不幸的是,将它称之为安全性漏洞有些轻描淡写。
To call this a security hole is to understate the point woefully.
一些人认为这是一个安全性漏洞(作者并不认同)。
Some consider this to be a security vulnerability (the author is not among them).
可以肯定,潜在的入侵者会很快了解那些安全性漏洞。
You can be certain that potential intruders learn of those security holes quickly.
有时,一些相当严重的安全性漏洞是在无意中造成的。
Sometimes, fairly serious security leaks can be introduced by accident.
恶意的程序进入系统的主要方法是利用操作系统的安全性漏洞。
The main way rogue programs get into a system is by exploiting security holes in the operating system.
显然,您需要确保在向服务器添加工具时不会打开任何潜在的安全性漏洞。
You obviously need to make sure you don't open any potential security holes in adding an appliance to your server.
漏洞利用(exloit)是一个揭示或利用安全性漏洞的程序。
An exploit is a program that demonstrates or exploits the vulnerability.
这是一个安全性漏洞,因为入侵者可能可以伪装成消息传递引擎并截获总线通信流。
This is a security hole because an intruder could potentially pretend to be a messaging engine and compromise the bus traffic.
事实证明几乎所有软件的安全性漏洞都是由相对较小的一组常见错误引起的。
It turns out that nearly all software vulnerabilities are caused by a relatively small set of common mistakes.
在不利用应用服务器安全性的应用程序中,常常会发现很严重的安全性漏洞。
Applications that did not leverage application server security were typically found to have serious security holes.
如果我们发布了安全性漏洞补丁的话,你应当尽快进行升级以保证其不受攻击。
In case we announce a security vulnerability patch release, you should upgrade your installation as fast as possible to ensure that it is protected from all known vulnerabilities.
本文首先分析了搜索引擎所产生的安全性漏洞并针对这些漏洞提出了技术对策。
This paper analyzes security bugs with the search engine and puts forward corresponding technical countermeasures.
本文首先分析了搜索引擎所产生的安全性漏洞并针对这些漏洞提出了技术对策。
The thesis discusses security bugs of Internet OS and Internet application, and gives security measures to these bugs.
提早在开发周期中评估威胁,可增加在侦测到安全性漏洞时减少可能损害的机会。
Evaluating threats early in the development cycle gives you the opportunity to mitigate potential damage wherever a vulnerability is detected.
虽然对其的回答有一点困难,但是肯定的是工具可以找出确实邪恶的安全性漏洞、复杂的代码,和性能瓶颈。
While the answer to that one is a bit intractable, it's certainly the case that tools can find security holes, complex code, and performance bottlenecks that are evil indeed.
安全性漏洞(vulnerability)就是一个缺陷,它使程序有可能无法满足其安全性需求。
A vulnerability is a flaw that makes it possible for a program to fail to meet its security requirements.
即使以后发现这些组件的安全性漏洞,也可以迅速修复,并将修正后的组件应用到所有使用该组件的应用程序中。
Even if vulnerabilities are found later, they can be fixed once and the fix applies to every application that USES the component.
可编程逻辑器件安全性漏洞检测平台正是为了检测出逻辑芯片内可能存在的攻击后门和设计缺陷而研制的,从而确保电子设备中信息安全可靠。
This paper is aimed at detecting the backdoor attacks and design defects which might be embedded in logic chips, so as to insure the salty and creditability of the information in electronic equipment.
但是有一个合理的“反诉”:由于Windows用户比较多,所以对Windows的攻击就可能比较多,这意味着更有可能发现Windows的安全性漏洞。
But there's a reasonable counter-claim: since there are more Windows users, perhaps Windows is attacked more often, meaning that Windows vulnerabilities are more likely to be found.
解决方案还提供漏洞评估和配置审计功能,让 DBA 可以直接评估数据库的安全性。
The solution also provides vulnerability assessment and configuration-auditing capabilities that enable DBAs to directly evaluate the security of their databases.
利益干系人更愿意在功能上花费更多,而不是安全性;如果出现了安全漏洞,开发人员也很少被惩罚。
Often the stakeholders would like to spend more on functionality than security and then if there is a security breach then the developer is seldom punished.
这不仅加速了复杂程序的开发,同时也减少了你代码中的安全漏洞从而加强了PHP的安全性。
This not only speeds up the development of rich applications, but it also tightens up PHP security by reducing the risk of security holes in your coding.
最终看来,答案是,公开漏洞可以带来更好的安全性。
Ultimately, the answer is that public disclosure results in better security.
并且,尝试实现自己的安全性也颇具风险,因为任何微小的疏忽都会导致严重的安全漏洞。
It's also a risky area to try to implement on your own, because even a minor and obscure oversight can lead to serious vulnerabilities.
使用RFID intheSupplyChain引领您的组织走向未来,其中解释了业务流程、操作和实现问题、风险、漏洞,以及安全性和隐私。
Bring your organization into the future with RFID in the Supply Chain, which explains business processes, operational and implementation problems, risks, vulnerabilities, and security and privacy.
医疗设备像其它计算机系统一样,同样很容易出现安全漏洞,从而影响到设备的安全性和有效性。
Medical devices, like other computer systems, are also vulnerable to security breaches, which affect the security and effectiveness of the device.
计算机系统安全漏洞的研究以及漏洞库的建设,对于提高系统安全性、减少安全事件发生具有重要意义。
The research on computer vulnerabilities and the building of the vulnerability database are significant in improving system's security and reducing computer security incidents.
计算机系统安全漏洞的研究以及漏洞库的建设,对于提高系统安全性,减少安全事件发生具有重要意义。
The research on computer vulnerabilities and the building of the vulnerability database are significant for improving system's security and reducing computer security incidents.
无疑,在这个网络化的信息时代,这些漏洞使得缓冲区溢出攻击极易传播和蔓延,极大地威胁了系统的安全性。
Undoubtedly, in this networked information era, these bugs make the Buffer Overflow Attack very easy propagate, it threatens the systematic security greatly.
无疑,在这个网络化的信息时代,这些漏洞使得缓冲区溢出攻击极易传播和蔓延,极大地威胁了系统的安全性。
Undoubtedly, in this networked information era, these bugs make the Buffer Overflow Attack very easy propagate, it threatens the systematic security greatly.
应用推荐