安全漏洞经常植根于在意料之外的数据面前表现得不够健壮的程序中。
Security holes are often rooted in a program that isn't robust in the face of unexpected data.
近来的宕机和安全漏洞显示,将公司的所有或部分运营转向云端——大规模远距离存储数据集及应用之简称——并非没有风险。
Putting all or part of a company's operations on the cloud — shorthand for large, remotely hosted data sets and applications — isn't without risk, as recent outages and security lapses have shown.
第二个安全漏洞与攻击者借助用户可管理数据来控制业务流程有关。
The second vulnerability has to do with using user-controllable data to control a business process.
这样的例子之一就是web页面的代码中的一个安全漏洞,它可以允许一个在线银行客户看到其它客户的数据。
An example of this is security holes in a Web page's code that can allow an online banking client to see another client's data.
今年六月,Dropbox的一次软件更新导致了暂时的安全漏洞,让未授权的用户能够访问网络服务的存储数据,这个状况持续了长达4小时。
In June a software update at Dropbox caused a temporary security breach that allowed unauthorised access to data held by the online-storage service for about four hours.
上述 iframe 数据传输机制同样会带来安全漏洞。
The iframe data-transmission mechanism described above introduces security vulnerabilities.
这个数据库中的每个条目包含对安全漏洞的简要说明和相关的参考资料。
Each entry in the database includes a brief description of the security vulnerability or exposure and any pertinent references.
有时,即使只是读入数据也可以是安全漏洞——甚至在数据被检查之前!
Sometimes, even just reading data can be a security vulnerability — before the data is even checked!
这种开发模型会导致安全漏洞成倍增加:每当向一个mashup添加一个新的工件或数据源,安全漏洞都会增加。
This model of development leads to security vulnerabilities that can multiply very quickly: With each new artifact or data source added to a mashup, security vulnerabilities increase.
数据可以存储在会话中,恶意用户无法直接修改它(当然,代码中的bug仍然可能产生安全漏洞)。
Data can be stored in the session with no direct way for a malicious user to alter it. (Bugs in your code may still give an attacker an opening, of course.)
它通过构造一个有明显安全漏洞的系统来引诱入侵者对其进行攻击,捕获入侵者攻击过程中在蜜罐系统上的活动数据。
It lures intruder to attack themselves by constructing an obvious security vulnerability in its system, capture the activity data when intruder attacking on the honeypot system.
“身份盗用资源中心”从2005年就开始追踪安全漏洞了,以下是来源于它2015年的数据。
The 2015 statistics below come from the Identity Theft Resource Center, who've been tracking security breaches since 2005.
此1.6版本修补了一个致命安全漏洞。3、这个版本不兼容以前版本的数据库。
This 1.6 version fixes a critical security vulnerability. 3, this version is not compatible with previous versions of the database.
此1.6版本修补了一个致命安全漏洞。3、这个版本不兼容以前版本的数据库。
This 1.6 version fixes a critical security vulnerability. 3, this version is not compatible with previous versions of the database.
应用推荐