网站首页  词典首页

请输入您要查询的英文单词:

 

单词 buffer overflows
释义

buffer overflows

  • 网络缓冲区溢位;缓冲区溢出;缓存溢出
1.
缓冲区溢位
Windo... ... IDS,Firewalls and Honeypot 入侵侦测系统,防火墙与网路诱陷系统 Buffer Overflows 缓冲区溢位 Cryptography 密码 …
blog.xuite.net
2.
缓冲区溢出
WebGoat - whuwebsec ... ... 授权问题( Authentication Flaws) 缓冲区溢出( Buffer Overflows) 代码质量问题( Code Quality) ...
code.google.com
3.
缓存溢出
...、进程窃取(session tampering)及缓存溢出buffer overflows)等各类。.
www.heartsone.net
4.
缓存溢出问题
Web... ... 跨站点脚本攻击 Cross Site Scripting Flaws 缓存溢出问题 Buffer Overflows 注入式攻击 Injection Flaws ...
bbs.51testing.com
5.
缓冲区泛滥
密码学与信息安全的前景如何... ... 20. Buffer Overflows( 缓冲区泛滥 ) 21. Cryptography( 密码学 ) ...
zhidao.baidu.com
6.
缓冲区溢位攻击
在个人电脑的领域中,缓冲区溢位攻击(Buffer Overflows)及类似的直接攻击常见於系统攻击。这些攻击的目标可以是装置及执 …
www.2cm.com.tw
7.
介绍缓冲区溢位
EC... ... Cryptography( 介绍密码学) Buffer Overflows( 介绍缓冲区溢位) Secure Network Programming( 开发安全的网路程式) ...
www.uuu.com.tw
8.
缓冲溢出
该功能发现了缓冲溢出(buffer overflows)安全漏洞。解码时未能严格检测编码文件名长度。
www.it.com.cn

