意味着您的站点是容易受攻击的。
在房子中,易受攻击的点是门和窗户。
In a house, the vulnerable points are the doors and Windows.
当这位妇女易受攻击的时候,他占有了她。
无论它的传输加密的多好,设备本身存有易受攻击的漏洞。
No matter how well its transmissions are encrypted, the device itself remains vulnerable to being hacked.
她忽然想起了杰克最易受攻击的位置了,不是脊柱。
Then she remembers his most vulnerable spot is not the base of his spine.
请明白华丽的伪装总是对那些年轻与易受攻击的人起作用。
Be aware that these are dressed up to attract the young and vulnerable.
紧急情报研究员泰勒·克林格声称工程师都是易受攻击的对象。
Researcher Tyler Klinger of Critical Intelligence claims engineers are vulnerable to such attacks.
脸部:露出来的最易受攻击的部位就是脖子了。他们露出脖子说明他们在好好说话。
Faces: the only open vulnerable point is their neck, which is open because they're, well, speaking to each other.
但这还没有完。记住,在易受攻击的系统上的任何加密材料均可能受到侵害。
But this is not all - keep in mind that ANY cryptographic material created on vulnerable systems can be compromised.
研究组已向ISP们提交了研究报告,寄希望于他们能够采取有效措施来保护易受攻击的用户们。
The researchers have provided ISPs with their findings in the hope that they will do something to protect vulnerable customers.
他们声明能够成功操纵使用者输入到达易受攻击的缓冲区从而造成安全性破坏的可能性已非常小了。
They declared the likelihood was very low that user input could be successfully manipulated to reach a vulnerable buffer in such a way as to cause a security violation.
当数据在易受攻击的环境中流动时,电话和手持设备的许多可用操作系统只能提供很少的甚至无安全性。
When data is flowing through a vulnerable environment, many of the available operating systems for phones and handheld devices offer little or no security.
然而,当攻击变得更复杂,攻击者们经常寻求易受攻击的操作系统服务并且已经同意了应用。
However, as attacks become more sophisticated, attackers often seek vulnerable operating system services and already approved applications.
唯一令人吃惊的是意大利教庭在其被定罪5年后仍认为把他放在这样一个显眼而易受攻击的位置非常合适。
The only surprising thing was that Italy’s bishops had seen fit to keep him on in such a high-profile and vulnerable position for five full years after his conviction.
适当的防火遮盖物用于保护复杂和易受攻击的机械和设备的零件应远离溅火星处和其他火源之处。
Suitable fire resistant covers to be used to protect intricate and vulnerable items of machinery and equipment from flying sparks or other potential sources of fire.
朗格内尔也是对攻击催生的工业战的新形式表示担忧的专家之一,这种形式也使美国面临易受攻击的高度危险。
Mr. Langner is among the experts who expressed fear that the attack had legitimized a new form of industrial warfare, one to which the United States is also highly vulnerable.
而如果成功,则可以在东部营造一个双层的北约:少数国家与美国有着直接的关系,而易受攻击的残余部分没有。
If it succeeds, it could create a two-tier NATO in the east: a few countries with a direct relationship with America, and a vulnerable rump without.
上传的文件是Web应用程序最易受攻击的地方之一,因此在接受存储它们之前一定要进行验证。
Uploaded files are an important attack vector for Web applications, so it's important to validate all such uploads before you accept them for storage.
大约二百万年以前,我们虚弱而且易受攻击的祖先居住着山洞里,他们面临大自然的严峻考验,很容易生病。
About 2 million years ago, our feeble and bulnerable (susceptable) ancestors dwelled in the cavities and they were exposed to grim hardships in nature so as to be prone to diseases.
人们担忧,船东们可能开始将易受攻击的船舶转道绕行好望角,而不再冒与日俱增的风险,经行苏伊士运河。
There are fears ship owners could start diverting vulnerable ships round the Cape of Good Hope rather than brave the increasingly risky route through Suez.
对此,苹果公司上周五发布了升级软件iPhoneOS3.0.1,这一更新旨在修正手机易受攻击的问题。
In response, Apple on Friday made available a software upgrade, iPhone OS 3.0.1, designed to fix the vulnerability.
视频还说道,奥巴马是“一个易受攻击的人,因为他没有能力像他承诺的一样停止战争,相反,他将把战争拖到最大可能的程度”。
Obama was "a vulnerable man who will not be able to stop the war, as he promised, but instead he will drag it to the maximum possible extent," the message said.
本研究的优点有三个:一,我们的方法以频率域的方式嵌入浮水印,产生不扩展的分享影像,降低了像素值易受攻击的影响。
There are three advantages of our study. 1. We embedded the watermark by frequency domain and created unexpanded shares, which reduced the impact of pixel modification effectively.
这些代码一但被植入,就会不知不觉地在普通用户的电脑上生成一张自动的“病毒网络”---首先就是易受攻击的“脸谱”用户。
Once embedded, the code would have created a “botnet” of millions of zombie computers capable of launching all manner of scams on innocent folk—starting with gullible Facebook users themselves.
美国在最容易受攻击的国家中排名第九,平均每48次浏览就有一次遭到攻击的风险;英国排名三十,它受攻击的概率是1/63。
The U.S. ranked ninth with one in every 48 Web surfers at risk, while the U.K. was 30th with a rate of one in 63.
人力资源十分昂贵,而且与大型采购项目——例如英国将来的航母项目,这一项目受到严格规定的合同保护——相比是更易受攻击的目标。
Manpower is both expensive and a softer target than big procurement programmes, such as Britain's future aircraft-carriers, which are protected by tightly drawn contracts.
ReliableSoft wareTechnologies的专家侦测了潜在的易受攻击的程序码,并且未能掌握利用任何情况的方法。
Experts at Reliable Software Technologies examined the potentially vulnerable code and were unable to learn of a way to exploit any of the conditions.
美国研究人员最近发起了一项研究,要找出互联网上易受攻击的网络设备.他们在扫描过程中发现了近21000台路由器、网络摄像头和VoIP(网络电话)产品。
Researchers scanning the internet for vulnerable embedded devices have found nearly 21, 000 routers, webcams and VoIP products open to remote attack.
美国研究人员最近发起了一项研究,要找出互联网上易受攻击的网络设备.他们在扫描过程中发现了近21000台路由器、网络摄像头和VoIP(网络电话)产品。
Researchers scanning the internet for vulnerable embedded devices have found nearly 21, 000 routers, webcams and VoIP products open to remote attack.
应用推荐