數(shù)據(jù)庫服務(wù)器------文獻(xiàn)翻譯.doc
約16頁DOC格式手機(jī)打開展開
數(shù)據(jù)庫服務(wù)器------文獻(xiàn)翻譯,在這個(gè)信息時(shí)代,數(shù)據(jù)管理服務(wù)器已經(jīng)成為公司的核心. 這一個(gè)軟件的模塊控制整個(gè)組織的順利運(yùn)行就如同人身體動(dòng)脈使得鮮血在身體中流通順暢. 因?yàn)檫@個(gè)所以就要把好身份申請這一關(guān),數(shù)據(jù)管理服務(wù)器也是黑客最為關(guān)心的目標(biāo)之一. 如果一旦自己的身份驗(yàn)證被黑客攻克,他將能引起公司的 "心臟" 遭受致命的破壞.諷刺的,雖然大多數(shù)的使用者現(xiàn)...
內(nèi)容介紹
此文檔由會(huì)員 wanli1988go 發(fā)布
在這個(gè)信息時(shí)代,數(shù)據(jù)管理服務(wù)器已經(jīng)成為公司的核心. 這一個(gè)軟件的模塊控制整個(gè)組織的順利運(yùn)行就如同人身體動(dòng)脈使得鮮血在身體中流通順暢. 因?yàn)檫@個(gè)所以就要把好身份申請這一關(guān),數(shù)據(jù)管理服務(wù)器也是黑客最為關(guān)心的目標(biāo)之一. 如果一旦自己的身份驗(yàn)證被黑客攻克,他將能引起公司的 "心臟" 遭受致命的破壞.
諷刺的,雖然大多數(shù)的使用者現(xiàn)在知道黑客,但是他們?nèi)匀徊涣私馑麄兊臄?shù)據(jù)庫伺候器是多么的易受影響黑客的攻擊. 因此,這篇文章介紹是如何攻擊數(shù)據(jù)庫伺候器 (比如 SQL 伺候器) 和講述你在受攻擊時(shí)該如何保護(hù)你自己的數(shù)據(jù)。
我們應(yīng)該注意信息不斷更新. 許多技術(shù)上的空白導(dǎo)致了 SQL 在運(yùn)行時(shí)很多細(xì)節(jié)被攻擊的事,而且很多的易受攻擊的地方被寄到完全地描述數(shù)據(jù)庫申請能是多麼的某開發(fā)的安全目錄. 這個(gè)文章對那些好奇的非 SQL 專家是書面的不關(guān)心知道細(xì)節(jié),而
In this information age, the data server has become the heart of a company. This one piece of software controls the rhythm of most organizations and is used to pump information lifeblood through the arteries of the network. Because of the critical nature of this application, the data server is also the one of the most popular targets for hackers. If a hacker owns this application, he can cause the company's "heart" to suffer a fatal arrest.
Ironically, although most users are now aware of hackers, they still do not realize how susceptible their database servers are to hack attacks. Thus, this article presents a description of the primary methods of attacking database servers (also known as SQL servers) and shows you how to protect yourself from these attacks.
You should note this information is not new. Many technical white papers
諷刺的,雖然大多數(shù)的使用者現(xiàn)在知道黑客,但是他們?nèi)匀徊涣私馑麄兊臄?shù)據(jù)庫伺候器是多么的易受影響黑客的攻擊. 因此,這篇文章介紹是如何攻擊數(shù)據(jù)庫伺候器 (比如 SQL 伺候器) 和講述你在受攻擊時(shí)該如何保護(hù)你自己的數(shù)據(jù)。
我們應(yīng)該注意信息不斷更新. 許多技術(shù)上的空白導(dǎo)致了 SQL 在運(yùn)行時(shí)很多細(xì)節(jié)被攻擊的事,而且很多的易受攻擊的地方被寄到完全地描述數(shù)據(jù)庫申請能是多麼的某開發(fā)的安全目錄. 這個(gè)文章對那些好奇的非 SQL 專家是書面的不關(guān)心知道細(xì)節(jié),而
In this information age, the data server has become the heart of a company. This one piece of software controls the rhythm of most organizations and is used to pump information lifeblood through the arteries of the network. Because of the critical nature of this application, the data server is also the one of the most popular targets for hackers. If a hacker owns this application, he can cause the company's "heart" to suffer a fatal arrest.
Ironically, although most users are now aware of hackers, they still do not realize how susceptible their database servers are to hack attacks. Thus, this article presents a description of the primary methods of attacking database servers (also known as SQL servers) and shows you how to protect yourself from these attacks.
You should note this information is not new. Many technical white papers