secure programming造句
例句与造句
- securing program files, common components, and data files
保护程序文件、公共组件和数据文件的安全 - secure programming with the openssl api, part 2 : secure handshake
使用opensslapi进行安全编程,第2部分:安全握手 - attackers may try to slip in actions before or between actions of the secure program
在运行安全程序期间,攻击者可能会尝试进行插入操作。 - this article shows how to validate input-one of the first lines of defense in any secure program
本文介绍了如何验证输入任何安全程序的首要环节之一。 - column on developerworks is an ongoing series dedicated to helping you write secure programs for linux
专栏是一个即将推出的系列,旨在帮助您为linux编写安全的程序。 - It's difficult to find secure programming in a sentence. 用secure programming造句挺难的
- one of the biggest mistakes developers of secure programs make is to try to check for " illegal " data values
安全程序开发人员一个最大的误区是尝试去查找“非法的”数据值。 - in nearly all secure programs, your first line of defense is to check every piece of data you receive
在几乎所有安全的程序中,您的第一道防线就是检查您所接收到的每一条数据。 - he is the author of the book secure programming for linux and unix howto and is a validator for the common criteria
一书的作者,而且还是通用标准(commoncriteria)的验证者。 - is a set of slides from sans 2002 on how to write secure programs; slides 64-66 discuss the integer overflow exploit in sendmail
是sans2002关于如何编写安全程序的一组幻灯片;第64-66页讨论的是sendmail中整型数溢出的问题。 - any pair of operations in a secure program must still work correctly if arbitrary amounts of another thread s code is executed between them
在安全程序中,不管在任何一对指令中间运行了多少其他线程的代码,程序都必须正确地运行。 - if a secure program s thread is not prepared for these interruptions, another thread may be able to interfere with the secure program s thread
如果一个安全程序的线程没有预防这些中断,那么另一个线程就可以干扰该安全程序的线程。 - if a secure program s thread is not prepared for these interruptions, another thread may be able to interfere with the secure program s thread
如果一个安全程序的线程没有预防这些中断,那么另一个线程就可以干扰该安全程序的线程。 - a secure program must be written to make sure that an attacker can t manipulate a shared resource in a way that causes trouble, and sometimes this isn t as easy as it seems
安全程序的编写必须确保攻击者无法以导致问题的方式利用共享的资源,有时这并不像看起来那样容易办到。 - the attacker s goal is to create a situation in which the secure program determines that a given file name doesn t exist . the attacker then creates the symbolic link to another file, and then the secure program performs some operation, but now it actually opened an unintended file
攻击者的目标是,创造这样一种情形,即让安全程序判定某个给定的文件名并不存在,然后,攻击者就可以创建指向另一个文件的符号链接,而后安全程序继续执行某些操作(但是现在,它打开的实际上是一个意料之外的文件)。 - the attacker s goal is to create a situation in which the secure program determines that a given file name doesn t exist . the attacker then creates the symbolic link to another file, and then the secure program performs some operation, but now it actually opened an unintended file
攻击者的目标是,创造这样一种情形,即让安全程序判定某个给定的文件名并不存在,然后,攻击者就可以创建指向另一个文件的符号链接,而后安全程序继续执行某些操作(但是现在,它打开的实际上是一个意料之外的文件)。