安全性测试,经过社会的调查,大部分的恶意攻击集中在非法的请求方面。非法人员通过伪造恶意的url直接进入服务端系统来进行系统攻击。测试的时候通的英语翻译

安全性测试,经过社会的调查,大部分的恶意攻击集中在非法的请求方面。非法

安全性测试,经过社会的调查,大部分的恶意攻击集中在非法的请求方面。非法人员通过伪造恶意的url直接进入服务端系统来进行系统攻击。测试的时候通过模拟非法人员进行的恶意请求,伪造url看是否能够顺利的请求道服务端,还可以通过模拟恶意的提交来检查系统的数据过滤方法是否被很好的应用在系统内部。通过这些简单基本的测试的方法,可以准确的知道目前系统的安全级别。产品子系统的安全性测中涵盖安全性测试的主要项目与结果的展示,测试用例模拟了许多典型方式的恶意攻击,其中涵盖SQL、xSS、头部CLRF等注入方式,跳转漏洞、INFO漏洞、伪造请求等方面的测试。测试结果表明,所有恶意请求均失败,对于业界主流的安全漏洞产品子系统有一定的抗击实力,已经完全达到期望的设定测试目标。通过功能性测试,展示产品子系统已经完成了预期的全部开发需求,完成了需求分析时的所有目标,并且能够按照业界规范进行开发,严格按照公司的软件开发过成进行开发,具有良好的用户体验并且界面美观大方。通过兼容性测试,展示产品子系统在目前主流浏览器内核上对产品子系统能够进行正常的显示以及使用基本的查看交易的基本功能,在各浏览器上页面展示正常,没有出现严重的不兼容现象,已经达到兼容性的目标。通过系统性能测试,展示了产品子系统在硬件以及网络为最佳情况下能够达到1000TPS吞吐量的水平,并且90%响应时间不多于1000毫秒的标准,而且服务器利用率已经达到预计的目标,能够完全胜任大流量高并发的要求,证明了该产品子系统已经达到期望的性能预期目标。
0/5000
源语言: -
目标语言: -
结果 (英语) 1: [复制]
复制成功!
Security testing, after social investigation, most of the malicious attacks focus on illegal requests. Illegal persons directly enter the server system by forging malicious URLs to carry out system attacks. In the test, the malicious request made by illegal personnel is simulated and the URL is faked to see if the request can be successfully sent to the server. You can also simulate the malicious submission to check whether the data filtering method of the system is well applied inside the system. Through these simple and basic testing methods, you can accurately know the security level of the current system. The security test of the product subsystem covers the main items of the security test and the display of the results. The test cases simulate many typical malicious attacks, including SQL, xSS, header CLRF and other injection methods, jump vulnerabilities, INFO vulnerabilities , Forged requests and other aspects of testing. The test results show that all malicious requests have failed, and it has certain resistance to the mainstream security vulnerability product subsystems in the industry, and it has fully reached the expected set test target. <br>Through functional testing, it is shown that the product subsystem has completed all the expected development requirements, completed all the goals of the requirements analysis, and can be developed in accordance with industry specifications, developed in strict accordance with the company's software development history, and has good users Experience and beautiful interface. <br>Through the compatibility test, the display product subsystem can display the product subsystem normally on the current mainstream browser kernels and use the basic functions of viewing transactions. The page display on each browser is normal, and there is no serious incompatibility. Phenomenon, the goal of compatibility has been reached. <br>Through the system performance test, it is shown that the product subsystem can reach the throughput level of 1000TPS under the best condition of hardware and network, and the 90% response time is not more than 1000 milliseconds, and the server utilization rate has reached the expected goal. Being able to fully meet the requirements of large traffic and high concurrency proves that the product subsystem has reached the expected performance target.
正在翻译中..
结果 (英语) 2:[复制]
复制成功!
Security testing, after social investigation, most malicious attacks focus on illegal requests. Illegal people carry out system attacks by falsifying malicious urls and entering the service-side system directly. Testing through the simulation of malicious requests made by illegal personnel, forged url to see if it can be smooth request channel service side, but also by simulating malicious submission to check whether the system's data filtering method is well applied within the system. With these simple, basic testing methods, you can know exactly the level of security of your current system. The security test of the product subsystem covers the main items and results of security testing, test cases simulate many typical ways of malicious attacks, including SQL, xSS, head CLRF and other injection methods, jump vulnerabilities, INFO vulnerabilities, forged requests and other aspects of testing. The test results show that all malicious requests fail, have a certain fighting power for the industry's mainstream security vulnerability product subsystems, and have fully achieved the desired set test objectives.<br>Through functional testing, show that the product subsystem has completed all the expected development needs, completed all the objectives of the requirements analysis, and can be developed in accordance with industry norms, in strict accordance with the company's software development into development, with a good user experience and a beautiful interface.<br>Through compatibility testing, to show that the product subsystem in the current mainstream browser kernel on the product subsystem can be normal display and use the basic functions of viewing transactions, in each browser page to show normal, there is no serious incompatibility phenomenon, has reached the goal of compatibility.<br>Through system performance testing, it is demonstrated that the product subsystem can achieve the level of 1000TPS throughput under the best conditions of hardware and network, and that 90% response time is not more than 1000 milliseconds, and that the server utilization rate has reached the expected target and is fully capable of meeting the high traffic concurrency requirements, proving that the product subsystem has reached the desired performance target.
正在翻译中..
结果 (英语) 3:[复制]
复制成功!
Security testing, after social investigation, most of the malicious attacks focus on illegal requests. Illegal people directly enter the server system to attack the system by forging malicious URL. During the test, we can simulate the malicious requests made by illegal personnel, forge the URL to see whether the requests can be sent to the server smoothly, and also can simulate the malicious submission to check whether the data filtering method of the system is well applied in the system. Through these simple and basic testing methods, we can accurately know the security level of the current system. The security test of product subsystem covers the display of the main items and results of security test. The test cases simulate many typical malicious attacks, including SQL, XSS, header clrf and other injection methods, jump vulnerability, info vulnerability, forged request and other aspects of the test. The test results show that all malicious requests fail, and the subsystem of the mainstream security vulnerability products in the industry has a certain strength to fight against, which has fully achieved the expected set test objectives.<br>Through the functional test, it shows that the product subsystem has completed all the expected development requirements, completed all the objectives of the requirements analysis, and can be developed in accordance with the industry standards, in strict accordance with the company's software development experience, with good user experience and beautiful interface.<br>Through the compatibility test, it shows that the product subsystem can normally display the product subsystem on the current mainstream browser kernel and use the basic function of viewing transactions. The page display on each browser is normal, and there is no serious incompatibility phenomenon, which has achieved the goal of compatibility.<br>Through the system performance test, it shows that the product subsystem can achieve the throughput level of 1000tps under the best hardware and network conditions, and the 90% response time is not more than 1000ms. Moreover, the server utilization has reached the expected goal, and can fully meet the requirements of large traffic and high concurrency, which proves that the product subsystem has achieved the expected performance Bid.<br>
正在翻译中..
 
