• 另外操作系统漏洞导致浏览器问题不在该计划范围之内

    Bugs that take advantage of vulnerabilities in the base operating system of the computer running the Web browser will also be ineligible.

    youdao

  • 部署工控漏洞扫描系统及时发现工控系统漏洞

    Deployment of industrial vulnerability scanning system, industrial system vulnerabilities found in a timely manner.

    youdao

  • 减少漏洞通过离线安装补丁可以极大减少系统漏洞

    Reduce flaw: Install a patch through leaving a line, OK and great reduce systematic flaw.

    youdao

  • 了解病毒系统漏洞最新动态系统存在漏洞

    Understand the newest trends of virus and systematic flaw, block up on the flaw that the system exists.

    youdao

  • 典型缺陷包括功能缺失差劲的运行效率以及系统漏洞

    Typical shortcomings include missing functionality, poor runtime performance, and bugs.

    youdao

  • 此外它还呼吁银行系统以外的商家检查系统漏洞升级验钞机

    In addition, it called on non-banking businesses to check for loopholes and upgrade detectors.

    youdao

  • 问题微软操作系统漏洞很多,经常需要更新不管装的是否盗版。

    The problem is Microsoft's operating system has many holes, which should be updated from time to time, whether your operating system is piratic or not.

    youdao

  • 目标系统漏洞信息的获取,目前主要是通过网络漏洞扫描工具实现的。

    Then it studies the network vulnerability scanning technology, witch includes port scanning, vulnerability scanning and dictionary attacking.

    youdao

  • 目的攻击者取得控制,”7月份文章讲述多种演练可以发现系统漏洞的时候

    "Goal is for attacker to gain control," the July paper said in describing the many kinds of maneuvers that could exploit system holes.

    youdao

  • 电力生产控制区二次系统漏洞修补属于安全防护工作必不可少重要组成部分

    Vulnerability repair of electric power production and control area secondary system is a necessary and important part of security protection work.

    youdao

  • 这种情况下攻击截获信息可以用来显示在计算机安全系统漏洞

    In case it this information is intercepted by an attacker, it can be used to reveal vulnerabilities in the computer's security system.

    youdao

  • 很强的逻辑思维能力这点使擅长业务分析很快发现系统漏洞解决

    I have a strong logical thinking ability, it gives me a good business analysis, but also be able to quickly discover and address vulnerabilities.

    youdao

  • 消极防御只能被动挨打单纯依靠封堵现有系统漏洞不能根本上解决信息安全问题

    Negative defense will only lead to be attacked and only depending on sealing off the existed system leaks can't solve information security problems.

    youdao

  • 蠕虫定义如下,蠕虫一个自包含软件组件可以自动执行可识别攻击目标系统漏洞探测操作

    By definition, a worm is a self-contained software component that automatically performs probe actions designed to identify and exploit vulnerabilities on a targeted system.

    youdao

  • CVE 体系结构的建立理解避免检测消除计算机系统漏洞具有理论和实践意义。

    This CVE structure is valuable for the understanding, avoiding, detecting and removing of vulnerabilities and exposures.

    youdao

  • 新的安全特性增加了更深层次管理用户治理审计,从而减少系统漏洞并大大提高开发人员效率

    New security capabilities add deeper levels of management, user governance, and auditing to decrease system vulnerabilities, while maximizing developer productivity.

    youdao

  • 首先系统漏洞潜在攻击攻击目的可能导致的后果等进行安全风险分析评估

    First of all, it is necessary to analyze and evaluate the security risk of the system vulnerabilities, the potential attackers and the purpose of the attack, and the possible consequences.

    youdao

  • 由于网络技术飞速发展网络规模迅猛增长计算机系统日益复杂,导致新的系统漏洞层出不穷。

    Along with the rapid development of network technology, the more complication of computer and the more enlarged size of Internet, the more leaks may existed in new system.

    youdao

  • 一方面,但没有什么灵丹妙药可以绕过DPI。通常用户只能通过寻找系统漏洞”的方式来暂时逃避

    But on the other hand, Sennhauser says there's no magic bullet for getting around DPI as users can usually only temporarily elude it by "finding flaws in their system."

    youdao

  • 然后选择作为攻击目标利用系统漏洞各种攻击手段发现突破口获取超级用户权限提升用户权限。

    Then, choose target system vulnerability, all kinds of attacks by means of breakthrough, obtain found super user permissions, improve user permissions.

    youdao

  • 本文在深入研究系统漏洞网络攻击模式的基础上,提出实现了一种面向网络攻击的智能决策支持系统

    This article further investigates system vulnerability and network attack patterns, designs and implements a network attack intelligent decision support systems (NAIDSS).

    youdao

  • 智慧城市中的系统建设过程中可能存在以下系统安全隐患信道攻击系统漏洞硬件故障程序缺陷

    Smart city system in the construction process may be the following system security risks: side channel attacks, system vulnerabilities, hardware failures, program defects.

    youdao

  • 完整攻击过程通常会包括一系列单独的攻击行为每个攻击行为某个系统漏洞(脆弱性)的一次利用

    A complete attack process usually includes a series of attack actions, and every attack action is a use of system vulnerability.

    youdao

  • 如果视窗系统漏洞剥削WindowsServer 2008,然而危及所有虚拟机运行在

    If a Windows vulnerability exploited Windows Server 2008, however, that would jeopardize all the VMs that are running on it in one shot.

    youdao

  • 本文首先研究智能决策支持系统体系结构集成方式知识库设计然后系统漏洞和网络攻击模式进行了深入探讨

    This article studies the system structure, the integrated way and the design of IDSS knowledge base at first, and then deeply discusses the system vulnerability and network attack modeling.

    youdao

  • 即便我们可以采用不同测量方式,例如代码行数、数量、函数指针的数量、系统漏洞的数量,等等软件还是缺乏一种定义良好原子结构

    Software also lacks a well defined atomic unit of work — even though we can apply various measures, such as lines-of-code, number of classes, number of function points, number of bugs, etc.

    youdao

  • 星期六一些准备购买墨尔本电影节入场券影迷告知抗议者利用一个系统漏洞提交了虚假购票需求,导致了电影节入场券售罄假象。

    Filmgoers trying to buy tickets for the Melbourne film festival on Saturday were informed that the event was sold out after protestors exploited a loophole to make phony ticket purchases.

    youdao

  • 当然Linux较少受到病毒恶意软件攻击而且系统漏洞往往都即时发现开发者用户所组成的快速军团也能迅速地修复这些漏洞

    Of course, Linux also gets attacked less frequently by viruses and malware, and vulnerabilities tend be found and fixed more quickly by its legions of developers and users.

    youdao

  • 基于主动被动探测攻击目标分析数据网络特征可以得出攻击目标的操作系统类型重要信息,进而得出与之相关的系统漏洞,为入侵和攻击提供重要依据。

    By analyzing the networking character values actively and passively, attacker can get a lot of information about target host, such as the type of operating system.

    youdao

  • 基于主动被动探测攻击目标分析数据网络特征可以得出攻击目标的操作系统类型重要信息,进而得出与之相关的系统漏洞,为入侵和攻击提供重要依据。

    By analyzing the networking character values actively and passively, attacker can get a lot of information about target host, such as the type of operating system.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定