicious user input. 提供有关防止恶意用户进行输入的信息。 msdn2.microsoft.com 8. It is easy for a malicious user to see and modify the contents of a hidden field. 恶意用户可以很容易地查看和修改隐藏域的内容。 msdn2.microsoft.com 9. Download now to prevent a malicious user from running code of their choice. 立即下载此更新程序,以防恶意用户运行他们选定的代码。 www.microsoft.com 10. An indirect way that a malicious user can compromise your application is by making it unavailable. 恶意用户危害您的应用程序的一种间接方式是使其不可用。 msdn2.microsoft.com 1. The vulnerability could allow a malicious user to execute hostile code on a remote server that is running the service. 该漏洞会导致恶意用户在运行该服务的远程服务器上执行危险的代码。 www.microsoft.com 2. Using a Padding Oracle (PO) attack a malicious user can access encrypted data such as cookies, state, membership password, etc. 恶意用户能够使用PaddingOracle(PO)攻击方式来解密cookie,加密状态及认证密码等关键信息。 www.infoq.com 3. For example, a malicious user could construct a build definition to run arbitrary code to take control of the server and steal data. 例如,恶意用户可能会构建用于运行任意代码的生成定义,从而控制服务器并窃取数据。 technet.microsoft.com 4. If a malicious user sends this particular series of data packets to an affected server, it can cause an affected server to fail. 如果恶意用户将这一类特定的数据包发送给受影响的服务器,可能会导致该服务器失败。 www.microsoft.com 5. The SRL is a number between 0 and 9 that predicts the probability that a specific sender is a spammer or otherwise malicious user. SRL是0到9之间的一个数字,预测特定发件人是垃圾邮件制造者或其他恶意用户的可能性。 technet.microsoft.com 6. For example, if you trusted cmd. Exe, a malicious user might specify parameters that would make the command dangerous. 例如,如果您信任cmd.exe,恶意用户可能指定使该命令具有危险性的参数。 msdn2.microsoft.com 7. What happens if a malicious user decides to submit the form 10, 000 times in a single day? 如果恶意用户决定在一天内提交10,000次此表单,会发生什么情况呢? www.ibm.com 8. A protection mechanism against malicious user programs that could interfere with or spy on the activity of other users 保护机制,阻止恶意的用户程序妨碍或者监视其它用户的活动 bbs.e5zj.com 9. Malicious user input can be used to launch the following attacks 恶意用户输入可用于发动下面的攻击 msdn2.microsoft.com 10. A malicious user could submit requests to load many assemblies into the 恶意用户可以通过提交请求将许多程序集加载到 msdn2.microsoft.com 1. The malicious user writes a comment that includes a 恶意用户编写了一个其中包含 www.ichacha.net 2. For example, a malicious user can load an object with a harmful style sheet and hand it off to another user who subsequently calls the 例如,某个恶意用户可以加载一个带有有害样式表的对象,然后将其传给下一个调用 msdn2.microsoft.com 3. For examples of malicious user data, see 有关恶意用户数据的示例,请参阅 msdn2.microsoft.com 4. Additionally, to prevent a malicious user from determining that a session exists, the 此外,为防止恶意用户终止现有会话,人们会设置 msdn2.microsoft.com |
||||
随便看 |
|
英汉双解词典包含2704715条英汉词条,基本涵盖了全部常用单词的翻译及用法,是英语学习的有利工具。