查询词典 vulnerabilities
- 与 vulnerabilities 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
"Chinese intelligence services have also been known to exploit vulnerabilities such as sexual relationships and illegal activities to pressurise individuals to co-operate with them."
&中国情报部门,也是众所周知的,如利用性关系和非法活动的弱点来迫使人们与他们合作。&
-
But leave your visitors in no doubt that America's losses will be avenged -- and America's vulnerabilities will be minimized -- whether they ride in the posse or not.
但是,你要让这些拜访者明白美国将会对这一次的损失而报仇雪恨,而且美国的弱点也将会减少的最小,不管他们是否参与与否。
-
This topic is focus on building a safe, reliable, and fairly active defense capabilities campus network security model, by the security assessment, vulnerability scanning and other technical means, to reinforce the existing shortcomings and vulnerabilities of information systems, and to establish a strong defensing ability information system platform; useing related network security precautions technologies, to establish campus network security and prevention system, to fundamentally eliminate security threats from internal and external network.
本课题致力于构建一个安全、可靠、具有一定主动防御能力的校园网安全模型,通过安全评估、漏洞扫描等技术手段,对现有信息系统的缺陷、漏洞进行加固,建立具有较强防范能力的信息系统平台;利用网络安全防范的相关技术,建立校园网安全防范体系,从根本上解决来自网络内外部对网络安全造成的各种威胁。
-
But this both couples them to, and exacerbates, the vulnerabilities of the deficit economies.
但是这更加剧恶化了脆弱的赤字经济。
-
Introduced a new method of buffer overflow vulnerabilities detection, which was based on fuzzing, data-flow dynamic analysis and automated exception analysis.
结合fuzzing技术、数据流动态分析技术以及异常自动分析技术等,提出一种新的缓冲区溢出漏洞发掘思路。
-
Introduced a new method of buffer overflow vulnerabilities detection, which was based on fuzzing, dataflow dynamic analysis and automated exception analysis.
结合fuzzing技术、数据流动态分析技术以及异常自动分析技术等,提出一种新的缓冲区溢出漏洞发掘思路。
-
"We recognize that Mozilla has continued to invest significantly in security features for Firefox 3; however we were able to easily detect this vulnerability through a simple fuzzing technique," said Itzik Kotler, Security Operation Center Manager, Radware."This clearly shows that zero-minute vulnerabilities are still aggressively in the public domain, making it increasingly more evident that security requirements must stay top-of-mind when developing and releasing new networked applications."
&我们认识到Mozilla对Firefox 3的安全方面已经做了持续的高投资,然而我们还是通过简单模糊技术轻易的检测出了这个漏洞&Radware的安全运营经理Itzik Kotler说道,&这说明零分-攻击的漏洞仍然在公共领域肆虐,使我们在开发和开放新的网络应用时,必须把安全因素放在首位的重要性日益增加。&
-
However, Unix and Windows NT each has its share of security lapses and known vulnerabilities.
但是,unix和windowsnt各有自己安全上的疏漏和众所周知的脆弱性。
-
Even so, researchers and manufacturers are mindful of the vulnerabilities of complex computerized and miniaturized components in both systems.
即便如此,研究人员和制造商注意到复杂的计算机和微型元件的两个系统漏洞。
-
Identity theft is one of the most sinister of vulnerabilities you can inadvertently be subjected to.
身份盗窃是最险恶的弱点你可以加以无意中。
- 推荐网络例句
-
It has been put forward that there exists single Ball point and double Ball points on the symmetrical connecting-rod curves of equilateral mechanisms.
从鲍尔点的形成原理出发,分析对称连杆曲线上鲍尔点的产生条件,提出等边机构的对称连杆曲线上有单鲍尔点和双鲍尔点。
-
The factory affiliated to the Group primarily manufactures multiple-purpose pincers, baking kits, knives, scissors, kitchenware, gardening tools and beauty care kits as well as other hardware tools, the annual production value of which reaches US$ 30 million dollars.
集团所属工厂主要生产多用钳、烤具、刀具、剪刀、厨具、花园工具、美容套等五金产品,年生产总值3000万美元,产品价廉物美、选料上乘、质量保证,深受国内外客户的青睐
-
The eˉtiology of hemospermia is complicate,but almost of hemospermia are benign.
血精的原因很,以良性病变为主。