| 1. | No any argue and attack is allow in this forum 不得于论坛内张贴恶意攻击、漫骂。 |
| 2. | The second step is to identify vulnerabilities that a hacker or attacker could maliciously exploit 第二步是确定电脑黑客或攻击者可能恶意攻击的漏洞。 |
| 3. | At the same time , the draw back of tcp / ip protocol is a main source of unfair flow and vicious attack 另一方面, tcp ip的缺陷也成为不公平数据流或恶意攻击数据流产生的重要原因。 |
| 4. | To prevent buffer overruns and malicious attacks , your code should always verify user input content and length 为防止缓冲区溢出和恶意攻击,代码应该始终验证用户输入的内容和长度。 |
| 5. | The protocol uses hmac to guarantee the client being active , then protects leasing from attacks 该协议灵活运用hmac ,确保代理每次租借时客户总是“激活的” ,从而尽量避免恶意攻击。 |
| 6. | The first step is to identify critical system assets - intangible or tangible - that are vulnerable to malicious attacks 第一步是确定易遭到恶意攻击的关键系统资产无形的或者有形的。 |
| 7. | For example , during the summit , the apec mirror site recorded 330 , 000 visits in total and suffered 295 , 000 malicious attacks 如apec镜像网站会议期间总访问量33万次,受到各类恶意攻击就达到了29 |
| 8. | Or , if your organization isn ' t that large , but it is a " rich " target in other respects , you have to expect malicious attacks 或者,如果你的组织不大,但是在其它方面它是一个值得攻击的目标,你只能预料恶意攻击。 |
| 9. | Comments : very erotic and very violence ' s vulgar news and pornographic pictures , malicious attacks female college students , induces crime 上榜原因:很黄很暴力的低级新闻与黄色图片,恶意攻击女大学生,诱使犯罪。 |
| 10. | Sql server browser should be run in the security context of a low - privileged user to minimize exposure to a malicious attack Sql server浏览器应该在低特权用户的安全上下文中运行,以将受到恶意攻击的几率降到最低。 |