我们在屋顶漏洞下放了一个水桶接水滴。
We put a bucket under the hole in the roof to catch the drips.
我认为,在我们一方,我们多年来遵循的原则没有任何重大漏洞。
I do not see any major breach from our side, the principles we stayed for years.
在发布版本之前识别测试漏洞,填充并找到这些错误,成本会低得多。
It's much cheaper to identify testing gaps, fill them, and find the bugs before release.
在您执行漏洞评估之前,一定要确立一条安全策略。
Always establish a security policy before you perform a vulnerability assessment.
在安全领域,有一些工具被用于执行所谓的漏洞测试,每个工具提供不同的特性,各具优势。
In the security field, several tools are designed to do what's known as vulnerability testing, each offering different features and benefits.
要消除这种漏洞,可以执行输入验证,或者确保用户所提交的数据总是在显示之前已被html转义。
To get rid of this vulnerability, you can either perform input validation or ensure that user-submitted data is always HTML-escaped before displaying it.
在本文中,我将重点介绍这些可利用来影响SLA中正常运行时间有效性的漏洞。
For this article, I'll highlight those exploitable vulnerabilities that would impact the uptime availability in the SLA.
因为在脚本中并不真正需要初始化这些变量,所以很容易编写出带有安全漏洞的脚本。
These variables don't really require initialization in your scripts, so it's easy to write scripts with gaping security holes.
微软在发布安全补丁的时候,该补丁一般都是针对一个证据充分的漏洞的。
When Microsoft releases a security patch, the patch is designed to address a well-documented vulnerability.
在未来几年,该法律将一劳永逸的完全堵上这个甜甜圈漏洞。
And in the coming years, this law will close the doughnut hole completely once and for all.
这也是在虚拟世界的安全漏洞中的一个。
在现有的条例中,系统的阐述了科学实验的“路线图”,讨论了其中的缺点、错误和漏洞。
Formulate a "road map" of scientific experimentation to address shortcomings, inaccuracies and gaps in existing doctrine.
实际上,在默克尔身上就暴露出了瓦尔斯·特伦观点中最大的漏洞。
Indeed, Ms Merkel herself reveals the biggest flaw in Ms Wallstrom's argument.
当然这一条款也成为了在高盛教唆和协助下的希腊可以利用的漏洞。
That’s the same loophole Greece was able to exploit, in line with the rules, aided and abetted by Goldman Sachs.
不幸的是,尽管业界人士在提高代码质量方面付出了巨大的心血,漏洞还是会由于各种因素产生。
Unfortunately, bugs still get introduced despite the tremendous efforts that people in the technology industry have put into producing high-quality code.
在缓冲溢出攻击中,黑客利用了程序执行期间存储分配中的特定计算机程序漏洞。
In a buffer overflow attack, the hacker takes advantage of specific type of computer program bug that involves the allocation of storage during program execution.
关于在以科学文献和专业的知识基础上,找出了有关欺骗实践的漏洞和未经试验过的假设。
Identify gaps or untested hypotheses regarding the practice of deception in the scientific literature and professional knowledge base.
微软在昨天更新的安全警报中说,“我们正在对新出现的IE漏洞报告进行调查。”
"Microsoft is continuing its investigation of public reports of attacks against a new vulnerability in IE," the company said in a security alert updated yesterday.
如果是这样的话,在云计算的本质中必然存在某些因素让一个漏洞成为特定于云计算的漏洞。
If so, certain factors in cloud computing's nature must make a vulnerability cloud-specific.
与IPv 4类似,在漏洞被成功利用时,会受到攻击。
Like IPv4, it is subject to attacks when vulnerabilities are successfully exploited.
Coverity宣布他们发布的数据使得32个开源项目在一周内修复了超过900多个漏洞-或者说,每小时修复了5个以上的漏洞。
Coverity also claim that their data caused 32 open source projects to fix over 900 flaws within a single week -or, more than five bug fixes every hour.
这个漏洞是在WordPress的HTML安全库kses中发现。
The vulnerability was found in KSES, WordPress's HTML sanitation library.
这有助于它们在企业安全中通过狡猾的宣传漏洞逃出公司公众眼底。
That helps keep them hidden from the public eye by companies leery of publicizing breaches in corporate security.
此过程在我们的实现中引入了潜在缺陷和漏洞,并以不断增加的潜在风险的形式积累。
This process introduces latent defects and vulnerabilities into our implementations, which accumulate in the form of growing potential risk.
不幸的是,抽象是有漏洞的:例如,在我的ZIP代码验证器中,本想使用正则表达式执行检测。
Unfortunately, the abstraction is leaky: in my ZIP code validator, for example, I would have liked to use regular expressions to perform the check.
把明文密码存储在文件中是一个潜在的安全漏洞,DB 2管理员应该避免这种做法。
Storing the password in clear text in a file is a potential security exposure that the DB2 administrator should guard against.
显然,您需要确保在向服务器添加工具时不会打开任何潜在的安全性漏洞。
You obviously need to make sure you don't open any potential security holes in adding an appliance to your server.
在论文的最后阐述了我对网站建设流程的认识,分析了网络中存在的各种漏洞以及解决办法。
Have explain my understanding of website construction procedure at the end of the thesis, has analysed various kinds of loophole and solution existing in the network.
在评估漏洞之后,根据业务风险为其划分优先级。
After you assess vulnerabilities, prioritize them according to business risk.
在评估漏洞之后,根据业务风险为其划分优先级。
After you assess vulnerabilities, prioritize them according to business risk.
应用推荐