其它语言
本翻译工具支持: 世界语, 丹麦语, 乌克兰语, 乌兹别克语, 乌尔都语, 亚美尼亚语, 伊博语, 俄语, 保加利亚语, 信德语, 修纳语, 僧伽罗语, 克林贡语, 克罗地亚语, 冰岛语, 加利西亚语, 加泰罗尼亚语, 匈牙利语, 南非祖鲁语, 南非科萨语, 卡纳达语, 卢旺达语, 卢森堡语, 印地语, 印尼巽他语, 印尼爪哇语, 印尼语, 古吉拉特语, 吉尔吉斯语, 哈萨克语, 土库曼语, 土耳其语, 塔吉克语, 塞尔维亚语, 塞索托语, 夏威夷语, 奥利亚语, 威尔士语, 孟加拉语, 宿务语, 尼泊尔语, 巴斯克语, 布尔语(南非荷兰语), 希伯来语, 希腊语, 库尔德语, 弗里西语, 德语, 意大利语, 意第绪语, 拉丁语, 拉脱维亚语, 挪威语, 捷克语, 斯洛伐克语, 斯洛文尼亚语, 斯瓦希里语, 旁遮普语, 日语, 普什图语, 格鲁吉亚语, 毛利语, 法语, 波兰语, 波斯尼亚语, 波斯语, 泰卢固语, 泰米尔语, 泰语, 海地克里奥尔语, 爱尔兰语, 爱沙尼亚语, 瑞典语, 白俄罗斯语, 科西嘉语, 立陶宛语, 简体中文, 索马里语, 繁体中文, 约鲁巴语, 维吾尔语, 缅甸语, 罗马尼亚语, 老挝语, 自动识别, 芬兰语, 苏格兰盖尔语, 苗语, 英语, 荷兰语, 菲律宾语, 萨摩亚语, 葡萄牙语, 蒙古语, 西班牙语, 豪萨语, 越南语, 阿塞拜疆语, 阿姆哈拉语, 阿尔巴尼亚语, 阿拉伯语, 鞑靼语, 韩语, 马其顿语, 马尔加什语, 马拉地语, 马拉雅拉姆语, 马来语, 马耳他语, 高棉语, 齐切瓦语, 等语言的翻译.

Copyright ©2024 I Love Translation. All reserved.

E-mail: