单词 | buffer overflow |
释义 | 例句释义: 缓冲溢出,缓冲器溢出,缓冲区溢出,缓冲区溢位,缓存溢出 1. What if it was a security patch for a buffer overflow exploit, of which Windows has not some -- several? 如果是个缓存溢出错误的修补程序呢?Windows在这方面的漏洞还不少呢。 www.ted.com 2. After all, someone could have changed the bytecode manually with a hex editor to attempt to trigger a buffer overflow. 毕竟,也许有人已经用十六进制编辑器手工修改了字节符,试图触发缓冲器溢出。 www.ibm.com 3. The attack, based on the buffer overflow, is a common means of security attacks and is the only most common security threats at present. 基于缓冲区溢出的攻击是一种常见的安全攻击手段,也是目前惟一最重要最常见的安全威胁。 kns50.chkd.cnki.net 4. Doing so can lead some poorly written implementations into buffer overflow errors (and all that implies). 这样做会使编写不够严谨的程序出现缓冲区溢出错误(以及所有类似隐患)。 www.ibm.com 5. In the instance of a buffer overflow attack, an internal value in a program is overflowed to alter how the program runs. 在缓冲区溢出攻击的实例中,程序的内部值溢出,从而改变程序的运行方式。 www.ibm.com 6. A buffer overflow, or buffer overrun, occurs when a process attempts to store data beyond the boundaries of a fixed-length buffer. 当进程尝试将数据储存到固定长度的缓冲区的范围之外时,就会出现缓冲区溢出。 www.ibm.com 7. Buffer Overflow occurs when a program or process tries to store more data in a buffer than it was intended to hold. 缓冲区溢出发生在一个程序或进程试图在一个缓冲区中存储多于其存储量的数据时。 www.fanyicn.net 8. The number of buffer overflow attacks was increasing during the last two decades, bringing users great loss. 近二十年来,利用缓冲区溢出的攻击行为越来越多,给用户造成巨大的损失。 www.boshuo.net 9. When a program writes past the bounds of a buffer, this is called a buffer overflow. 当程式写入超过缓冲区的边界时,这就是所谓的「缓冲区溢位」。 www.ibm.com 10. "splices" reported the same crash at the fan site MozillaZine and on Bugtraq, incorrectly describing it as a buffer overflow. “拼接”报导了同样的崩溃在风扇站点MozillaZine所和Bugtraq上,错误地描述它作为一个缓冲区溢出。 cheap.yourabusedbitch.com 1. The immediate cause of the vulnerability was that one of Sendmail's security checks was flawed, permitting a buffer overflow. 造成这一漏洞的直接原因是,Sendmail的一个安全检测是有缺陷的,可以发生缓冲区溢出。 www.ibm.com 2. So far, all our examples of buffer overflow exploits have been for UNIX systems. 目前,我们举的所有利用缓冲区溢位的范例都是针对UNIX系统的。 www.ibm.com 3. The data are extremely discouraging since the buffer overflow problem has been widely known in security circles for years. 由于缓冲区溢位问题近年来在安全性领域中已受到瞩目,这一资料是相当令人灰心的。 www.ibm.com 4. Buffer overflow has become one of the preferred attack methods for writers of viruses and Trojan horse programs. 缓冲溢出已经成为病毒和特洛伊木马程序编写者喜爱用的攻击方法。 www.kancaimi.cn 5. This probably due to a buffer overflow, which allows anyone to execute arbitrary code on the remote host. 大概是一个缓冲区益处使的可以执行任何代码。 bbs.s8s8.net 6. All of these attacks -- and many others -- exploited a vulnerability called a buffer overflow. 所有这些攻击――以及其他许多攻击,都利用了一个称做为缓冲区溢出的程序缺陷。 www.ibm.com 7. And the data show that the problem is growing instead of shrinking; see "Buffer overflow: Dejavu all over again" . 并且资料显示这一问题正在扩大,而不是在缩减;请参阅「缓冲区溢位︰捲土重来」。 www.ibm.com 8. The new model can conquer the disadvantage of the old technique and improve efficiency of buffer overflow detection. 新方法克服了一般方法的不足,可以实质性地提高缓冲区检测的效率。 www.ceps.com.tw 9. ASLR helps prevent buffer overflow attacks by randomizing the location where system executables are loaded into memory. ASLR通过将系统可执行程序随机装载到内存里,从而防止缓冲区溢出攻击。 shi-wei.net 10. Recently, a company called eEye found an exploitable buffer overflow in Microsoft's Internet Information Server (IIS). 近来,一家名为eEye的公司发现Microsoft的「网际网路讯息服务系统(IIS)」有一个可利用的缓冲区溢位。 