malicious use

英 [məˈlɪʃəs juːz] 美 [məˈlɪʃəs juːz]

网络  恶意使用

计算机



双语例句

  1. If the attacker is able to fill in just enough space with dummy data ( i.e., NOPs) and then add a bit of malicious code or a value, the program will execute the malicious code or use that new value.
    如果黑客能够用伪数据(也就是,NOP)填充足够的空间,然后添加一点恶意代码或值,那么程序将执行恶意代码或使用新值。
  2. Security testing is necessary to mitigate risks associated with regulatory requirements and to protect applications against malicious or fraudulent use.
    安全性测试是必要的,以减轻与监管要求相关的风险,并防止对应用程序的恶意或欺诈性使用。
  3. It's someone trying to make malicious use of a command-line executable.
    而是试图恶意利用一个命令行可执行文件。
  4. A malicious attacker can make use of this behavior and launch a remote denial-of-service attack against a vulnerable network service over the Internet.
    恶意攻击者可以利用这一点,通过Internet对网络服务发动远程拒绝服务攻击。
  5. Ilpo Jarvinen [ 2]:" I think that we cannot prevent malicious guys from inventing ways to circumvent the tweak and optimization that may exist for the typical, legitimate use cases. "
    IlpoJarvinen[2]:“我认为我们无法阻止恶意用户找到一些方法绕开典型、合法的用例中的调整和优化。”
  6. The malicious prosecution is a wrongful action made use of national litigation procedure and a civil infringement behavior which is different from the abuse of processes.
    恶意诉讼与滥用诉权并不完全相同,恶意诉讼是利用国家的诉讼机制提起的一场不合法的诉讼。
  7. Now, however, they-and other, similar, types of malicious software-support a multibillion-dollar industry in which those who use them to steal information and subvert computers struggle with those who devise and sell digital protection.
    而现在,他们和其他类似类型的恶意软件一起,支撑了一个价值数十亿美元的产业,这中间,那些使用它们窃取信息和破坏电脑的人和设计和销售数字保护程序的人展开了斗争。
  8. If you do, malicious code can alter the boundary definitions and use your code in unexpected ways.
    否则,恶意代码可能会更改边界定义并以出乎意料的方式使用您的代码。
  9. Malicious users could use this information to use themes that are unknown to the developer and thereby expose sensitive information.
    恶意用户可以通过此信息来使用开发人员不知道的主题,从而公开敏感信息。
  10. Trusting a malicious certification authority will put your computer at risk, so use discretion.
    信任一个恶意的证书颁发机构将会对您的计算机造成威胁,所以请妥善使用。
  11. This is to prevent malicious use of the email system by anonymous users.
    这是为了防止恶意使用匿名用户的电子邮件系统。
  12. Experimental results show that the degradation caused by the proposed algorithm is very slight, and the watermarking scheme is robust to those audio processing and malicious attacks in common use such as re-sampling, re-quantization, low-pass filtering, Mpeg coding, and Gaussian noise, etc.
    实验结果表明,该算法对原音频信号影响极小,并对于各种音频操作和攻击,如重采样、重量化、低通滤波、Mpeg编码、Gaussian噪声等具有较好的鲁棒性。
  13. It can detect and record malicious actions for security audit and evidence analysis, and recover the system and important data in time by the use of the saved information.
    该保护机制能够检测、记录恶意的攻击行为,对攻击行为进行分析取证;在系统遭遇到攻击时,利用保存的系统信息和应用数据,能及时恢复系统和重要数据。
  14. Facing this: we can solve the problems caused by the malicious use of accounting method option by the ideas of principles-based approach;
    对此,可以通过原则导向的思路来解决会计处理方法选择权被恶意利用的问题;
  15. Therefore, we should analyze the contents and the discernment of malicious harm behavior and distinguish it with proper behavior in order to use criminal law to protect the proper development of sports activities.
    因此应从其与正当行为的区分、恶意伤害行为违法性的内涵和识别等角度进行分析,以期依靠刑法的规制手段保护竞技体育活动的正常发展。
  16. It carries on the recognition and the response to computer and network resources malicious use behavior: it examines the exterior invasion behavior and at the same time it also supervises the internal activity not to be authorized.
