attack programing meaning in Chinese
迎角程序控制
Examples
- Attackers can use this fact to " slip through " data validators to attack programs
攻击者可以利用这一点来“骗过”数据验证来攻击程序。 - A software which pretends to be normally run but actually with attack programs on back ends
特洛依木马假装正常运作但实际上带有对用户进行攻击的程式的软件。 - And one of the most common ways to attack programs is to exploit how they make requests to other programs
攻击程序使用的最常见方式之一就是利用这些程序向其他程序发出请求的方式。 - In allusion to present point attacking program , calculated the detecting probability for the rocket - assisted torpedo , and analyses effect of some important parameter
着重探讨了采用目标现在点射击方法,对随机机动目标的发现概率仿真计算模型,进行了实际仿真计算,并就一些主要参数对射击效率的影响做了较为深入的分析。 - On the one hand , the combination of information techenology with governmant management , finance , public service , education , medical treatment , traditional business brings a big new market ; on the other hand , although the computerization brings high efficiency and friendly service , it also brings the threat , risk and duty . the information on web is often to be wiretapped , to be tampered or to be destroyed . all kinds of network attack programs are to be diffused
一方面,信息技术与政府管理、金融、公共服务、教育、医疗和传统商务的结合带来了一个巨大的新市场;另一方面,信息化在带来高效率和友好服务的同时,也带来了威胁、风险和责任,网上信息被窃、被篡改、被破坏的事件时有发生,各种网络攻击程序的广泛传播更使人们忧心忡忡。