This board still has a few security vulnerabilities. Can you spot them?
这个公告板还有几个安全漏洞. 你能找出来 吗 ?
互联网
This information enables the attacker to target known vulnerabilities in these components.
这些信息允许攻击者了解在这些组件中的漏洞.
互联网
We are all fragile, he thought , and Emma has her vulnerabilities too.
我们都很脆弱, 艾玛也有她的弱点, 乔思量着.
互联网
A lack of clarity yields confusion, and this breeds vulnerabilities.
不清楚就会产生混乱, 也就会引起安全隐患.
互联网
Zero - day vulnerabilities are critical threats, and they genuinely require immediate attention.
零日缺陷是致命威胁, 并且它们确实需要立即注意.
互联网
But hackers may also discern vulnerabilities in computer systems and inflict damage.
但是黑客可能会寻找电脑系统的漏洞,从而造成危害.
互联网
These vulnerabilities, of course, have not been unique to Darfur.
当然, 这些脆弱的状况并非只出现在达佛.
互联网
But attackers searching for vulnerabilities in Microsoft products as active as ever, he said.
但是,攻击者在搜索微软产品的漏洞是以往一样活跃, 他说.
互联网
Combining dynamic analysis and static analysis, it makes further detection of buffer - overflow vulnerabilities.
结合动态与静态挖掘技术对二进制环境下的程序作进一步的漏洞查找.
互联网
A probing attack can use error messages generated by an application to search for security vulnerabilities.
探测攻击可使用由应用程序生成的错误消息来搜索安全漏洞.
互联网
However, Unix and Windows NT each has its share of security lapses and known vulnerabilities.
但是, Unix和WindowsNT各有自己安全上的疏漏和众所周知的脆弱性.
互联网
In computer security, a technique in which certain vulnerabilities are made attractive to a potential attacker.
在计算机安全学中, 一种以某些弱点来吸引潜在攻击者的技术.
互联网
So, dig deeply vulnerabilities and improve precision of scan becomes the soul of scanning the system.
因此, 挖掘深化漏洞,提高扫描精度成为扫描系统的灵魂.
互联网
You must have reviewed the package for known security vulnerabilities and must provide patches for them.
您需要重审源码包的已知安全隐患,并为它们提供补丁.
互联网
ISS specializes in software, appliances and services that help It'shops monitor and manage network vulnerabilities.
国际空间站的专门软件, 家用电器和服务,帮助它店监测和管理网络的脆弱性.
互联网
So it isn't surprising that you'll find plenty of strong opinions about the potential vulnerabilities of popular home-security systems.
出自-2016年12月阅读原文Every one of them has vulnerabilities that a knowledgeable thief could theoretically exploit.
出自-2016年12月阅读原文"If they are anywhere near worth their salt as engineers, I bet they are rethinking their threat model as we speak," said Jonathan Zdziarski, a digital expert who studies the iPhone and its vulnerabilities.
2017年12月六级真题(第三套)阅读 Section BOn the other hand, scientists disagree about how much and when they should share data, and they debate whether sharing it is more likely to accelerate science and make it more robust, or to introduce vulnerabilities and problems.
2017年12月六级真题(第二套)阅读 Section B本站部份资料来自网络或由网友提供,如有问题请速与我们联系,我们将立即处理!
Copyright © 2013-2024 风锐辞海 All Rights Reserved 浙ICP备20019715号
免责声明:本站非营利性站点,以方便网友为主,仅供学习。合作/投诉联系QQ:1553292129