What is the translation of " 恶意攻击者 " in English?

malicious attackers
malicious actors
恶意 行为 者

Examples of using 恶意攻击者 in Chinese and their translations into English

{-}
  • Political category close
  • Ecclesiastic category close
  • Programming category close
它将允许恶意攻击者耗尽资金,他说。
It would allow a malicious attacker to drain the wallet of funds, he said.
它将允许恶意攻击者耗尽资金,他说。
It would let a hateful attacker deplete the wallet of funds, he said.
Web应用程序的安全漏洞为恶意攻击者提供了大量的机会。
As a result,web application vulnerabilities provide massive opportunities for malicious actors.
恶意攻击者利用的十大网络漏洞是什么?
What were the top 10 web exploits used by malicious attackers in 2018?
恶意攻击者经常对受害者使用多种威胁,以查看受害者易受伤害的情况。
Malicious attackers often use a multitude of threats against their victims, to see what their victims are vulnerable to.
使用这些盗取的凭证,恶意攻击者可以接管账号、盗取个人数据,并产生对您的业务带来毁灭性影响的雪球效应。
Using these stolen credentials, malicious actors can take over accounts and steal personal data, creating a snowball effect that can be devastating for your business.
这是因为恶意攻击者现在使用一系列工具采用大多数程序员想象不到的方式进行反向工程、跟踪和操纵应用。
That's because malicious attackers now use an arsenal of tools to reverse-engineer, trace, and manipulate applications in ways that most programmers aren't aware of.
这是为了防止恶意攻击者控制合法的扩展及其用户。
This is intended to help prevent malicious actors from taking control of legitimate add-ons and their users.
此外,恶意攻击者也利用不同的工具让识别这类设备变得更加困难。
At the same time, malicious attackers are employing various tools to make it harder to identify compromised devices.
这些漏洞可能会暴露用户数据或允许恶意攻击者访问测试和开发中使用的计算机和服务器。
These vulnerabilities can leave user data exposed orallow malicious actors to gain access to computers and servers used in testing and development.
这份报告指出恶意攻击者不断试图破坏应用程序,而WAF则是有效分层防御战略的关键组成部分。
According to the report, malicious attackers are constantly aiming to breach applications, and WAFs are a key part of an effective, layered prevention strategy.
恶意攻击者可以通过VoIP渗出敏感数据,这给企业制造了安全漏洞。
Malicious actors can exfiltrate sensitive data over VoIP, creating a security hole for enterprises.
据报告可知,有些情况下由于客户未能应用可用的Oracle补丁,恶意攻击者取得了成功。
In some instances, it has been reported that malicious attackers have been successful because customers had failed to apply the Oracle patches.
由于Golang通常不会被反病毒软件检测到,因此恶意攻击者已开始将其用作恶意软件语言。
As Golang isnot typically detected by anti-virus software, malicious actors have started using it as a malware language.
这些连接在一起的设备构成了一个巨大的攻击面,正频繁地被合法的安全研究人员以及恶意攻击者以同样的方式利用着。
These connected devices represent an enormous attack surface which is activelybeing exploited by legitimate security researchers and malicious attackers alike.
如果没有收费,任何恶意攻击者只需发送数百万笔微小的交易就能填满整个系统并使系统瘫痪。
Without fees any malicious attacker could simply send millions of tiny transactions just to fill up the blocks and paralyze the system.
恢复出厂设置进程中的信息披露漏洞可让本地恶意攻击者获取先前所有者的数据。
An information disclosure vulnerability in the factoryreset process could enable a local malicious attacker to access data from the previous owner.
最终,这将使恶意攻击者能够访问其他赛门铁克客户的信息,识别高价值目标,并执行自动化攻击。
This would have, eventually, allowed the malicious attacker to access information on other Symantec customers, identifying high-value targets, and perform automated attacks.
夏娃是被动和顺从的窃听者,恶意攻击者是马洛里,所有人都信任的特伦特,仅举几例。
There's Eve, the passive and submissive eavesdropper, Mallory the malicious attacker, and Trent, trusted by all, just to name a few.
平均而言,企业要花256天发现由恶意攻击者造成的数据泄露事故,并花82天来遏制它。
On average,it took respondents 256 days to spot a breach caused by a malicious attacker, and 82 days to to contain it.
恶意攻击者占恶意攻击事故的55%,而下一个最大的攻击来源是人为错误,占25%。
Malicious outsiders accounted for 55 per cent of the breach incidents, while the next largest source is human error, at 25 per cent.
而一旦量子计算机落入恶意攻击者手中,就能够解密当前受到公司和政府保护的敏感数据。
A quantum computer in the hands of a malicious attacker will be able to decrypt sensitive data currently protected by corporations and governments.
例如,PoS拥护者认为PoS的安全性比PoW更高,因为一旦某个恶意攻击者被识别出来,他的财产会立即被没收。
For example,PoS advocates argue that PoS is more secure than PoW because if a malevolent attacker is identified, she can be immediately slashed.
然而,去中心化DNS也可能遭到恶意攻击者的滥用。
However, decentralized DNS can also be abused by attackers for malicious purposes.
本地恶意攻击者可利用该漏洞获取root权限或逃离jail。
This could allow a malicious local user to gain root privileges or escape from a jail.
Monsegur担心这仍然可能足以让恶意攻击者对这些代码进行逆向工程。
Monsegur, worried that it might still be enough for malicious actors to reverse-engineer the code.
恶意攻击者可以借此发送请求,并接收最多64KB的内存缓冲区内可用信息。
Threat actors could send a request and receive up to 64 kilobytes of any of the information available in the memory buffer.
因此,恶意攻击者只会消耗掉他们的EOS代币赋予他们的那部分网络。
Spammers can attack only that part of the network, the right to which gives them the available coins;
要利用此漏洞,恶意攻击者必须使用从针对IP-HTTPS服务器身份验证的域颁发的证书。
To exploit the vulnerability, an attacker must use a certificate issued from the domain for IP-HTTPS server authentication.
Results: 29, Time: 0.0232

Word-for-word translation

Top dictionary queries

Chinese - English