overflow problem造句
例句與造句
- The data are extremely discouraging since the buffer overflow problem has been widely known in security circles for years
這里最大的問題是幼稚的用戶不一定知道如何選取更好的口令。 - A technique used to solve overflow problems in hashing . it uses a neighbour storage area to store the overflow items
在散列技術中,用以解決溢出問題的一種方法,它利用相鄰的存儲區來存放溢出部分。 - This is why our next four columns will deal with buffer overflow . this column gives an overview of the buffer overflow problem
問題很明顯:您怎么能分辨出他是一個天生無法記住口令的人還是實施社會工程攻擊的攻擊者呢? - In future columns , we ll alert you to the major root causes - such as buffer overflow problems and race conditions - so that you can avoid these traps
在未來的專欄里,我們將就主要的根本原因(諸如緩沖區溢出問題和爭用情況)向您提出警告以便您可以避免這些陷阱。 - We ll cover vulnerability detection tools in more detail in later columns , but it is worth mentioning now that two kinds of scanning tools have proven effective in helping to find and remove buffer overflow problems
這個系統正在保護一個通用服務器場,該服務器場正在使用公認為不安全的cots作為其操作系統。 sitar用冗余和多樣性實現容錯。 - It's difficult to find overflow problem in a sentence. 用overflow problem造句挺難的
- After strict formal analysis with ban logic , the result have proved that the authentication protocol is secure . the improved access control scheme is realized by the mode of single - key - lock - pair . under new access control scheme , user can own several kinds of access right upon one file under the new scheme without the supposition that the access rights is increase by degrees , and the possibility of overflow problem is significantly reduced by our new method
作為對原雙向認證訪問控制方案的改進,改進后的雙向身份認證協議可以很好的抵抗中間人攻擊和重放攻擊,經過嚴密的ban邏輯形式分析和論證,結果表明該協議是安全的;改進后的訪問控制方案用單鑰-鎖對方案實現,除保持了一般單鑰-鎖對方案的良好動態特性外,在不需要訪問權限遞增假設下,實現了用戶對文件的多種訪問控制權限,并大大減小了溢出問題的發生可能