英语人>网络例句>vulnerabilities 相关的网络例句
vulnerabilities相关的网络例句

查询词典 vulnerabilities

与 vulnerabilities 相关的网络例句 [注:此内容来源于网络,仅供参考]

Every one of the vulnerabilities discussed in this chapter stems directly from trusting data that comes over the wire and then failing to sanitize that data before using it.

在这一章所提到的所有的安全隐患都直接源自对传入数据的信任,并且在使用前不加处理。

As in other products, is improved operational stability, is removed a number of obtained vulnerabilities and errors in security system .

如同其他产品、改进操作稳定取消了一批获得安全体系的脆弱和错误。

What is needed is to suffuse information and adequate response patterns throughout populations, so that the capping and rolling back of environmental change vulnerabilities becomes both politically and organisationally feasible.

什么是需要的是suffuse信息和适当的反应模式,在整个种群,使该上限和回滚环境变化的脆弱性成为政治上和组织上是可行的。

S. But one of the unremarked ironies of the present crisis is that America's financial vulnerabilities came fully into view months before Europe's (or the rest of the world's) did.

不过眼下这场危机中未被注意的一个讽刺之处是,美国的金融脆弱性比欧洲早暴露了好几个月。

Updates from untrusted websites can create vulnerabilities on your computer.

来自不信赖的网站的更新能在你的电脑上创造弱点。

ABI Research Addresses Serious Wireless Security Vulnerabilities with New Research Service Business Wire via Yahoo!

Finance阿比认真研究解决新的安全漏洞研究无线服务商务线材经雅虎财政部

This is one of the worst Windows vulnerabilities ever, said Marc Maiffret, an executive at eEye Digital Security Inc. of Aliso Viejo, California, whose researchers discovered similarly dangerous flaws in at least three earlier versions of Windows.

位于加州 Aliso Viejo的eEye电子安全公司总裁Marc Maiffret说:&这是Windows软件最严重的缺陷之一&,他们的研究人员在至少三个旧版本的Windows系统中发现类似的危险缺陷。

Surely it should be obvious to the dimmest executive that trust, that most valuable of economic assets, is easily destroyed and hugely expensive to restore - and that few things are more likely to destroy trust than a company letting sensitive

根据第二段,某些组织检查他们自身的系统是为了什么根据题干中的&find out&定位到原文第二段的末句中&in search of potential vulnerabilities&即为了寻找潜在的薄弱环节。

through the existing analysis of network security and intrusion detection technology, this paper puts forward a cooperative intrusion detection method. this new method collects information distributedly, processes in multilateral cooperation, and constructs the large-network ids. then, it collects the information from dialing users to detect whether there are vulnerabilities and virus in individual or not. by means of such functions, this method only permits the users with reliable network repairing system or with the updated latest virus library to access to the campus network.

该文通过对现有校园网络安全及入侵检测技术的分析,提出一种基于协议分析的分布式入侵检测方法,采用分布收集信息,分布处理多方协作的方式,将基于主机的ids和基于网络的ids结合使用,构筑面向大型网络的ids;然后通过全局安全网络协作,收集拨号用户的信息,检查个体计算机是否存在漏洞、病毒,如果发现有就阻止其接入网络,强制其用到可信的网络修复系统或更新最新的病毒库后才可以正常接入校园网。

Mobile security agents scan the vulnerabilities, gather the auditing logs, and implement the preactive and postactive security tasks, but it's also necessary to guarantee the communication and mobility security for agent itself.

移动安全Agent扫描各客户主机的漏洞,采集记录异常活动的审计日志,实现事前和事后的安全保障,但移动Agent自身的通信和迁移的安全性同样重要。

第3/9页 首页 < 1 2 3 4 5 6 7 8 9 > 尾页
推荐网络例句

On the other hand, the more important thing is because the urban housing is a kind of heterogeneity products.

另一方面,更重要的是由于城市住房是一种异质性产品。

Climate histogram is the fall that collects place measure calm value, cent serves as cross axle for a few equal interval, the area that the frequency that the value appears according to place is accumulated and becomes will be determined inside each interval, discharge the graph that rise with post, also be called histogram.

气候直方图是将所收集的降水量测定值,分为几个相等的区间作为横轴,并将各区间内所测定值依所出现的次数累积而成的面积,用柱子排起来的图形,也叫做柱状图。

You rap, you know we are not so good at rapping, huh?

你唱吧,你也知道我们并不那么擅长说唱,对吧?