Property potentially could invite certain malicious attacks or cause undesired data to be sent through the response header . header injection attacks are avoided in part by leaving the 属性的类型有可能招致某些恶意攻击,或通过响应标头发送的不希望得到的数据。
Ever since she took office , japan ' s " iron lady " has been the target of leaks from within her own foreign ministry , and vicious attacks in the japanese media 自她就职后,这位日本的"铁娘子"一直是外务省向外界透露的消息中的中心人物,也是日本媒体恶意攻击的对象。
Experimental results show that the algorithm has a good robustness against noise , normal image processing , image compression and malicious attacks 实验结果表明,在满足水印透明性的同时,水印信息在噪声干扰、图像处理、图像压缩以及各种人为恶意攻击条件下具有很好的鲁棒性。
Nasty put - downs , singling out individuals for vicious criticism , sneering , treating people with contempt and lack of respect - fergie turned it into an art form 肮脏的奚落,单拎出某个人来恶意攻击,冷嘲热讽,以轻蔑和缺乏尊重的姿态对待别人弗格森把这简直变成了一种艺术。
In china , the security of network is also regarded , and the researchers get good effect on anti - virus , but they can seldom break through on vicious attack 在国内,计算机网络安全问题也引起了极大的关注和重视,在病毒防治方面取得了很好的效果,但在防范恶意攻击上,成果极少。
To defend these systems from attacks and meet the need of improving the system security and dependability , it is necessary to safely operate and upgrade the systems 当实时控制系统从局限于一隅的严密保卫的区域发展为分布式的大控制系统后,这种对恶意攻击的脆弱性更是显露无疑。
Because of lacking of necessary management measures , private broadband lans are vulnerable both by the outer networks and the inner nodes , which result in the leak of important information 由于缺乏必要的监管措施,专用宽带网在受到外部网络的恶意攻击的同时,来自内部的攻击也逐渐增多,导致内部重要信息的泄漏。
However , proprietary source software vendors , in contrast , claim that secrecy is necessary to hinder malicious attackers , and that " peer review " is not practical because of the complexity of the source code 但专利软件供应商则持相反意见,他们认为不公开源码是必需的,因为这是抗御黑客恶意攻击的基本措施。
However , proprietary source software vendors , in contrast , claim that secrecy is necessary to hinder malicious attackers , and that " peer review " is not practical because of the complexity of the source code 但专利软件供应商则持相反意见,他们认为不公开源码是必需的,因为这是抗御黑客恶意攻击的基本措施。他们更认为源码非常复杂,因此,单靠同业覆检是不切实际的。
On the other hands , through punish and restrict attacking stream and udp stream of no tcp - friendly , dccma reduces the danger of the attacking stream , and shows tcp - friendly of udp stream to confirm the usability of information 该策略一方面对udp数据流进行控制,使其体现tcp友好性和公平性,另一方面ccansma对恶意攻击数据流也进行适当控制和惩罚措施,确保信息的可用性。