www.ibm.com 1. For instance, a program designed to exploit a buffer overflow is very likely to use some inline assembly for the target platform. 举例来说,设计利用缓存溢出的程序很可能会对目标平台使用内联汇编。 www.ibm.com 2. Do an Internet search on the term buffer overflow, and you'll come up with hundreds of thousands of links, most related to security. 对缓冲溢出这个术语做一次因特网搜索,你将看到成千上万的链接,其中大多数与安全有关。 www.kancaimi.cn 3. The agent's real-time check of the code reveals the buffer overflow mechanism, a process that violates the ABI. 代理对此代码的实时检查揭示出缓存器溢出机制,这是一个违背ABI的过程。 www.csairk.com 4. Attacking using a buffer overflow can change this process and allow an attacker to execute any function they wish. 利用缓冲区溢出进行攻击可以改变这个过程,并且允许黑客执行任何他们期望的函数。 www.ibm.com 5. The identified vulnerability is a malicious SMIL file which could cause a buffer overflow in the RealPlayer. 此识别的漏洞是一个恶意SMIL文件,它可能导致RealPlayer发生缓冲溢出。 service.real.com 6. Because PHP manages memory for you, there's no PHP code that can result in stack and buffer overflow exploits. 因为PHP可以为您管理记忆,所以PHP代码不会导致堆栈和缓冲溢出。 www.ibm.com 7. Buffer overflow vulnerabilities can be prevented in C and C with knowledge, caution, and tools. 借助知识、谨慎和工具,C和C 中的缓冲区溢出缺陷是可以防止的。 www.ibm.com 8. But the buffer overflow problem is far from ancient history. 但是,缓冲区溢位问题并非已成古老的历史。 www.ibm.com 9. When the date and time fields in a message header are improperly formatted, the result is a buffer overflow. 当邮件标题中的日期和时间字段格式设置不正确时,将导致缓冲区溢出。 support.microsoft.com 10. We proposed a method to forbid attackers to exploit the buffer overflow vulnerabilities. 本文提出了一种阻止攻击者利用缓冲区溢出漏洞的方法。 lib.cqvip.com 1. Clearly, you would think by now that buffer overflow errors would be obsolete. 很明显,至此您不会认为缓冲区溢位错误将是过时的。 www.ibm.com 2. But not four months later, yet another exploitable buffer overflow was discovered that the manual audit missed. 但是,不到四个月,又发现了另一个手动审查时遗漏的可利用的缓冲区溢位。 www.ibm.com 3. As a result, buffer overflow problems are often invisible during standard testing. 因此,缓冲区溢位问题常常在标准测试期间是发现不了的。 www.ibm.com 4. Looking at the program, it is also easier for an attacker to figure out how to cause a buffer overflow with real inputs. 检视这个程式,攻击者更容易得出如何利用实际输入导致缓冲区溢位。 www.ibm.com 5. Large delay jitter causes buffer overflow and the user encounters interrupts. 过大的分组延迟抖动将导致语音的中断,画面的停顿和跳跃。 www.ceps.com.tw 6. So why are buffer overflow vulnerabilities still being produced? 所以,为什麽现在仍产生缓冲区溢位这种致命错误呢? www.ibm.com 7. Buffer overflow proves impossible as data copies only when room for extra data exists. 事实证明缓冲区溢出也不可能会发生,因为仅当存在额外数据空间时才会复制数据。 www.ibm.com 8. In the current network and distributed system security, buffer overflow is widely used by more than 50%. 在当前网络与分布式系统安全中,被广泛利用的50%以上都是缓冲区溢出。 kns50.chkd.cnki.net 9. This column gives an overview of the buffer overflow problem. 本专栏概述了缓冲区溢位问题。 www.ibm.com 10. Don't rely on dynamic allocation for everything and forget about the buffer overflow problem. 不要依靠动态指派所有一切,而遗忘缓冲区溢位问题。 www.ibm.com 1. There are two main types of root exploits: buffer overflow attacks and executing scripts against a server. 这里有两种主要的超级用户进入类型:缓冲溢出攻击和在服务器上执行脚本。 www.ibm.com 2. Present a new simple and easy method to defend against buffer overflow attack. 提出了一种新的简单、易实施的防御缓冲区溢出攻击的方法。 www.ceps.com.tw 3. There are a number of tools that can help detect buffer overflow vulnerabilities before they're released. 有许多工具可以在缓冲区溢出缺陷导致问题之前帮助检测它们。 