What is the translation of " INJECTION ATTACKS " in Chinese?

[in'dʒekʃn ə'tæks]
[in'dʒekʃn ə'tæks]
注入攻击

Examples of using Injection attacks in English and their translations into Chinese

{-}
  • Political category close
  • Ecclesiastic category close
  • Programming category close
The simplest SQL injection attacks depend on code such as:.
最简单SQL注入攻击会利用如下的代码:.
Synode: understanding and automatically preventing injection attacks on Node. js→.
Synode:自动化预防Node.js的注入攻击.
In order to avoid SQL Injection attacks, you should always escape any user provided data before using it inside a SQL query.
为了避免SQL注入攻击,你应该总是转义来自用户的任何数据,然后再把它用于SQL查询。
Synode: understanding and automatically preventing injection attacks on Node. js.
Synode:检测并自动防止Node.js上的注入攻击.
SQL injection attacks increased in 2012, with large volumes of user names and passwords getting hacked out of web servers and databases.
SQL注入攻击的增加在2012年,大量的遭到黑客攻击的Web服务器和数据库的用户名和密码。
In simple terms thereare three different strategies to eradicate SQL Injection attacks:.
简单来说有三种策略来应SQL注入攻击:.
Akamai researchers analyzed more than 8 million SQL injection attacks from Q1 2015 to uncover the most frequent methods and goals.
Akamai研究人员对2015年第一季度内800多万SQL注入攻击进行深入分析后,揭示出最常见的攻击方法与攻击目的。
We can use it as anextra precaution to protect our page from Frame Injection attacks.
我们可以使用它作为额外的预防措施来保护我们的页面免受框架注入攻击
Via SQL injection attacks, hackers take advantage of poorly coded Web application software to install malicious code in a company's systems and network.
通过SQL注入攻击,黑客们利用编码较差的Web应用软件在企业的系统和网络中安装恶意代码。
X which can be exploited bymultiple security vulnerabilities including SQL injection attacks.
X,此版本中存在包括SQL注射攻击在内的多项安全漏洞。
An attacker can exploit this vulnerability to perform script orcontent injection attacks, and attempt to trick the user into disclosing sensitive information.
成功利用此漏洞的攻击者可以执行脚本或内容注入攻击,并企图欺骗用户泄漏敏感信息。
He built a C client application that uses the Google SearchAPI to look for sites vulnerable to SQL Injection Attacks.
他用Google的SearchAPI建了一个C的客户端程序,寻找那些易受SQL注入攻击的网站。
However, even using the mostsecure data store doesn't prevent injection attacks that leverage vulnerabilities in the Web applications accessing the data store.
然而,即使使用最安全的数据存储也无法阻止利用Web应用中的漏洞去访问数据存储的注入攻击
Now look at some best practices for network configuration, authentication, use of roles,and preventing JavaScript injection attacks.
现在,让我们看一看网络配置、身份验证、角色使用方面的一些最佳实践,防止出现JavaScript注入攻击
Injection attacks take advantage of improperly coded applications to insert and execute attacker-specified commands, enabling access to critical data and resources.
注入攻击会利用有问题代码的应用程序来插入和执行黑客指定的命令,从而能够访问关键的数据和资源。
DroidSQLi is an android app that allows you to launch SQL injection attacks on a target URL.
DroidSQLi是一款Android应用程序,可让您在目标网址上启动SQL注入攻击
We have seenuser passwords leaked due to SQL injection attacks, cookies stolen with XSS, and websites taken over by hackers due to negligent input validation.
我们曾见证过由于SQL注入攻击而使用户密码泄漏、通过跨站脚本XSS使cookie失窃,以及由于输入验证的疏忽而使网站被黑客控制。
However, it did not encoding usernames properly andhence was vulnerable to LDAP injection attacks leading to a denial of service.
但是没有正确编码用户名,因此容易受到LDAP注入攻击,导致拒绝服务。
Though designed to avoid problems with poorly written SQL,it is feared that it may actually lead to more SQL injection attacks.
虽然该特性从设计上是为了避免出现SQL语句编写上的问题,但是有人担心这会导致更多SQL注入攻击
An attacker who successfullyexploited this vulnerability could perform script/content injection attacks and attempt to trick the user into disclosing sensitive information.
成功利用此漏洞的攻击者可以执行脚本或内容注入攻击,并企图欺骗用户泄漏敏感信息。
In Chapter 1, We propose a security design principle- a data and code separation principle, it can be said,is born to address injection attacks.
而在“我的安全世界观”一章中,提出了一个安全设计原则--“数据与代码分离”原则,它可以说是专门为了解决注入攻击而生的。
The second factor is that one ormore malicious bots are now launching SQL injection attacks as a way of spreading the bot further.
第二,一个或多个恶意僵尸正在进行SQL注入攻击,用以广泛传播僵尸。
An added layer of security that helps to detect and mitigate certain types of attacks, including Cross Site Scripting(XSS)and data injection attacks.
内容安全策略(CSP)是一个额外的安全层,用于检测并削弱某些特定类型的攻击,包括跨站脚本(XSS)和数据注入攻击等。
An attacker who successfullyexploited this vulnerability could perform script/content injection attacks and attempt to trick the user into disclosing sensitive information.
为了利用此漏洞,成功利用此漏洞的攻击者可能会进行脚本/内容注入攻击,并试图欺骗用户泄漏敏感信息。
Proper handling of passwords- iterative hashing, using salts and slow algorithms-and protection against SQL injection attacks are basic errors.
错误处理密码-迭代散列,使用salts和慢速算法以及缺乏针对SQL注入攻击的保护是基本错误。
Cloud-based security solutions that provide defense-in-depth against distributed denial of service(DDoS) attacks,SQL injection attacks, cross-site scripting, and other cyber security threats.
基于云的安全解决方案,提供对分布式拒绝服务(DDoS)攻击、SQL注入攻击、跨网站脚本攻击和其他网络安全威胁的深度防御。
Protect your corporate assets from network-and application-level attacks,including DDoS and SQL injection attacks, penetration attempts, and more.
保护您的企业资产免受网络和应用级别的攻击,包括DDoS和SQL注入攻击、渗透尝试等。
The results of a code injection attack can be disastrous.
代码注入攻击的结果可以是灾难性的。
The threat tactic is a two-step injection attack designed to steal access credentials and payment card data from victims.
威胁策略是两步注入攻击,旨在窃取受害者的访问凭据和支付卡数据。
Of a random sampling of 1000 sites he found via his Google search,he detected possible SQL Injection Attack vulnerability with 11.3% of them.
对通过Google搜寻找到的1000个网站的随机取样测试,他检测到其中的11.3%有易受SQL注入攻击的可能。
Results: 49, Time: 0.0273

Word-for-word translation

Top dictionary queries

English - Chinese