恶意使用 meaning in English
malicious use
Examples
- This technology has not only distinguished from computer and network resources , but also has given important information in instruction ; it has not only detected instructing action from out word , but also has controlled user ' s actions
它对计算机和网络资源上的恶意使用行为进行识别,并为对抗入侵提供重要信息,它不仅检测来自外部的入侵行为,同时也监督内部用户的未授权活动。 - If a malicious user sends an affected html e - mail or hosts an affected e - mail on a web site , and a user opens the e - mail or visits the web site , internet explorer automatically runs the excecutable on the user s computer
如果恶意使用者传送中毒的html电子邮件或将中毒的电子邮件存放在网站上,当使用者开启电子邮件或浏览该网站时, internet explorer会在使用者的电脑上自动执行可执行档。 - Either the code should be used only in closed environments where the calling code can be implicitly trusted , or remoting calls should be designed so that they do not subject protected code to outside entry that could be used maliciously
要么只将代码用于封闭式安全环境中,在这种环境中可以隐式信任调用代码;要么相应地设计远程处理调用,以免这些调用会让受保护代码受到可能会被恶意使用的外部侵入的影响。 - Intrusion detection is new security technology . the intrusion detection system ( ids ) watch the computer and network traffic for intrusive and suspicious activities . they not only detect the intrusion from the extranet hacker , but also the intranet users
入侵检测是一种新的安全防护技术,入侵检测系统对计算机和网络资源的恶意使用行为进行检测和响应,它不仅能检测从外部来的入侵行为,同时也能检测到内部用户的未授权活动。