造句

当前位置 /首页/造句 > /列表

用“malicious”造句大全,malicious造句

Of these three, theft is the most obvious because the act itself is malicious.

The first step is to identify critical system assets — intangible or tangible — that are vulnerable to malicious attacks.

Users can unknowingly execute malicious scripts when viewing dynamically generated pages based on content provided by an attacker.

Lance James, chief technology officer for San Diego-based Secure Science Corp., testified in May that more than 75 percent of spoofed calls have a malicious intent.

All that would be necessary is for hackers to dupe users into visiting a malicious Web site or persuading them to click on a link in ane-mail or text message.

malicious造句

OK, so think like a malicious hacker.

The authors also consider server retaliation, whereby a server that detects a malicious client could send the client any sort of response, including malicious content.

The just man frowns, but never smiles with a malicious sneer.

Often the attacker will overrun the buffer with the malicious code the attacker wants to run, and the attacker will then change the return value to point to the malicious code they've sent.

With this, an attacker could have access to phone numbers, photos, and other data, as well as upload malicious code to the handset.

The untrusted data is referred to as tainted data, while the code ensuring that the data is not malicious is called a sanitizer, and is often said to clean the taint.

You ought to kick back at such malicious slander.

Psychologists have suggested there are two types of envy: malicious envy and benign envy (van den Ven et al., 2009).

It is possible for malicious code to inject a serialized data stream to your server in order to coerce it into performing unintended actions.

I loathe people who spread malicious gossip.

The class loader has a fairly tight security manager in place that restricts malicious calls.

In addition, static SQL, which is always known ahead of time, is not susceptible to malicious or accidental SQL injections, a known security flaw with dynamic SQL.

When they see a pattern known to emanate from a malicious source, they stop it.

For example, a hacker can enter in the guise of a privileged user with administrative access controls and perform malicious activities that a legitimate system administrator did not initially notice.

Laughter can be used to show who is boss and malicious laughter is an effective weapon of intimidation.

This simple trick helps you fend off malicious script injections.

Apple knows that it wouldn't take more than a few malicious apps to tarnish the iPhone's reputation.

TAG标签:malicious 造句 #