secure programming造句
例句與造句
- securing program files, common components, and data files
保護(hù)程序文件、公共組件和數(shù)據(jù)文件的安全 - secure programming with the openssl api, part 2 : secure handshake
使用opensslapi進(jìn)行安全編程,第2部分:安全握手 - attackers may try to slip in actions before or between actions of the secure program
在運(yùn)行安全程序期間,攻擊者可能會(huì)嘗試進(jìn)行插入操作。 - this article shows how to validate input-one of the first lines of defense in any secure program
本文介紹了如何驗(yàn)證輸入任何安全程序的首要環(huán)節(jié)之一。 - column on developerworks is an ongoing series dedicated to helping you write secure programs for linux
專欄是一個(gè)即將推出的系列,旨在幫助您為linux編寫安全的程序。 - It's difficult to find secure programming in a sentence. 用secure programming造句挺難的
- one of the biggest mistakes developers of secure programs make is to try to check for " illegal " data values
安全程序開發(fā)人員一個(gè)最大的誤區(qū)是嘗試去查找“非法的”數(shù)據(jù)值。 - in nearly all secure programs, your first line of defense is to check every piece of data you receive
在幾乎所有安全的程序中,您的第一道防線就是檢查您所接收到的每一條數(shù)據(jù)。 - he is the author of the book secure programming for linux and unix howto and is a validator for the common criteria
一書的作者,而且還是通用標(biāo)準(zhǔn)(commoncriteria)的驗(yàn)證者。 - is a set of slides from sans 2002 on how to write secure programs; slides 64-66 discuss the integer overflow exploit in sendmail
是sans2002關(guān)于如何編寫安全程序的一組幻燈片;第64-66頁討論的是sendmail中整型數(shù)溢出的問題。 - any pair of operations in a secure program must still work correctly if arbitrary amounts of another thread s code is executed between them
在安全程序中,不管在任何一對(duì)指令中間運(yùn)行了多少其他線程的代碼,程序都必須正確地運(yùn)行。 - if a secure program s thread is not prepared for these interruptions, another thread may be able to interfere with the secure program s thread
如果一個(gè)安全程序的線程沒有預(yù)防這些中斷,那么另一個(gè)線程就可以干擾該安全程序的線程。 - if a secure program s thread is not prepared for these interruptions, another thread may be able to interfere with the secure program s thread
如果一個(gè)安全程序的線程沒有預(yù)防這些中斷,那么另一個(gè)線程就可以干擾該安全程序的線程。 - a secure program must be written to make sure that an attacker can t manipulate a shared resource in a way that causes trouble, and sometimes this isn t as easy as it seems
安全程序的編寫必須確保攻擊者無法以導(dǎo)致問題的方式利用共享的資源,有時(shí)這并不像看起來那樣容易辦到。 - the attacker s goal is to create a situation in which the secure program determines that a given file name doesn t exist . the attacker then creates the symbolic link to another file, and then the secure program performs some operation, but now it actually opened an unintended file
攻擊者的目標(biāo)是,創(chuàng)造這樣一種情形,即讓安全程序判定某個(gè)給定的文件名并不存在,然后,攻擊者就可以創(chuàng)建指向另一個(gè)文件的符號(hào)鏈接,而后安全程序繼續(xù)執(zhí)行某些操作(但是現(xiàn)在,它打開的實(shí)際上是一個(gè)意料之外的文件)。 - the attacker s goal is to create a situation in which the secure program determines that a given file name doesn t exist . the attacker then creates the symbolic link to another file, and then the secure program performs some operation, but now it actually opened an unintended file
攻擊者的目標(biāo)是,創(chuàng)造這樣一種情形,即讓安全程序判定某個(gè)給定的文件名并不存在,然后,攻擊者就可以創(chuàng)建指向另一個(gè)文件的符號(hào)鏈接,而后安全程序繼續(xù)執(zhí)行某些操作(但是現(xiàn)在,它打開的實(shí)際上是一個(gè)意料之外的文件)。