...外,使用语义分析 器还可以查找出应用程序中存在的密码硬编码(Hardcoded password)、系统信息泄露(System Information Leak)、弱加密 (Weak Encryption)和弱加密散列(Weak Cryptographic Hash) 等问题,这些问题可反映出应用程序是否满足《基本要求》...
基于12个网页-相关网页
Prior to each test, the system testers configured several product parameters to allow the memory leak analysis information to be collected during testing.
在每个测试之前,系统测试人员配置许多产品参数来允许在测试过程中收集内存泄漏分析信息。
Network security leak scan and vulnerability analysis are the base of system security evaluation and the essential components of Information security system.
网络安全漏洞扫描与脆弱性分析是进行系统安全评估的基础和信息安全保障体系中的必要组成部分。
Unfortunately, many people fear the use of the Internet to pay for the payment of knowing that their personal information will leak, but a matter of fact, this is a very safe system.
不幸地,许多人民恐惧使用互联网为付付款,相信他们的个人信息将泄漏,但是实际上,这是一个非常安全系统。
应用推荐