www.ibm.com 4. The experiment results show that the proposed scheme can improve the picture quality at or after scene change without buffer overflow. 实验表明,该方法可以在保证编码缓冲区不发生上溢的前提下改善切换点及后续帧的图像编码质量。 www.ceps.com.tw 5. The vast majority of remote attacks are carried out by exploiting buffer overflow, the particular case of which is stack overflow. 大多数远程攻击是利用缓冲区溢出技术进行的,特别是栈溢出。 bbs.pediy.com 6. We're talking about the #1 security vulnerability today -- the buffer overflow. 我们将要讨论的是当前第1号安全漏洞——缓冲区溢出。 www.ibm.com 7. An input buffer overflow has occurred. 发生输入缓冲区溢出。 msdn2.microsoft.com 8. Normally you can't buffer overflow in managed code. 通常不会在托管代码中发生缓冲溢出。 www.cnblogs.com 9. A fix for a buffer overflow problem in dhcpd(8). 修复了dhcpd(8)中的缓冲区溢出问题。 www.ibm.com 10. So can you use the standard C library's routines for preventing buffer overflow? 那么可以使用标准C库的例程来防止缓冲区溢出吗? www.ibm.com 1. Specifies that an exception appropriate to the condition , such as out of memory , buffer overflow, and so forth, be thrown . 指定引发相应于该条件的异常,如内存不足、缓冲区溢出等。 www.bing.com 2. The root cause of buffer overflow problems is that C (and its red-headed stepchild, C ) is inherently unsafe. 引起缓冲区溢位问题的根本原因是C(与其后代C )本质就是非安全的。 www.ibm.com 3. This is why our next four columns will deal with buffer overflow. 这就是下面四个专栏将讨论缓冲区溢位的原因。 www.ibm.com 4. In 1999, buffer overflow was named the No. 1 computer vulnerability. 1999年,缓冲溢出被定为头号计算机安全隐患。 www.kancaimi.cn 5. What is a buffer overflow? 什麽是缓冲区溢位? www.ibm.com 6. This tracking or recomputation is easy to get wrong, and any mistake can open the door to a buffer overflow attack. 这种跟踪或重新计算很容易出错,而任何错误都可能给缓冲区攻击打开方便之门。 www.ibm.com 7. This paper is to study and realize an information hiding-based buffer overflow attack. 本文即在研究及实作一种以资讯隐藏为基础的缓冲区溢位攻击技术。 www.ceps.com.tw 8. Construction of Buffer Overflow Prevention Architecture 缓冲区溢出防护体系的构造 www.ilib.cn 9. Analysis of Compiler Technology Enhancement for Buffer Overflow Prevention 防止缓冲区溢出攻击的增强编译技术分析 www.ilib.cn 10. Microsoft Windows WINS Name Value Handling Remote Buffer Overflow Vulnerability 名称值处理远端缓衝区溢位弱点 www.symantec.com 1. Buffer Overflow in Windows Troubleshooter ActiveX Control Could Allow Code Execution Windows疑难解答ActiveX控件中的缓冲区溢出可能允许代码执行 support.microsoft.com 2. Hardware Solution for Detection and Prevention of Buffer Overflow Attacks in CPU Micro-architecture CPU微结构中侦测和防止缓冲区溢出的实现 service.ilib.cn 3. A Survey on Detection and Prevention Technologies of Buffer Overflow Vulnerability 缓冲区溢出脆弱性检测和预防技术综述 www.ilib.cn 4. Study of Buffer Overflow Attack Principle 缓冲区溢出攻击的原理分析 www.ilib.cn 5. Buffer Overflow Exploit Possible with Extended Stored Procedures 扩展存储过程可能会导致缓冲区溢出漏洞 support.microsoft.com 6. Analysis and Precautionary Measures of Buffer Overflow Attacking 缓冲区溢出攻击的分析及防范措施 www.ilib.cn 7. Download details: Windows 2000 Security Patch: Multiple UNC Provider Buffer Overflow Vulnerability 下载详细信息:Windows2000安全修补程序:多个UNC提供程序缓冲区溢出漏洞 www.microsoft.com 8. The research and implement of defending against buffer overflow in the security of embedded systems 嵌入式系统安全中缓冲区溢出防止技术的研究与实现 ilib.cn 9. Buffer overflow on substitution character insertion 替换字符插入导致缓冲区溢出 www.ibm.com 10. Analysis of StackGuard for Detection and Prevention of Buffer Overflow Attacks 用堆栈卫士检测和阻止缓冲区溢出攻击的策略分析 service.ilib.cn 1. The Research and Implementation of Defense of Buffer Overflow Virtual Machine 一种缓冲区溢出防御虚拟机的研究与实现 www.ilib.cn 2. Analysis Of Defence