查询词典 vulnerabilities
- 与 vulnerabilities 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
Through analyzing the theory and types of buffer overflow vulnerabilities, the format defines of the testing object are brought up, the manipulation on buffer and the status of buffer are defined.
通过对缓冲区溢出原理和各种缓冲区溢出类型的分析,对测试对象进行了形式化定义,并定义了缓冲区状态和缓冲区上的操作。
-
One of the greatest vulnerabilities of hydrogen chloride tube trailers is the involvement in a transportation accident.
氯化氢管道拖车的最大弱点之一是卷入交通事故。
-
And/or attempt to identify system vulnerabilities, impersonate any other user of the Site and/or
冒充本网站和/或服务的其它用户,或在任何帖子上伪造任何标题信息,或篡改 TCP/IP
-
A Single Man 's cast also includes Julianne Moore, playing a complex role as George's best friend and long-ago lover--one of the only people on the planet who can know all that George is going through, yet with vast vulnerabilities of her own.
一个单人的演员还包括朱利安摩尔,头顶上的复杂角色,乔治的最好的朋友,很久以前人们只在情人- 1地球谁可以知道所有的乔治正在经历,与她自己的巨大漏洞呢。
-
The method using key states to establish the relationship of assessment factors reduces misguidance of irrelevant vulnerabilities and threats. It makes the assessment results closer to objective reality.
提出的基于关键状态建立评估要素之间关联关系的方法,减小了无关联威胁及弱点对评估结果的误导,更贴近客观现实。
-
Known weaknesses in systems are called Common Vulnerabilities and Exposures, compiled and documented by the MITRE organization.
系统上已知的漏洞被称为"通用漏洞批露",它是由MITRE组织汇编整理的漏洞信息。
-
Another risk to Nestlé's strategy is that of overreach, arising from two particular vulnerabilities.
雀巢战略的另一个潜在风险是过度扩张的危险,源于两个致命的弱势:一个是公司过往丑闻造成不良影响。
-
In a cyber warfare at first the attackers usually cast about for the intelligence of the targets, such as the vendors and versions information about the operating systems and services running on them, so they can get everything ready beforehand and exploit the vulnerabilities efficiently to perform a precision bombing. This paper discusses how to defeat reconnaissance through hiding or disguising the behavior characteristics in Web servers' communications.
文章讨论了侦察活动对系统安全的影响,提出了防风墙、安全时间、攻击距离的概念,并利用Linux 2.4内核提供的Netfilter架构访问、修改和丢弃数据包的功能设计了一个Web站点的防风墙原型系统——WSW2,描述了利用行为控制防范操作系统侦察和Web服务器映射的技术,实验证明这种方法可以有效地抵御侦察。
-
You will also need to work with your hosting provider to fix all security vulnerabilities associated with your site.
你也必须与你的主机托管提供商,以确定所有的安全漏洞与你的站点。
-
Network worms are the primary means of network attacks. They can exploit the operating system or software vulnerabilities, reduplicate and automatically transmit themselves through the network.
网络蠕虫是网络攻击的主要手段,它能利用操作系统或软件的安全漏洞,借助网络进行自我复制和自动传播。
- 推荐网络例句
-
On the other hand, the more important thing is because the urban housing is a kind of heterogeneity products.
另一方面,更重要的是由于城市住房是一种异质性产品。
-
Climate histogram is the fall that collects place measure calm value, cent serves as cross axle for a few equal interval, the area that the frequency that the value appears according to place is accumulated and becomes will be determined inside each interval, discharge the graph that rise with post, also be called histogram.
气候直方图是将所收集的降水量测定值,分为几个相等的区间作为横轴,并将各区间内所测定值依所出现的次数累积而成的面积,用柱子排起来的图形,也叫做柱状图。
-
You rap, you know we are not so good at rapping, huh?
你唱吧,你也知道我们并不那么擅长说唱,对吧?