• 安全漏洞经常植根于意料之外数据面前表现得不够健壮程序

    Security holes are often rooted in a program that isn't robust in the face of unexpected data.

    youdao

  • 近来宕机安全漏洞显示公司所有部分运营转向云端——大规模远距离存储数据应用之简称——并非没有风险

    Putting all or part of a company's operations on the cloud — shorthand for large, remotely hosted data sets and applicationsisn't without risk, as recent outages and security lapses have shown.

    youdao

  • 第二安全漏洞与攻击者借助用户可管理数据控制业务流程有关。

    The second vulnerability has to do with using user-controllable data to control a business process.

    youdao

  • 这样例子之一就是web页面代码中的安全漏洞可以允许一个在线银行客户看到其它客户的数据

    An example of this is security holes in a Web page's code that can allow an online banking client to see another client's data.

    youdao

  • 今年六月Dropbox软件更新导致暂时安全漏洞授权的用户能够访问网络服务的存储数据这个状况持续了长达4小时

    In June a software update at Dropbox caused a temporary security breach that allowed unauthorised access to data held by the online-storage service for about four hours.

    youdao

  • 上述 iframe 数据传输机制同样会带来安全漏洞

    The iframe data-transmission mechanism described above introduces security vulnerabilities.

    youdao

  • 这个数据中的每个条目包含安全漏洞简要说明相关参考资料

    Each entry in the database includes a brief description of the security vulnerability or exposure and any pertinent references.

    youdao

  • 有时即使只是读入数据可以安全漏洞——甚至数据被检查之前

    Sometimes, even just reading data can be a security vulnerabilitybefore the data is even checked!

    youdao

  • 这种开发模型导致安全漏洞成倍增加:每当一个mashup添加新的工件数据安全漏洞都会增加。

    This model of development leads to security vulnerabilities that can multiply very quickly: With each new artifact or data source added to a mashup, security vulnerabilities increase.

    youdao

  • 数据可以存储会话中恶意用户无法直接修改(当然代码中的bug仍然可能产生安全漏洞)。

    Data can be stored in the session with no direct way for a malicious user to alter it. (Bugs in your code may still give an attacker an opening, of course.)

    youdao

  • 通过构造一个有明显安全漏洞系统来引诱入侵者进行攻击捕获入侵者攻击过程中在蜜罐系统活动数据

    It lures intruder to attack themselves by constructing an obvious security vulnerability in its system, capture the activity data when intruder attacking on the honeypot system.

    youdao

  • 身份盗用资源中心2005年就开始追踪安全漏洞了,以下是来源于它2015年的数据

    The 2015 statistics below come from the Identity Theft Resource Center, who've been tracking security breaches since 2005.

    youdao

  • 1.6版本修补了一个致命安全漏洞3这个版本兼容以前版本数据

    This 1.6 version fixes a critical security vulnerability. 3, this version is not compatible with previous versions of the database.

    youdao

  • 1.6版本修补了一个致命安全漏洞3这个版本兼容以前版本数据

    This 1.6 version fixes a critical security vulnerability. 3, this version is not compatible with previous versions of the database.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定