网站首页  词典首页

请输入您要查询的英文单词:

 

单词 SQL-injection
释义

SQL-injection

  • 网络注入;资料库隐码攻击;资料库注入攻击
1.
注入
...试所有常见的 Web 应用程序漏洞,包括 SQL 注入 (SQL-Injection),跨站点脚本攻击 (Cross-Site Scripting) 以及内存溢出 (Buf…
www.ibm.com
2.
资料库隐码攻击
(二) 应用程式所有输入栏位应进行字元检查,排除不必要特殊字元(如' "!$%^&*_|->;等)以防止资料库隐码攻击(SQL-injection)。 …
www.docin.com
3.
资料库注入攻击
...<;等)或跳脱字元,以避免被进行跨网站(XSS)及资料库注入攻击SQL-injection)。
edu.law.moe.gov.tw
4.
资料隐码攻击
由於该工具只针对资料隐码攻击(SQL-Injection)与跨网站字串攻击(XSS)两大弱点,所能找到的网站弱点有限,经费稍稍充裕一 …
www.informationsecurity.com.tw
5.
隐码很像的东西
跟资料隐码很像的东西 (SQL-injection) 本站作品 每月文章 每月文章 五月 (1) 四月 (3) 三月 (6) 二月 (5) 一月 (3) 十二月 (...
dev.sopili.net

