{"id":912,"date":"2010-09-23T22:04:09","date_gmt":"2010-09-23T14:04:09","guid":{"rendered":"http:\/\/localhost\/portal\/2010\/09\/23\/mobilephone\/"},"modified":"2010-09-23T22:04:09","modified_gmt":"2010-09-23T14:04:09","slug":"mobilephone","status":"publish","type":"post","link":"https:\/\/www.cyberhunter.com.tw\/?p=912","title":{"rendered":"\u5831\u544a\uff1a\u904e\u534a\u624b\u6a5f\u61c9\u7528\u7a0b\u5f0f\u6709\u5b89\u5168\u554f\u984c"},"content":{"rendered":"<p>\u65b0\u805e\u4f86\u6e90: ZDNet<\/p>\n<p>\u6839\u64da\u4e00\u5bb6\u8cc7\u5b89\u516c\u53f8Veracode\u6700\u65b0\u91cb\u51fa\u7684\u5831\u544a\u986f\u793a\uff0c\u4f01\u696d\u5167\u90e8\u7528\u7684\u7a0b\u5f0f\u4e2d\u6709\u8d85\u904e\u4e00\u534a\u6709\u5b89\u5168\u6027\u554f\u984c\u3002ZDNet\u65b0\u805e\u5c08\u5340\uff1aElinor Mills<\/p>\n<p>Veracode\u572818\u500b\u6708\u5167\u67e5\u770b\u4e86\u81ea\u5bb6\u96f2\u7aef\u5ba2\u6236\u4f7f\u7528\u7684\u8d85\u904e2900\u500b\u61c9\u7528\u7a0b\u5f0f\uff0c\u767c\u73fe\u670957%\u7684\u7a0b\u5f0f\u6709\u4e0d\u80fd\u88ab\u63a5\u53d7\u7684\u7a0b\u5f0f\u5b89\u5168\u54c1\u8cea\u3002<\/p>\n<p>\u5341\u500b\u7db2\u9801\u7a0b\u5f0f\u4e2d\u6709\u516b\u500b\u672a\u9054OWASP\uff08\u958b\u653e\u7db2\u9801\u7a0b\u5f0f\u5b89\u5168\u8a08\u756b\uff0cOpen Web Application Security Project\uff09\u524d\u5341\u5927\u8981\u6c42\uff0c\u4e5f\u5c31\u662f\u9700\u8981\u9054\u5230\u7528\u5728\u8ca1\u52d9\u548c\u96fb\u5b50\u5546\u52d9\u7db2\u7ad9\u4e2d\u7684PCI\u898f\u7bc4\uff08\u652f\u4ed8\u5361\u7522\u696d\uff0cpayment card industry compliance)\u3002<\/p>\n<p>\u8a72\u5831\u544a\u8aaa\uff0c\u4f01\u696d\u4e2d\u4f7f\u7528\u8d8a\u4f86\u8d8a\u591a\u7684\u7b2c\u4e09\u65b9\u7a0b\u5f0f\u78bc\u901a\u5e38\u662f\u4e0d\u5b89\u5168\u7684\u3002\u7b2c\u4e09\u65b9\u4f9b\u61c9\u8005\u670981%\u7121\u6cd5\u9054\u5230\u53ef\u63a5\u53d7\u7684\u5b89\u5168\u6a19\u6e96\u3002<\/p>\n<p>\u540c\u6642\uff0c\u8de8\u7db2\u7ad9\u6307\u4ee4\u78bc\u653b\u64ca(cross-site scripting, XSS)\u4f9d\u7136\u662f\u6700\u5e38\u898b\u7684\u6240\u6709\u7a0b\u5f0f\u7684\u6f0f\u6d1e\uff0c\u800c.Net\u7a0b\u5f0f\u7684\u5f31\u9ede\u6578\u91cf\u5247\u986f\u793a\u300c\u7570\u5e38\u300d\u9ad8\uff0cVeracode\u8aaa\u3002<\/p>\n<p>Veracode\u7684\u7522\u54c1\u884c\u92b7\u526f\u7e3d\u88c1Sam King\u8ddf\u6211\u5011\u8aaa\uff0c\u300c\u5728\u95dc\u65bc\u8edf\u9ad4\u8cc7\u8a0a\u5b89\u5168\u9019\u90e8\u4efd\uff0c\u9084\u6709\u5f88\u591a\u5de5\u4f5c\u8981\u505a\u3002\u300d<\/p>\n<p>\u540c\u6a23\u5728\u9031\u4e09\uff0cWhiteHat Security\u91cb\u51fa\u4e00\u4efd\u5831\u544a\u986f\u793a\uff0c\u5e73\u5747\u4e00\u500b\u7db2\u7ad9\u6703\u6709\u63a5\u8fd113\u7684\u5371\u96aa\u7684\u6f0f\u6d1e\u3002\uff08\u694a\u58eb\u7bc4\/\u8b6f\uff09<br type=\"_moz\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u65b0\u805e\u4f86\u6e90: ZDNet \u6839\u64da\u4e00\u5bb6\u8cc7\u5b89\u516c\u53f8Veracode\u6700\u65b0\u91cb\u51fa\u7684\u5831\u544a\u986f\u793a\uff0c\u4f01\u696d\u5167\u90e8\u7528\u7684\u7a0b\u5f0f\u4e2d\u6709\u8d85\u904e\u4e00\u534a\u6709\u5b89\u5168 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[],"class_list":["post-912","post","type-post","status-publish","format-standard","hentry","category-informationsecurity"],"_links":{"self":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/912","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=912"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/912\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=912"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=912"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=912"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}