    入侵检测技术对计算机和网络资源上的恶意行为进行识别和响应,它不仅检测来自外部的入侵行为,同时也可监督内部用户的未授权活动。
  17. The credit card crime of various type emerges, especially malicious overdraft happens more and more, the criminal makes use of the overdraft function that the credit card owns and cheats funds of bank, impact the financial order of stable health of our country.
    各种类型的信用卡犯罪应运而生,特别是恶意透支型信用卡诈骗犯罪愈演愈烈,犯罪分子利用信用卡本身具有的透支功能大肆恶意透支,骗取银行资金,对我国稳定健康的金融秩序造成了冲击。
  18. Through this case, the author classification and summarizes the characteristics of the malicious prosecution, and further use the principle of a legally prescribed punishment for malicious prosecution case analysis.
    通过本案,笔者对恶意诉讼案件进行分类并总结恶意诉讼的特点,并进一步利用罪刑法定原则对恶意诉讼案件进行剖析。
  19. Especially some malicious users make use of TOR system to process DDoS attack. They have set up many anonymous paths to target node, allied to send many attacking packets to the target node, making the node invalid for a long time, resulting in greater damage.
    特别是恶意用户利用TOR系统实施的DDoS攻击,它们建立多条到目标节点的匿名路径,联合向目标节点发送大量的攻击报文,使该节点长期失效,这样造成的危害更大。
  20. For example, the two parties have malicious collusion, false prosecution, or use the rule of self-admission to defraud the court and obtain the determined adjudication in order to avoid the real debt.
    如双方当事人恶意串通,虚假起诉,利用自认规则骗取法院确定判决,以逃避真正债务。
  21. The false civil procedure as a new malicious use of the courts and in fraud of law in our country, have yet to be clearly defined, litigation academic study on this issue is still in the intial stage.
    虚假民事诉讼作为一种新的恶意利用法院和规避法律的手段,在我国无论是实体法还是程序法中都尚未得到明确的规定,诉讼法学界对这一问题的研究也尚处于起步阶段。
  22. The fourth part discusses some special problems of the name of trademark protection, such as the malicious registration and the problem of fair use.
    第四部分就姓名商标保护的特殊问题进行了论述,如姓名商标的恶意抢注问题和合理使用问题。
  23. Buffer overflow is common software security vulnerability. Malicious users can use the overflow vulnerability of the procedure to attack the target computer systems, or even worse, to control the host system to attack others.
    缓冲区溢出漏洞是常见的软件安全漏洞,恶意用户可利用程序中的溢出漏洞攻击目标主机系统,甚至控制该系统攻击其它主机。
  24. To prevent malicious network attack, more and more networked hosts use the personal firewall.
    为了防范恶意的网络攻击行为,越来越多的联网主机安装使用了个人防火墙。
  25. Some malicious image attacker use forged images for military or political purpose, which has brought bad influence and caused a crisis of confidence.
    一些图像恶意篡改者将伪造图像用于军事,政治目的,造成了不好的影响,引发了一场信任危机。
  26. In the open Internet environment, unauthorized access, malicious modification and improper use are the main method of network attacks, how to effectively protect data has become our urgent needs.
    在开放的互联网环境中,未经授权的访问、恶意修改和使用不当都是网络攻击的主要方式,如何有效地保护数据已经成了当前的迫切所需。
  27. If no diligent search, and proved the work and not orphan works, then the user is malicious use of orphan works using system, constitute an infringement, user shall be liable for copyright infringement responsibility.
    若没有进行勤勉的寻找,而事后证明该作品并不是孤儿作品,则此时使用人是恶意利用孤儿作品,构成侵权,使用人应当承担著作权侵权责任。
  28. The quality of Resources in P2P networks is difficult to be assured, some malicious nodes in the characteristics of the use of P2P network itself spread viruses and Trojan horses or quality of unreliable files.
    P2P网络中资源的质量很难得到保证,有些恶意的节点利用P2P网络自身的特点而传播病毒、木马或质量不可靠的文件等。
  29. Following a typical patent abuse behavior: refusal to license, malicious idle patents, patent fees overcharging, tie-ins, malicious litigation, spam warning letter, the use of technology standards patent monopoly.
    以下几种为典型的专利权滥用行为:拒绝许可、恶意闲置专利、滥收专利费用、搭售、恶意诉讼、滥发警告函、利用专利进行技术标准垄断。