1、

But attackers searching for vulnerabilities in Microsoft products as active as ever, he said.

但是,攻击者在搜索微软产品的漏洞是以往一样活跃, 他说.

互联网摘选

2、

A lack of clarity yields confusion, and this breeds vulnerabilities.

不清楚就会产生混乱, 也就会引起安全隐患.

互联网摘选

3、

You must have reviewed the package for known security vulnerabilities and must provide patches for them.

您需要重审源码包的已知安全隐患,并为它们提供补丁.

互联网摘选

4、

A probing attack can use error messages generated by an application to search for security vulnerabilities.

探测攻击可使用由应用程序生成的错误消息来搜索安全漏洞.

互联网摘选

5、

These vulnerabilities, of course, have not been unique to Darfur.

当然, 这些脆弱的状况并非只出现在达佛.

互联网摘选

6、

Combining dynamic analysis and static analysis, it makes further detection of buffer-overflow vulnerabilities.

结合动态与静态挖掘技术对二进制环境下的程序作进一步的漏洞查找.

互联网摘选

7、

In computer security, a technique in which certain vulnerabilities are made attractive to a potential attacker.

在计算机安全学中, 一种以某些弱点来吸引潜在攻击者的技术.

互联网摘选

8、

So, dig deeply vulnerabilities and improve precision of scan becomes the soul of scanning the system.

因此, 挖掘深化漏洞,提高扫描精度成为扫描系统的灵魂.

互联网摘选

9、

Zero-day vulnerabilities are critical threats, and they genuinely require immediate attention.

零日缺陷是致命威胁, 并且它们确实需要立即注意.

互联网摘选

10、

ISS specializes in software, appliances and services that help It'shops monitor and manage network vulnerabilities.

国际空间站的专门软件, 家用电器和服务,帮助它店监测和管理网络的脆弱性.

互联网摘选

11、

We are all fragile, he thought , and Emma has her vulnerabilities too.

我们都很脆弱, 艾玛也有她的弱点, 乔思量着.

互联网摘选

12、

However, Unix and Windows NT each has its share of security lapses and known vulnerabilities.

但是, Unix和WindowsNT各有自己安全上的疏漏和众所周知的脆弱性.

互联网摘选

13、

This information enables the attacker to target known vulnerabilities in these components.

这些信息允许攻击者了解在这些组件中的漏洞.

互联网摘选

14、

But hackers may also discern vulnerabilities in computer systems and inflict damage.

但是黑客可能会寻找电脑系统的漏洞,从而造成危害.

互联网摘选

15、

This board still has a few security vulnerabilities. Can you spot them?

这个公告板还有几个安全漏洞. 你能找出来 吗 ?

互联网摘选

16、

Of all these IAAA vulnerabilities, in the experi ­ ence of cloud service providers, currently, authentica ­ tion issues are the primary vulnerability that puts user data in cloud services at risk [ 5].

以云服务提供商的经验而言,在所有这些IAAA漏洞中,目前验证问题是主要的漏洞,因为它让用户放在云服务里的数据蒙受风险[5]。

互联网摘选

17、

Vulnerabilities that are relevant for all cloud comput ­ ing components typically concern the provider-or rather users' inability to control cloud infrastructure as they do their own infrastructure.

所有云计算组件的漏洞,或者更确切地说,无法让用户像控制自己的基础设施一样控制云计算基础设施,通常都让提供商感到担心。

互联网摘选

18、

Security assessments and audits that there needs to be continuous testing for security vulnerabilities and exposures.

安全评估和审计意味着你需要持续地测试系统的安全漏洞.

互联网摘选

19、

Vulnerabilities occur across a wide spectrum, from the obvious like using a weak password or storing unprotected private data to the more nuanced like unchecked input.

脆弱点出现的范围很广,从明显的像使用不健壮的密码或存储无保护的私有数据到更有细微差异的像未检查的输入。

互联网摘选

20、

If nothing else, the first two games in Oakland exposed some vulnerabilities.

别的不说,在奥克兰的前两场比赛已经暴露一些缺点。

互联网摘选

  • 今日热词
  • 热门搜索

简答网英语词典(dict.jiandongshicai.cn)为您提供在线翻译英语词典单词大全英译汉汉译英等英语服务!可按单词字数词义分类查询。支持lj:关键词格式查询例句。

用户反馈
请选择反馈类型(可多选):
您的联系方式:(如需回复请填写联系方式)
反馈内容:
提交成功 小编会尽快处理
回到顶部
点击反馈