例句

释义:
1.
A simple solution for buffer overflows is to switch to a language that prevents them.
针对缓冲区溢出的一种简单解决办法就是转为使用能够防止缓冲区溢出的语言。
www.ibm.com
2.
Likewise, when a buffer overflows, the excess data may trample on other meaningful data that the program might wish to access in the future.
同样地,当缓冲区溢位时,额外的资料会摧残程式将来可能要存取的其它有用的资料。
www.ibm.com
3.
In this column we've introduced you to buffer overflows, which are probably the worst software security problem of all time.
在本专栏中,介绍了缓冲区溢位,它永远可能是最糟的软体安全性问题。
www.ibm.com
4.
For some reason, developers have not readily moved to eliminate buffer overflows as the leading pitfall in software security.
由于某些原因,工作人员尚未积极推动消除缓冲区溢位这一软体安全性的主要陷阱。
www.ibm.com
5.
Buffer overflows begin with something every program needs: a place to put bits.
缓冲区溢位开始于每个程式都需要的一些情况︰放置位元的空间。
www.ibm.com
6.
In chart above, the number of vulnerabilities that can be directly attributed to buffer overflows is displayed.
以上图表中,显示了可以直接归为缓冲区溢位的弱点数。
www.ibm.com
7.
An alternative is to use another programming language, since almost all of today's other languages protect against buffer overflows.
一种替代方法是使用另一种编程语言,因为如今的几乎其他所有语言都能防止缓冲区溢出。
www.ibm.com
8.
The most frequent attack path hackers use to get into systems is to use stack overflows, buffer overflows, and memory overflows.
黑客用来闯入系统最常见的攻击方法是使用堆栈溢出、缓冲区溢出和内存溢出。
www-128.ibm.com
9.
It's a lot easier to find potential buffer overflows (or most security flaws, for that matter) when you have the source code for a program.
当有程式的来源程式码时,就非常容易找到潜在的缓冲区溢位(或者更进一步,大多数的安全性瑕疵)。
www.ibm.com
10.
Later topics will include avoiding buffer overflows, minimizing privileges, and avoiding race conditions.
以后的主题将包括避免缓冲区溢出、使特权最小化以及避免竞态状态。
www.ibm.com
1.
Buffer overflows are the cause of many a security bug.
缓冲区溢出是许多安全性问题的起因。
www-128.ibm.com
2.
Another way in which buffer overflows cause security problems is through stack-smashing attacks.
缓冲区溢位导致安全性问题的另一个方法是透过摧毁堆叠。
www.ibm.com
3.
The most spectacular buffer overflows are stack smashes that result in a superuser, or root, shell.
最惊人的缓冲区溢位是堆叠的摧毁,它会在超级使用者或root、shell中造成后果。
www.ibm.com
4.
Very long descriptors cause buffer overflows on the PS3, allowing code to be injected onto the stack and executed.
非常长的描述会引起PS3缓存溢出,导致允许代码注入栈并被执行。
www.linux-ren.org
5.
Commonly, attackers exploit buffer overflows to get an interactive session (shell) on the machine.
一般地,攻击者利用缓冲区溢位得到机器上的交谈式Session(shell)。
www.ibm.com
6.
Buffer overflows are a commonly exploited security problem.
缓冲溢出是常用的挖掘安全问题的手段。
mirror.dream4ever.org
7.
Although there are lots of ways that buffer overflows can be exploited, the most common approach is the "stack-smashing" attack.
虽然存在许多利用缓冲区溢出的方法,不过最常见的方法还是“stack-smashing”攻击。
www.ibm.com
8.
Many of the crashes resulting from fuzz testing are direct results of memory allocation mistakes and buffer overflows.
由模糊测试导致的许多故障都是内存分配错误及缓冲器溢出的结果。
www.ibm.com
9.
Ada normally detects and prevents buffer overflows (raising an exception on the attempt), but various pragmas can disable this.
Ada一般会检测和防止缓冲区溢出(即针对这样的尝试引发一个异常),但是不同的程序可能会禁用这个特性。
www.ibm.com
10.
Some languages have "escape" clauses that allow buffer overflows to occur.
有些语言存在允许缓冲区溢出发生的“转义”子句。
www.ibm.com
1.
This prevents the server from doing added CPU and disk work if the buffer overflows.
这可防止在缓冲区溢出时服务器进行额外的CPU和磁盘工作。
www.ibm.com
2.
There are many common application-level security issues which can lead to security breaches, including buffer overflows and SQL injection.
有很多应用程序级别的普通保密问题会引起打破保密性,包括缓冲溢出和嵌入SQL。
bbs.51testing.com
3.
There's also information on buffer overflows, firewalls, intrusion detection, and lots more.
还有有关缓冲区溢出、防火墙、入侵检测等更多内容。
www.ibm.com
4.
Let's start with a quick review of buffer overflows.
现在让我们快速回顾一下缓冲区溢出问题。
www.ibm.com
5.
There are other ways to exploit buffer overflows besides smashing the stack and changing the return address.
除了smashing-stack和更改返回地址外,还存在利用缓冲区溢出缺陷的其他途径。
www.ibm.com
6.
In doing so, it triggers a series of buffer overflows allowing it to write various pieces of data and code to the stack.
这样做,它触发出一系列的缓存溢出,以允许自己向栈写入许多数据和代码。
www.linux-ren.org
7.
We'll go into the details of stack smashing in our third and fourth columns on buffer overflows.
我们将在缓冲区溢位的第三和第四专栏中详细讨论堆叠的摧毁。
www.ibm.com
8.
Memory debugging for finding memory leaks and buffer overflows in unmanaged code.
内存调试用于在非托管的代码中找到内存泄漏和缓冲区溢出。
www.ibm.com
9.
The exception thrown when the internal buffer overflows.
内部缓冲区溢出时引发的异常。
msdn2.microsoft.com
10.
C is slightly better but can still create buffer overflows.
C稍好一些,但仍会产生缓冲溢出。
www.kancaimi.cn
1.
Buffer overflows are, sadly, all too common in C programs.
非常不幸,缓冲区溢位在C程式中是太常见了。
www.ibm.com
2.
Why are buffer overflows a security problem?
为什麽缓冲区溢位是安全性问题?
www.ibm.com
3.
Stack and buffer overflows are two of the most common problems in the C and C world.
堆栈和缓冲溢出是C和C 环境中两个常见的问题。
www.ibm.com
4.
Occurs when the internal buffer overflows.
当内部缓冲区溢出时发生。
msdn2.microsoft.com
5.
Provides a discussion of buffer overflows and how to exploit them.
给出了关于缓存溢出以及如何利用它们的讨论。
www-128.ibm.com
6.
Let's dig deeper into why some kinds of buffer overflows have big security implications.
让我们更深入地瞭解某些缓冲区溢位会造成严重安全性隐患的原因。
www.ibm.com
7.
In the National Institute of Standards and Technology's ICAT index of computer vulnerabilities, six of the top 10 involve buffer overflows.
按(美国)国家标准与技术协会公布的ICAT计算机安全隐患指数,在最主要的十项安全隐患中有六项涉及缓冲溢出。
www.kancaimi.cn
8.
New tricks to counter buffer overflows
防止缓冲区溢出的新技术
www.ibm.com
9.
Common C and C mistakes that permit buffer overflows
导致缓冲区溢出的常见C和C 错误
www.ibm.com
10.
How to write buffer overflows
缓冲区溢出经典
post.baidu.com
随便看

 

英汉双解词典包含2704715条英汉词条,基本涵盖了全部常用单词的翻译及用法,是英语学习的有利工具。

 

Copyright © 2004-2022 Newdu.com All Rights Reserved
更新时间:2025/8/4 19:34:18