您要查找的是不是:
- The snippet may then make a call to a method in the reference that executes malicious code. 代码段随后可能会调用引用中的一个方法执行恶意代码。
- executable malicious code 可执行恶意代码
- Malicious code may steal this password. 恶意代码可以窃取口令。
- Running Malicious Code By Exploiting Buffer Overflows. 摘要:介绍如何利用缓冲区溢出脆弱性来执行恶意代码的技术。
- Malicious code inside triggers can run under escalated privileges. 触发器内部的恶意代码可以在升级后的权限下运行。
- However, remember that malicious code can call your code. 然而,请记住,恶意代码可以调用您的代码。
- It checks out, and the malicious code appears safe for use. 它进行检测,而恶意程式看起来安全可供使用。
- We repeat it again: THERE IS NO MALICIOUS CODE inside M33. 我们在这里重申,M33的自制系统是没有恶意代码的。
- They also catch malicious code masquerading as user data. 它们也捕捉伪装成用户数据 的恶意代码。
- Likeother types of malicious code, rootkits thrive on stealthiness. 像其他类型的恶意代码,骗局靠stealthiness。
- Payload : Downloads potentially malicious code on to the compromised computer. 有效载荷:下载潜在的恶意代码对电脑受损.
- Malicious code might be able exploit this to avoid permission checks. 恶意代码可能会利用这一点避开权限检查。
- In this case also all malicious code executed will have its full bad effect. 这种情况下,执行了恶意代码会导致很严重的后果。
- And this has not even touched the capabilities needed to encrypt, decrypt, and morph the malicious code. 这还没提到加密解密和改变恶意代码形态所需要的能力。
- It is possible for malicious code to cast back to the base type and call the base class method. 恶意代码有可能会重新强制转换为基类型,并调用基类方法。
- Be careful to ensure that you do not provide any information that could be exploited by malicious code. 请务必确保您没有提供任何会被恶意代码利用的信息。
- There is usually no defense against malicious code if it is granted these permissions. 如果向恶意代码授予这些权限,通常就没有防范它的措施了。
- Users can unknowingly execute malicious scripts when viewing dynamically generated pages based on content provided by an attacker. 当用户查看基于攻击者提供的内容而动态生成的页面时,他们会不知不觉地执行恶意脚本。
- Do not use a domain controller to browse the Web or to perform any other activities that may introduce malicious code. 不要使用域控制器浏览网站或执行任何可能引入恶意代码的其他活动。
- In this situation, it is impossible for a single programmer to insert malicious code into your system. 此时,单个程序员不可能将恶意代码插入到您的系统中。