The feasibility and the necessity of the state overhaul are expounded from the aspects of system forming, key number choosing and data bank software exploiting.
从系统组成、关键数字选择和开发数据库软件的技术现实性方面阐述了状态检修的可行性与必要性。
Malicious software often infects a corporate network by exploiting security holes in web browsers to infiltrate a PC when its user visits a dodgy website.
恶意软件经常通过嗅探网络浏览器的安全漏洞来感染公司网络,当用户访问隐藏的网页时,所用电脑会感染病毒。
Security experts say Stuxnet attacked the software in specialized industrial control equipment made by Siemens by exploiting a previously unknown hole in the Windows operating system.
安全专家称,该病毒通过利用Windows操作系统以前的未知漏洞专门袭击西门子控制设备。
应用推荐