英语人>网络例句>vulnerabilities 相关的网络例句
vulnerabilities相关的网络例句

查询词典 vulnerabilities

与 vulnerabilities 相关的网络例句 [注:此内容来源于网络,仅供参考]

"Chinese intelligence services have also been known to exploit vulnerabilities such as sexual relationships and illegal activities to pressurise individuals to co-operate with them."

&中国情报部门,也是众所周知的,如利用性关系和非法活动的弱点来迫使人们与他们合作。&

But leave your visitors in no doubt that America's losses will be avenged -- and America's vulnerabilities will be minimized -- whether they ride in the posse or not.

但是,你要让这些拜访者明白美国将会对这一次的损失而报仇雪恨,而且美国的弱点也将会减少的最小,不管他们是否参与与否。

This topic is focus on building a safe, reliable, and fairly active defense capabilities campus network security model, by the security assessment, vulnerability scanning and other technical means, to reinforce the existing shortcomings and vulnerabilities of information systems, and to establish a strong defensing ability information system platform; useing related network security precautions technologies, to establish campus network security and prevention system, to fundamentally eliminate security threats from internal and external network.

本课题致力于构建一个安全、可靠、具有一定主动防御能力的校园网安全模型,通过安全评估、漏洞扫描等技术手段,对现有信息系统的缺陷、漏洞进行加固,建立具有较强防范能力的信息系统平台;利用网络安全防范的相关技术,建立校园网安全防范体系,从根本上解决来自网络内外部对网络安全造成的各种威胁。

But this both couples them to, and exacerbates, the vulnerabilities of the deficit economies.

但是这更加剧恶化了脆弱的赤字经济。

Introduced a new method of buffer overflow vulnerabilities detection, which was based on fuzzing, data-flow dynamic analysis and automated exception analysis.

结合fuzzing技术、数据流动态分析技术以及异常自动分析技术等,提出一种新的缓冲区溢出漏洞发掘思路。

Introduced a new method of buffer overflow vulnerabilities detection, which was based on fuzzing, dataflow dynamic analysis and automated exception analysis.

结合fuzzing技术、数据流动态分析技术以及异常自动分析技术等,提出一种新的缓冲区溢出漏洞发掘思路。

"We recognize that Mozilla has continued to invest significantly in security features for Firefox 3; however we were able to easily detect this vulnerability through a simple fuzzing technique," said Itzik Kotler, Security Operation Center Manager, Radware."This clearly shows that zero-minute vulnerabilities are still aggressively in the public domain, making it increasingly more evident that security requirements must stay top-of-mind when developing and releasing new networked applications."

&我们认识到Mozilla对Firefox 3的安全方面已经做了持续的高投资,然而我们还是通过简单模糊技术轻易的检测出了这个漏洞&Radware的安全运营经理Itzik Kotler说道,&这说明零分-攻击的漏洞仍然在公共领域肆虐,使我们在开发和开放新的网络应用时,必须把安全因素放在首位的重要性日益增加。&

However, Unix and Windows NT each has its share of security lapses and known vulnerabilities.

但是,unix和windowsnt各有自己安全上的疏漏和众所周知的脆弱性。

Even so, researchers and manufacturers are mindful of the vulnerabilities of complex computerized and miniaturized components in both systems.

即便如此,研究人员和制造商注意到复杂的计算机和微型元件的两个系统漏洞。

Identity theft is one of the most sinister of vulnerabilities you can inadvertently be subjected to.

身份盗窃是最险恶的弱点你可以加以无意中。

第4/9页 首页 < 1 2 3 4 5 6 7 8 9 > 尾页
推荐网络例句

On the other hand, the more important thing is because the urban housing is a kind of heterogeneity products.

另一方面,更重要的是由于城市住房是一种异质性产品。

Climate histogram is the fall that collects place measure calm value, cent serves as cross axle for a few equal interval, the area that the frequency that the value appears according to place is accumulated and becomes will be determined inside each interval, discharge the graph that rise with post, also be called histogram.

气候直方图是将所收集的降水量测定值,分为几个相等的区间作为横轴,并将各区间内所测定值依所出现的次数累积而成的面积,用柱子排起来的图形,也叫做柱状图。

You rap, you know we are not so good at rapping, huh?

你唱吧,你也知道我们并不那么擅长说唱,对吧?