例句

释义:
1.
What's more, SQL injection is one of many common avenues of assault that allows attackers to take complete control of a relational database.
更严重的是,SQL注入是攻击者能够完全控制关系型数据库的攻击手段之一。
shi-wei.net
2.
The announcement said the group pulled off the hack using a simple SQL injection vulnerability -- a common website weakness.
黑客声明里称,他们利用了网页中常见的漏洞—一个简单的SQL注入漏洞,轻易地实行了这次袭击。
kk.dongxi.net
3.
SQL Injection attack is a form of attack that comes from user input that has not been checked to see that it is valid.
SQL注入攻击是一种来自于用户输入数据相关的攻击,这种输入没有被检测有效性。
www.tianya.cn
4.
This tactic is called "SQL injection" and is a very common form of attack.
这种伎俩称为“SQL注入”,是非常常见的攻击方式。
www.ibm.com
5.
Like the SQL injection attack, you can often easily deal with the threat if you follow best practices to develop secure applications.
与SQL注入攻击类似,如果使用最佳实践开发安全的应用程序,通常可以轻松地处理该威胁。
www.ibm.com
6.
SQL injection is still one of the most common types of an injection flaw.
SQL注入仍然是最常见的一种注入缺陷。
www.ibm.com
7.
A few weeks ago, the Wintellect Web site was under attack through a sophisticated form of SQL injection.
几周前,WintellectWeb站点受到一种很复杂的SQL注入的攻击。
msdn2.microsoft.com
8.
The risk of SQL injection attacks is not the only reason to avoid dynamic SQL.
SQL注入式攻击的风险并不是避免动态SQL的唯一理由。
msdn2.microsoft.com
9.
The attack, to a certain extent, can be accelerated if applying the multi-threading technology to judging SQL injection point.
采用多线程技术对SQL注入点进行判断,在一定程度上提高了攻击速度;
www.boshuo.net
10.
Because 1=1 is going to be true, the most basic form of an SQL injection works here.
由于1=1将会为真,所以SQL注入最基本的形式在这里出现。
www.ibm.com
1.
Of course, this example only scratches the surface of an SQL injection.
当然,本例只涉及到了SQL注入的皮毛。
www.ibm.com
2.
The firm is also said to have left its databases open to "SQL injection" , a means of inserting malicious code.
还有传言称,其数据库对“资料隐码攻击”(SQLinjection)城门洞开,恶意代码植入畅行无阻。
www.ecocn.org
3.
Therefore, it is of important practical significance to have study on preventive technology of SQL injection.
因此,针对SQL注入攻击的防范技术研究具有重要的现实意义。
www.boshuo.net
4.
SQL injection is probably the number one problem for any server-side application, and this book is unequaled in its coverage.
SQL注入可能是方的申请号的任何一个问题的服务器,这本书是其无与伦比的覆盖面。
ccebook.net
5.
SQL injection is essentially the same problem as the shell meta-character one, but with an SQL interpreter instead of the shell.
SQL注入本质上与shell元字符的问题是相同的,不过它是由SQL解释器进行解释的,而不是由shell进行解释的。
www.ibm.com
6.
In fact, SQL injection attacks can be wielded against desktop applications as well.
实际上,也可能对桌面应用程序展开SQLInjection攻击。
www.cnblogs.com
7.
Filtering input may also be helpful in protecting against SQL injection by removing escape characters.
筛选输入可以删除转义符,这也可能有助于防止SQL注入。
msdn2.microsoft.com
8.
In an SQL injection attack, a program creates an SQL command and sends it to an SQL interpreter.
在SQL注入攻击中,程序会创建一个SQL命令,并将其发送给SQL解释器。
www.ibm.com
9.
By keeping the code server side, you reduce the risk of any malicious activity through cross-site scripting, SQL injection, and so on.
通过将代码放在服务器端,减少了通过跨站点脚本、SQL注入等手段进行恶意活动的风险。
mymemory.translated.net
10.
Although this example demonstrates an SQL injection in its simplest form, you can see just how easy it is for an attacker to use.
尽管本例以最简单的形式演示了一个SQL注入,但是您可以看出攻击者利用SQL注入有多么容易。
www.ibm.com
1.
The SQL injection attack shown in Figure 3 resulted in the display of user names and passwords from the Users table.
图3所示的SQLInjection攻击导致显示Users表中的用户名和密码。
www.cnblogs.com
2.
In is proposed an approach that combines penetration testing with anomaly detection for uncovering SQL Injection vulnerabilities.
在提出了一种方法,即结合渗透测试,对于揭露异常检测SQL注入漏洞。
wenwen.soso.com
3.
Although SQL Injection is still possible with magic quotes on, the risk is reduced.
尽管SQL注入在魔术引号打开的情况下仍然有可能实现,但起码系统的风险减少很多了。
ie2.php.net
4.
SQL injection is easier to beat; you simply need to properly escape each piece of untrusted data before building your query.
相比之下,SQL入侵更容易对付。您只需在构造查询之前,适当地排除每块不受信任的数据。
www-128.ibm.com
5.
In an SQL injection attack, Mallory finds a Web site that Alice has created to sell electronics.
在SQL注入攻击中,Mallory找到Alice创建来售电的一个Web站点。
www.ibm.com
6.
Anyplace that a database query uses a value, the same approach allows the possibility of a SQL injection attack.
在数据库查询可以使用数据值的任何地方,同样的方式都有可能导致SQL注入攻击。
www.ibm.com
7.
Stored procedures may be susceptible to SQL injection if they use unfiltered input .
类似地,决不将未经筛选的用户输入存储在数据库中。
www.bing.com
8.
This method removes the potential for an SQL injection attack.
这种方法消除了SQL注入攻击的可能性。
www.ibm.com
9.
This approach can completely eliminate the potential SQL injection attack.
这种方法可以完全消除SQL注入攻击的风险。
www.ibm.com
10.
SQL injection attacks are a vulnerability that tend to hurt high-value sites.
SQL注入攻击是一个可能会损害高价值站点的漏洞。
www.ibm.com
1.
SQL injection vulnerabilities are yet another class of input validation flaws.
SQL注入攻击是另一种输入验证上的漏洞。
www.zhidun.com
2.
Doing so makes the SQL easier to maintain and secures your application from SQL injection attacks.
这样做可使SQL更加易于维护,且可使您的应用程序免受SQL注入攻击。
www.ibm.com
3.
Performance aside, parameterized queries are great for preventing SQL injection attacks.
除了性能收益外,参数化查询还有助于阻止SQL注入攻击。
www.ibm.com
4.
Currently the most potent threat against databases is SQL injection and your key defense will be to use parameterized stored procedures.
