Thus, the loader makes it possible to write secure programs, but you still have to protect against malicious environment variables. 因而,虽然加载器让编写安全的程序成为可能,但您还不得不去防范恶意的环境变量。
On the basis of the objective impacts caused by an attack, the threat level of the attack is analyzed from the aspects of attack power, the characteristics of the malicious node and environment parameters. 该机制从当前入侵对网络产生的客观影响出发,结合节点的攻击强度、角色特点、环境参量等多方面因素来评估一个攻击节点对网络的威胁程度。
How to implement a mechanism to isolate malicious proxy inservices computing environment to minimize security threats brought about by malicious agents, is the main measures to solve the problem of service computing security. 将服务计算环境下的恶意代理进行隔离,尽量减小此类代理带来的安全威胁,是解决服务计算安全问题的一种必要措施。
However, authors of malicious software work hard to study various methods to distinguish whether their malicious code is running in virtual environment or not. 但是恶意软件的作者也在努力的研究各种方法辨别是不是运行在虚拟环境中,一旦检测到病毒本身运行环境是虚拟环境,则要么会停止运行,要么会运行没有危害性的程序分支。
With the management of feedback information, especially those malicious comments, from web user in the E-Commerce environment, the technology of sentiment classification is very useful in many applications. 针对电子商务环境中Web用户的反馈信息管理,特别是恶意舆论的管理问题,文本情感分类技术具有重要的应用价值。