Methods Against Buffer Overflow Attacks 缓冲区溢出攻击的防护技术分析 ilib.cn 3. Dangerousness of Buffer Overflow and Measures of Prevention 缓冲区溢出的危害及防范 www.ilib.cn 4. The following example is vulnerable to a heap-based buffer overflow 以下示例容易出现基于堆的缓冲区溢出 www.ibm.com 5. Protection against buffer overflow in embedded system 嵌入式网络安全设备的抗缓冲区溢出攻击机制 www.ilib.cn 6. Invasion Detection System to Avoid Buffer Overflow 防止缓冲区溢出漏洞的入侵检测系统 www.ilib.cn 7. Defence Methods Against Buffer Overflow Attacks 缓冲区溢出攻击的防护措施 www.ilib.cn 8. Sending Windows Message by Buffer Overflow Technique 利用缓冲区溢出技术强行推送信使 www.ilib.cn 9. Mechanism and Attacking Analysis of Buffer Overflow 缓冲区溢出机理及攻击分析 service.ilib.cn 10. Effective Strategy in Defence of Buffer Overflow Attacks 防御缓冲区溢出攻击的有效策略 www.ilib.cn 1. The Attack of Buffer Overflow and Its Solution 缓冲区溢出攻击及解决方案 service.ilib.cn 2. Security Research on Computer Buffer Overflow 计算机缓冲区溢出安全问题研究 www.ilib.cn 3. Research on Principle and Defense of Buffer Overflow Attacks 缓冲区溢出攻击原理与防范的研究 www.ilib.cn 4. BOVADA Arithmetic to Analyze and Detect Buffer Overflow Vulnerability 一种缓冲区溢出漏洞分析与探测算法 www.ilib.cn 5. A Defending Method Against Buffer Overflow Attack 一种防止缓冲区溢出攻击的新方法 www.ilib.cn 6. Analysis on Buffer Overflow Attacks and Defenses 缓冲区溢出漏洞攻击的分析研究 ilib.cn 7. Principles and Repair Methods of Buffer Overflow 缓冲区溢出的原理与修复方法 www.ilib.cn 8. Analysis of Buffer Overflow Attacks and Defenses 缓冲区溢出攻击手段及防范策略分析 www.ilib.cn 9. Study on Buffer Overflow Attack and New Protection Method 缓冲区溢出攻击及防御措施的研究 www.ilib.cn 10. Study on Buffer Overflow Attack and Detection Method 缓冲区溢出攻击及检测方法研究 www.ilib.cn 1. The Research of Anti-buffer Overflow Technology 缓冲区溢出的防范技术研究 www.ilib.cn 2. Buffer Overflow in Outlook Express Mail Header OutlookExpress邮件标题中的缓冲区溢出 support.microsoft.com 3. The Discovery of Buffer Overflow Vulnerabilities Based on Binary Scanning 二进制扫描的缓冲区溢出漏洞探测技术 service.ilib.cn 4. Download details: Windows NT 4. 0 Security Patch: Phone Book Service Buffer Overflow Vulnerability 下载详细信息:WindowsNT4.0安全修补程序:通讯簿服务缓冲区溢出漏洞 www.microsoft.com 5. A Survey of Buffer Overflow Attacks and Defenses 基于缓冲溢出漏洞的攻击及其预防研究综述 www.ilib.cn 6. Defense Buffer Overflow in Code Writing 在程序编码中防止缓冲区溢出 service.ilib.cn 7. The Research of Buffer Overflow Attacks 缓冲区溢出攻击技术研究 www.ilib.cn 8. Analysis of Buffer Overflow in Binary Files 基于二进制代码的缓冲区溢出检测研究 www.ilib.cn 9. A new approach of network buffer overflow detection based on code execution simulation 基于代码执行模拟的远程缓冲区攻击检测方法 www.ilib.cn 10. Study on Buffer Overflow and Injected Code 缓冲区溢出原理及植入代码的分析研究 www.ilib.cn 1. On Attack Based on Buffer Overflow Loophole and Protection Technology 基于缓冲区溢出漏洞的攻击及防范技术探讨 www.ilib.cn 2. The Realization of the Network Attack based on Buffer Overflow 基于缓冲区溢出的网络渗透技术的实现 www.ilib.cn 3. A Buffer Overflow Study - Attacks and 缓冲溢出攻防学习 bbs.tranbbs.com 4. FPW Detects Buffer Overflow in Real Time FPW对缓冲区溢出的实时检测 www.ilib.cn 5. An Approach to Buffer Overflow Attacks Based on Program Logic Analysis 一种基于程序逻辑结构分析的缓冲区溢出攻击抵御方法 service.ilib.cn 6. Study on buffer overflow attack of RPC RPC接口中的缓冲区溢出攻击探讨 service.ilib.cn 7. Research on Trojan Horse Based on Buffer Overflow 基于缓冲区溢出的木马研究 www.ilib.cn 8. Technology to Prevent Buffer Overflow Attacks Based on CPU Hardware 基于CPU硬件的缓冲区溢出攻击的防范技术 service.ilib.cn 9. Attack and Defense Based on Buffer Overflow 缓冲区溢出攻击与防范 www.ilib.cn |
随便看 |
|
英汉双解词典包含2704715条英汉词条,基本涵盖了全部常用单词的翻译及用法,是英语学习的有利工具。