查询词典 vulnerabilities
- 与 vulnerabilities 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
Through analyzing the theory and types of buffer overflow vulnerabilities, the format defines of the testing object are brought up, the manipulation on buffer and the status of buffer are defined.
通过对缓冲区溢出原理和各种缓冲区溢出类型的分析,对测试对象进行了形式化定义,并定义了缓冲区状态和缓冲区上的操作。
-
One of the greatest vulnerabilities of hydrogen chloride tube trailers is the involvement in a transportation accident.
氯化氢管道拖车的最大弱点之一是卷入交通事故。
-
And/or attempt to identify system vulnerabilities, impersonate any other user of the Site and/or
冒充本网站和/或服务的其它用户,或在任何帖子上伪造任何标题信息,或篡改 TCP/IP
-
A Single Man 's cast also includes Julianne Moore, playing a complex role as George's best friend and long-ago lover--one of the only people on the planet who can know all that George is going through, yet with vast vulnerabilities of her own.
一个单人的演员还包括朱利安摩尔,头顶上的复杂角色,乔治的最好的朋友,很久以前人们只在情人- 1地球谁可以知道所有的乔治正在经历,与她自己的巨大漏洞呢。
-
The method using key states to establish the relationship of assessment factors reduces misguidance of irrelevant vulnerabilities and threats. It makes the assessment results closer to objective reality.
提出的基于关键状态建立评估要素之间关联关系的方法,减小了无关联威胁及弱点对评估结果的误导,更贴近客观现实。
-
Known weaknesses in systems are called Common Vulnerabilities and Exposures, compiled and documented by the MITRE organization.
系统上已知的漏洞被称为"通用漏洞批露",它是由MITRE组织汇编整理的漏洞信息。
-
Another risk to Nestlé's strategy is that of overreach, arising from two particular vulnerabilities.
雀巢战略的另一个潜在风险是过度扩张的危险,源于两个致命的弱势:一个是公司过往丑闻造成不良影响。
-
In a cyber warfare at first the attackers usually cast about for the intelligence of the targets, such as the vendors and versions information about the operating systems and services running on them, so they can get everything ready beforehand and exploit the vulnerabilities efficiently to perform a precision bombing. This paper discusses how to defeat reconnaissance through hiding or disguising the behavior characteristics in Web servers' communications.
文章讨论了侦察活动对系统安全的影响,提出了防风墙、安全时间、攻击距离的概念,并利用Linux 2.4内核提供的Netfilter架构访问、修改和丢弃数据包的功能设计了一个Web站点的防风墙原型系统——WSW2,描述了利用行为控制防范操作系统侦察和Web服务器映射的技术,实验证明这种方法可以有效地抵御侦察。
-
You will also need to work with your hosting provider to fix all security vulnerabilities associated with your site.
你也必须与你的主机托管提供商,以确定所有的安全漏洞与你的站点。
-
Network worms are the primary means of network attacks. They can exploit the operating system or software vulnerabilities, reduplicate and automatically transmit themselves through the network.
网络蠕虫是网络攻击的主要手段,它能利用操作系统或软件的安全漏洞,借助网络进行自我复制和自动传播。
- 推荐网络例句
-
It has been put forward that there exists single Ball point and double Ball points on the symmetrical connecting-rod curves of equilateral mechanisms.
从鲍尔点的形成原理出发,分析对称连杆曲线上鲍尔点的产生条件,提出等边机构的对称连杆曲线上有单鲍尔点和双鲍尔点。
-
The factory affiliated to the Group primarily manufactures multiple-purpose pincers, baking kits, knives, scissors, kitchenware, gardening tools and beauty care kits as well as other hardware tools, the annual production value of which reaches US$ 30 million dollars.
集团所属工厂主要生产多用钳、烤具、刀具、剪刀、厨具、花园工具、美容套等五金产品,年生产总值3000万美元,产品价廉物美、选料上乘、质量保证,深受国内外客户的青睐
-
The eˉtiology of hemospermia is complicate,but almost of hemospermia are benign.
血精的原因很,以良性病变为主。