恶意攻击 meaning in Chinese
hostile attack
Examples
- No any argue and attack is allow in this forum
不得于论坛内张贴恶意攻击、漫骂。 - The second step is to identify vulnerabilities that a hacker or attacker could maliciously exploit
第二步是确定电脑黑客或攻击者可能恶意攻击的漏洞。 - At the same time , the draw back of tcp / ip protocol is a main source of unfair flow and vicious attack
另一方面, tcp ip的缺陷也成为不公平数据流或恶意攻击数据流产生的重要原因。 - To prevent buffer overruns and malicious attacks , your code should always verify user input content and length
为防止缓冲区溢出和恶意攻击,代码应该始终验证用户输入的内容和长度。 - The protocol uses hmac to guarantee the client being active , then protects leasing from attacks
该协议灵活运用hmac ,确保代理每次租借时客户总是“激活的” ,从而尽量避免恶意攻击。