您要查找的是不是:
- Malicious code may steal this password. 恶意代码可以窃取口令。
- Running Malicious Code By Exploiting Buffer Overflows. 摘要:介绍如何利用缓冲区溢出脆弱性来执行恶意代码的技术。
- Malicious code inside triggers can run under escalated privileges. 触发器内部的恶意代码可以在升级后的权限下运行。
- However, remember that malicious code can call your code. 然而,请记住,恶意代码可以调用您的代码。
- It checks out, and the malicious code appears safe for use. 它进行检测,而恶意程式看起来安全可供使用。
- We repeat it again: THERE IS NO MALICIOUS CODE inside M33. 我们在这里重申,M33的自制系统是没有恶意代码的。
- They also catch malicious code masquerading as user data. 它们也捕捉伪装成用户数据 的恶意代码。
- Likeother types of malicious code, rootkits thrive on stealthiness. 像其他类型的恶意代码,骗局靠stealthiness。
- Payload : Downloads potentially malicious code on to the compromised computer. 有效载荷:下载潜在的恶意代码对电脑受损.
- Malicious code might be able exploit this to avoid permission checks. 恶意代码可能会利用这一点避开权限检查。
- In this case also all malicious code executed will have its full bad effect. 这种情况下,执行了恶意代码会导致很严重的后果。
- And this has not even touched the capabilities needed to encrypt, decrypt, and morph the malicious code. 这还没提到加密解密和改变恶意代码形态所需要的能力。
- It is possible for malicious code to cast back to the base type and call the base class method. 恶意代码有可能会重新强制转换为基类型,并调用基类方法。
- Be careful to ensure that you do not provide any information that could be exploited by malicious code. 请务必确保您没有提供任何会被恶意代码利用的信息。
- There is usually no defense against malicious code if it is granted these permissions. 如果向恶意代码授予这些权限,通常就没有防范它的措施了。
- Do not use a domain controller to browse the Web or to perform any other activities that may introduce malicious code. 不要使用域控制器浏览网站或执行任何可能引入恶意代码的其他活动。
- In this situation, it is impossible for a single programmer to insert malicious code into your system. 此时,单个程序员不可能将恶意代码插入到您的系统中。
- However, the person who created the Web site has embedded malicious code that deletes data on the user's hard disk. 然而创建此Web站点的人已经嵌入了将会删除用户硬盘上数据的恶意代码。
- If malicious code harms your data or your computer, Access cannot undo that damage. 如果恶意代码损坏了数据或计算机,Access无法弥补。
- Determine whether malicious code can use a cast to get around the link demands as described previously. 确定恶意代码是否能够像上面所说的那样使用强制转换来绕过这些链接要求。