buffer overflow attack造句
例句与造句
- Buffer overflow attack technology is a very efficient attack technology based on network
缓冲区溢出攻击技术是一项十分有效的网络攻击技术。 - Buffer overflow attack mainly includes stack overflow , heap overflow and format string overflow and so on
缓冲区溢出主要分为堆栈溢出、堆溢出和格式化字符串溢出等。 - The article illustrates architecture of the buffer overflow attack platform developed by our project group
文章还介绍了项目组开发的缓冲区溢出攻击软件的框架和功能实现。 - Buffer overflow attack is the main measure of hacker ’ s attack . it has done more and more harm to information security
缓冲区溢出攻击是黑客攻击的主要手段,给网络信息安全带来了越来越大的危害。 - Localization formula is presented in this paper for this purpose . 3 . realization of buffer overflow attack key technique
3 .缓冲区溢出攻击中关键技术的代码实现对缓冲区溢出攻击中关键部分shellcode高级代码进行了编写。 - It's difficult to find buffer overflow attack in a sentence. 用buffer overflow attack造句挺难的
- There can also be users of your software with no privileges at all . that means any successful buffer overflow attack will give them more privileges than they previously had
将口令表放在您的皮夹里并没什么错,只要您能管好您的皮夹,从不到处乱放该口令表。 - In the final two columns in this series , we ll examine the engine s workings and explain how a buffer overflow attack does its dirty work on particular architectures
一种能稍微缓解这种情况的方式是在出现登录失败时进行记录。自动攻击可能在一两秒钟的时间内导致许多失败的尝试。 - Stack smashing is the worst sort of buffer overflow attack , especially when the stack being smashed is running in privileged mode . an elegant solution to this problem is non - executable stacks
最终的操作取决于检测到的安全性威胁的当前级别,并被转发到代理服务器以传递给发出该请求的客户机。 - Programs written in java code aren t susceptible to buffer overflow attacks , but such an attack can still throw an unexpected exception or even an error - potentially shutting down a server or other program
使用java编写的程序对缓冲区溢出攻击并不敏感,但这样的攻击会导致不断地抛出意外异常或错误可能导致服务器或其他程序关闭。 - 4 . presentation of buffer overflow attack model based on category theory . buffer overflow attack model based on category theory is brought forward in the paper by exploring the process of buffer overflow attack and systematically summarize its attack process
4 .给出了以范畴论描述的缓冲区溢出攻击模型通过对缓冲区攻击过程的研究,提出了以范畴论描述的缓冲区溢出攻击模型,对缓冲区溢出攻击过程进行了系统地总结。 - In this paper , technology of ddos and design of d - gun are introduced . totally it is divided into six parts , the first of part is introduction . the second part is interrelated technology about d - gun , including ddos principium , ports - scan , buffer overflow attack , backdoor and raw socket
第二部分介绍相关技术基础,主要讨论了ddos原理和实现ddos自动传播执行所需具备的相关技术,包括端口扫描技术、远程入侵技术、后门技术,以及tcp / ip协议应用中的原始套接字。