目前,对数据库最大的威胁是SQL注入攻击,因此您进行防护的关键是采用参数化存储过程。
shi-wei.net
5.
Does Structured Query Language (SQL) injection fail?
结构化查询语言(StructuredQueryLanguage,SQL)注入是否失败?
www.ibm.com
6.
There are many common application-level security issues which can lead to security breaches, including buffer overflows and SQL injection.
有很多应用程序级别的普通保密问题会引起打破保密性,包括缓冲溢出和嵌入SQL。
bbs.51testing.com
7.
This removes the need to do preparation at runtime and can reduce SQL injection risk.
这样就无需在运行时执行准备工作,且可以减少SQL注入风险。
www.ibm.com
8.
so if some text, picture or some content is missing on returned page then that site is vulrnable to blind sql injection.
因此,如果一些文字,图片或缺少一些内容网页上,然后返回该站点是。
www.phpfans.net
9.
Added the section "Reviewing Code for SQL Injection. "
添加了“在代码中检查SQL注入”部分。
msdn2.microsoft.com
10.
It is essential to guard against a class of vulnerability called "SQL injection" .
防御一系列称为“SQL注入式”的安全漏洞是至关重要的。
msdn2.microsoft.com
1.
Many intrusion vulnerabilities such as SQL injection, CSRF, and XSS are preventable using a comprehensive input-validation framework.
如果使用一个综合的输入验证框架,许多输入漏洞,如SQL注入、CSRF和XSS,都是可以避免的。
www.ibm.com
2.
SQL injection is an attack in which malicious code is inserted into strings that are later passed to SQL Server for parsing and execution.
SQL注入是一种攻击方式,在这种攻击方式中,有害代码被插入到字符串中,然后将该字符串传递到SQLServer以进行分析和执行。
msdn2.microsoft.com
3.
Using the EXECUTE statement to execute a string facilitates SQL injection attacks.
使用EXECUTE语句执行字符串容易受到SQL注入攻击。
msdn2.microsoft.com
4.
The following script shows a simple SQL injection.
以下脚本显示了一个简单的SQL注入。
msdn2.microsoft.com
5.
SQL injection is the second most popular vulnerability, primarily because of the growing dependence Web sites have on databases.
SQL注入是第二个最流行的漏洞,这主要是因为Web站点对数据库的依赖性日益增加。
www.ibm.com
6.
In order to detect and block SQL injection attacks, you need to define legitimate SQL queries you wish to allow from the application.
为了检测和阻止SQL注入攻击,你需要为你的应用程序定义合法的SQL查询语句。
shi-wei.net
7.
To find the problem with any SQL injection, perform source code analysis.
要发现任何SQL注入问题,可执行源代码分析。
www.ibm.com
8.
Inserted a security note about SQL injection.
插入了有关SQL注入的安全说明。
msdn2.microsoft.com
9.
There are many ways in which you can thwart a SQL injection attack.
要阻止SQL注入攻击,有许多方法。
msdn2.microsoft.com
10.
Increased protection from attacks such as Cross-site Scripting ( XSS), SQL Injection and Remote File Inclusions ( RFI).
更多的安全防护措施,如跨站脚本(XSS)、SQL注入及远程文件包含(RFI)。
www.infoq.com
1.
SQL injection attacks can also be used to change data or damage the database.
SQLInjection攻击还可用于更改数据或损坏数据库。
www.cnblogs.com
2.
The main way: password loophole attack, SQL Server extended stored procedure attack, SQL Injection (SQL Injection), steals backup, etc.
主要手法有:口令漏洞攻击、SQLServer扩展存储过程攻击、SQL注入(SQLInjection)、窃取备份等。
www.bing.com
3.
At the same time in terms of security, the use of LINQ itself is a clever solution to the problem of SQL injection attacks.
同时在安全性方面,运用LINQ本身特性巧妙地解决SQL注入式攻击问题。
degree.fzu.edu.cn
4.
Using the Hacme Casino site again, let's look at the vulnerability that WebScarab found: an SQL injection exploit at the login.
再次使用HacmeCasino站点,我们来看一下WebScarab发现的漏洞:在登录时出现一个SQL注入exploit。
www.ibm.com
5.
These are frequently attacked though a method called " SQL injection" .
常用的攻击方法被称为“SQL注入”。
www.bing.com
6.
Ruby on Rails has some clever helper methods, for example against SQL injection, so that this is hardly a problem.
RubyonRails有许多聪明的helper方法,例如防止注入攻击的方法,这让sql注入变成了困难的事情。
www.bing.com
7.
Know about SQL injection and how to prevent it.
了解SQL注入(SQLinjection)及其预防方法。
blog.sina.com.cn
8.
Eliminate SQL injection risk by only allowing approved SQL to be executed
通过只允许执行获得许可的SQL来消除SQL注入攻击
www.ibm.com
9.
Security Testing and Assessment of Malicious SQL Injection and Behavior Monitoring
基于恶意注入和行为监控的SQL注入安全测试和评估
www.ilib.cn
10.
SQL injection, in which the input contains SQL code that's erroneously executed in the database back end;
指在输入包含SQL代码,诱发错误的数据库后端执行;
www.infoq.com
1.
Editable Data Validation - HDIV analyzes all editable fields to remove cross-site scripting and SQL injection attacks
可编辑数据验证——为了去除跨站点脚本和SQL注入攻击,HDIV分析所有的可编辑数据域。
www.infoq.com
2.
automatically escapes data saved to the database (to prevent SQL injection attacks)
避免数据自动存入数据库(阻止SQL注入式攻击)
www.bing.com
3.
The Cross- Website Scripting Attack and SQL Injection Attack
浅论网站交叉脚本攻击和SQL插入攻击
service.ilib.cn
4.
Discussion on the principle and recovery of SQL injection attack
浅议SQL注入攻击的原理及防御
scholar.ilib.cn
5.
Analyse on Techniques of SQL Injection and Security Policy
SQL注入与安全防范技术分析
www.ilib.cn
6.
Better security (less risk of dynamic SQL injection)
提高安全性(降低动态SQL注入的风险)
www.ibm.com
7.
The realization and prevention of SQL injection
SQL注入攻击的实现和防范
www.ilib.cn
8.
A New Approach for Preventing SQL Injection Attacks
一种新的SQL注入攻击的防范方法
www.ilib.cn
9.
On analysis and prevention of SQL injection
SQL注入漏洞的分析及防范
www.ilib.cn
10.
Strategy and Implement to Prevent SQL Injection Attacks
防止SQL注入攻击策略与实现
scholar.ilib.cn
1.
A New Policy to Defend against SQL Injection Attacks
一种新的反SQL注入策略的研究与实现
www.ilib.cn
2.
A Method Of Preventing SQL Injection Attack And It's Usage
SQL注入攻击全面预防办法及其应用
www.ilib.cn
随便看

 

英汉双解词典包含2704715条英汉词条,基本涵盖了全部常用单词的翻译及用法,是英语学习的有利工具。

 

Copyright © 2004-2022 Newdu.com All Rights Reserved
更新时间:2024/12/25 16:07:24