| 1. | Buffer overflow attack technology is a very efficient attack technology based on network 缓冲区溢出攻击技术是一项十分有效的网络攻击技术。 |
| 2. | Buffer overflow attack mainly includes stack overflow , heap overflow and format string overflow and so on 缓冲区溢出主要分为堆栈溢出、堆溢出和格式化字符串溢出等。 |
| 3. | The article illustrates architecture of the buffer overflow attack platform developed by our project group 文章还介绍了项目组开发的缓冲区溢出攻击软件的框架和功能实现。 |
| 4. | Buffer overflow attack is the main measure of hacker ’ s attack . it has done more and more harm to information security 缓冲区溢出攻击是黑客攻击的主要手段,给网络信息安全带来了越来越大的危害。 |
| 5. | Localization formula is presented in this paper for this purpose . 3 . realization of buffer overflow attack key technique 3 .缓冲区溢出攻击中关键技术的代码实现对缓冲区溢出攻击中关键部分shellcode高级代码进行了编写。 |
| 6. | There can also be users of your software with no privileges at all . that means any successful buffer overflow attack will give them more privileges than they previously had 将口令表放在您的皮夹里并没什么错,只要您能管好您的皮夹,从不到处乱放该口令表。 |
| 7. | In the final two columns in this series , we ll examine the engine s workings and explain how a buffer overflow attack does its dirty work on particular architectures 一种能稍微缓解这种情况的方式是在出现登录失败时进行记录。自动攻击可能在一两秒钟的时间内导致许多失败的尝试。 |
| 8. | Stack smashing is the worst sort of buffer overflow attack , especially when the stack being smashed is running in privileged mode . an elegant solution to this problem is non - executable stacks 最终的操作取决于检测到的安全性威胁的当前级别,并被转发到代理服务器以传递给发出该请求的客户机。 |
| 9. | Programs written in java code aren t susceptible to buffer overflow attacks , but such an attack can still throw an unexpected exception or even an error - potentially shutting down a server or other program 使用java编写的程序对缓冲区溢出攻击并不敏感,但这样的攻击会导致不断地抛出意外异常或错误可能导致服务器或其他程序关闭。 |