intruder
n. 侵入者;干扰者;妨碍者
2025-10-09 01:20 浏览次数 5
n. 侵入者;干扰者;妨碍者
active intruder积极干扰者
Intruder selfie入侵者自拍
Intruder Detection入侵目标检测
intruder forces入侵的飞机
Your Intruder你的入侵者
penetrator侵入者,洞察者;渗透者
Intruder Tracing入侵者的追蹤
Pennview Intruder父
raider袭击者,抢劫者;蓄意收购公司者
intruder operation突袭作战
intruder mission侵入敌区的任务
the intruder is not necessarily outside the company, but he is executing code from outside of the application itself.
入侵者并不一定是在公司外部,但他是从应用程序自身的外部执行代码的。
the dmz should be a 「naked」 -- and thus hostile -- environment for any potential intruder or hacker.
对于任何可能的入侵者或攻击者来说,dmz是一个「无保护的」——「不利的」——环境。
if an intruder has access to your database, or even raw machine-level access to the database volumes, he or she might be able to see information in the session.
如果入侵者可以访问您的数据库,甚至是对数据库信息的原始计算机级访问,他或她都可能看到会话中的信息。
you essentially deny the intruder the ability to see or access things they should not see.
这样可以拒绝入侵者查看或访问他们不应该看到的内容。
if a male bobolink hears another male calling in his territory, he'll chase the intruder away.
如果一只雄性食米鸟听见另一只雄性在自己的地盘鸣叫,它会把入侵者赶走。
the intruder is not necessarily outside the company, but rather is executing code from outside of the application itself.
入侵者并不一定在公司外部,但他们是从应用程序自身的外部执行代码的。
responses are then returned to the intruder site.
然后响应被返回到入侵者站点。
a fortress is easier to protect because it’s simpler: it has no windows, few doors, no skylights, or vent systems through which an intruder might sneak.
堡垒的保护更容易因为它更简单:它没有窗口、几乎没有几道门,没有天窗或通风系统这些入侵者可能会利用的东西。
an even more subtle attack is that any page returned over http can be potentially altered by an intruder -- even urls embedded in the page.
另一种更狡猾的攻击方法是,入侵者可以修改通过http返回的任何页面 ——甚至包括页面中嵌入的url。
if that link is compromised, an intruder could then assert any identity and completely undermine the security of the infrastructure.
如果该链接受到威胁,则入侵者就可以断言任何身份并彻底破坏基础设施的安全性。
during a csrf attack, requests originate from an intruder site and are transmitted through an authenticated browser page to the server.
在csrf攻击过程中,请求来自一个入侵者站点,然后通过一个经过验证的浏览器页面传输到服务器。
on the plus side, 98 percent of preteen babysitters knew who to contact in the event of an intruder or a fire.
从积极的一面来看,在出现入侵者和火灾的情况时,98%的青春期前临时保姆知道应该与谁取得联系。
they also suggest that the sounds may function to attract the attention of predators, in which case the intruder would be rather defenseless.
同时,还指出,这种声音还会吸引来食肉动物,在这样的情况下,入侵者在防御上就会处于明显的弱势。
this prevents the most egregious types of attack, where an intruder can use the built in administrative infrastructure to deploy rogue applications onto your desktop.
这样可以防止最恶劣的攻击类型(入侵者可能使用内置管理基础设施来将恶意应用程序部署到您的桌面上)。
he dreamt that an intruder was in the van, reached out to tackle the offender but instead strangled his childhood sweetheart and wife of 40 years.
他在梦中看见一名闯入者在车上,就出手对付坏人,没想到却掐死自己青梅竹马,相伴了40年的妻子。
this is a security hole because an intruder could potentially pretend to be a messaging engine and compromise the bus traffic.
这是一个安全性漏洞,因为入侵者可能可以伪装成消息传递引擎并截获总线通信流。
however, be aware that logging is a weakness; should a hacker get his or her hands on a log, that intruder would have the port-knocking sequences in the clear.
但是,应该认识到日志记录是一个漏洞;如果黑客获得了日志,入侵者就会掌握端口敲门序列。
if that link can be compromised, an intruder could then assert any identity and completely undermine the security of the infrastructure.
如果可以攻破该链路,入侵者就可以断言任何身份并彻底破坏基础设施的安全性。
with care, an intruder can cause a program to do almost anything.
注意,通过这种方法,入侵者可以让程序做几乎任何事情。
if an intruder gained access to a host in network 10.1.0.0, he could broadcast a 「destination unreachable message」 stating that gateway g is not reachable to all hosts in the network he is in.
如果入侵者获得了网络10.1.0.0中一台主机的访问权,那么,他可以广播一条「目的地不可到达消息」,声明网关g对于他所在网络的所有主机是不可到达的。