分析了黑客入侵网络的常用手段,指出网络被入侵的根本原因在于系统安全漏洞的存在。
And the primary causation of intruding into a network - the security leaks of a system was pointed out.
计算机系统安全漏洞的研究以及漏洞库的建设,对于提高系统安全性、减少安全事件发生具有重要意义。
The research on computer vulnerabilities and the building of the vulnerability database are significant in improving system's security and reducing computer security incidents.
计算机系统安全漏洞的研究以及漏洞库的建设,对于提高系统安全性,减少安全事件发生具有重要意义。
The research on computer vulnerabilities and the building of the vulnerability database are significant for improving system's security and reducing computer security incidents.
网络安全评价是一复杂的系统工程,现有的安全评估工具大都只是用于对网络系统安全漏洞进行扫描、检测。
Network security assessment is a complex system engineering. Most of current security evaluation tools are only used to scan and detect the security vulnerabilities of network system.
它们通常提供了最基本的单用户环境,您可以使用这个环境进行磁盘检查(fsck)、系统安全漏洞检查,或者从备份恢复受损的文件。
These almost always provide a minimal single-user environment that you can use to run disk checks (FSCK), check for system compromises, or restore damaged files from backup.
网络安全漏洞扫描与脆弱性分析是进行系统安全评估的基础和信息安全保障体系中的必要组成部分。
Network security leak scan and vulnerability analysis are the base of system security evaluation and the essential components of Information security system.
该方法使漏洞严重性划分得更加细致,从而使系统安全管理员可以在最短的时间内修补更严重的安全漏洞。
This method partition the vulnerability more in detail, and make the system security administrators can patch the more serious vulnerabilities in the shortest times.
该方法使漏洞严重性划分得更加细致,从而使系统安全管理员可以在最短的时间内修补更严重的安全漏洞。
This method divides the vulnerability in detail, and helps system security administrators patch the vulnerabilities in the shortest time.
存在最多的系统安全隐患主要是由于很多带有漏洞的软件存在安全漏洞。
There was no software for the security hole whatsoever the system did not exist.
存在最多的系统安全隐患主要是由于很多带有漏洞的软件存在安全漏洞。
There was no software for the security hole whatsoever the system did not exist.
应用推荐