黑客进行的端口探测通常是尝试在服务器上执行恶意代码或者通过寻找易攻击的端口来控制服务器。
Port probing by hackers is usually an attempt to execute malicious code on a server or to take control of the server by looking for vulnerable ports.
指令码人员是将来的骇客,他们的知识足够对易攻击的机器执行预编码的指令码,但还没有足够的知识建立这样的指令码。
Script kiddies are would-be hackers who know enough to run a pre-coded script against a vulnerable machine, but not enough to create such a script in the first place.
除其他弱点外,城市在独自应对空气污染时而必须采取的措施存在政治上的争议,因此也很易受到攻击。
Among other weaknesses, the measures cities must employ when left to tackle dirty air on their own are politically contentious, and therefore vulnerable.
有一个是安全:此类系统易受各式各样的黑客攻击。
One is security: such systems will be vulnerable to all sorts of hacker attacks.
然后,收集到的信息可以用来分配资源和识别那些可能易受恶意的用户和程序攻击的机器。
The information harvested can then be used to allocate resources and identify machines that may be vulnerable to attack by rogue users and programs.
我们大多数人在冬天会花费很少的时间晒太阳,这方法能使我们摆脱维生素d缺乏症,使我们易受一些感染的攻击。
Most of us spend less time in the sun during the winter, and that means we can end up vitamin d-deficient, leaving us vulnerable to any number of infections.
新的研究暗示了血液中的铅含量可以用来解释为什么50多岁的女性易受高血压的攻击。
New research suggests that lead in the bloodstream might help explain the onset of high blood pressure in women in their 50s.
第一步是确定易遭到恶意攻击的关键系统资产——无形的或者有形的。
The first step is to identify critical system assets — intangible or tangible — that are vulnerable to malicious attacks.
让程序员们在阅读一个文件时测试每一个字节和每一个不变量似乎是无望的——但不这样做就会使程序易被模糊攻击。
Asking programmers to test each byte and every invariant when reading a file seems hopeless — but failing to do so leaves your programs vulnerable to fuzz.
当攻击者知道某一网站上的应用程序易受跨站点脚本编制攻击后,他就可以规划攻击。
After an application on a Web site is known to be vulnerable to cross-site scripting, an attacker can formulate an attack.
她们在心理上易受到攻击,因此无论是对于抵抗这个家伙的攻击还是事后在情绪上应对这些事都准备不足。
They were psychologically vulnerable and hence ill-equipped to either resist this fellow's predations or to deal with them emotionally after they had occurred.
对一些中国人而言,他们担心其国家无法获得能源供应,同时不断拉长的能源供应链易受到攻击。
Some Chinese, for their part, fear their country being denied access to supplies and worry about the vulnerability of its lengthening supply lines.
微软研究人员已经发明一种创建简单易记密码的方法,同时也会使系统更容易被黑客攻击。
Researchers at Microsoft have come up with a way to create easy-to-remember passwords without making a system more vulnerable to hackers.
所以期待你最喜欢的网站也添加些社交功能吧,只是就像那些创新者一样,先锋往往最易受到攻击。
So expect your favourite site to add social features, whereas many of the pioneers will end up with arrows in their backs, as innovators often do.
男性比女性更可能饮酒或吸毒,当他们抑郁的时候,或者他们变得失意、气馁、易激惹、生气且有时是攻击性的。
Men may be more likely than women to turn to alcohol or drugs when they are depressed. They also may become frustrated, discouraged, irritable, angry, and sometimes abusive.
在经受了1900年毁灭性飓风之后15年,就在易受大西洋飓风攻击的地方,加尔维斯顿再次受到猛烈打击。
Right in the line of fire for Atlantic hurricanes, Galveston was slammed again 15 years after enduring the devastating 1900 hurricane.
下面的例子可以帮助您识别易受XSS攻击的领域。
The following examples are intended to help you recognize the areas that are vulnerable to XSS attack.
易威尔企图一举攻占墓地山的努力完全失败,而对卡普山的攻击也被北军击退,只抢占到山脚下的一个据点。
The effort to storm Cemetery Hill was ultimately unsuccessful. Ewell's attacks were also repulsed at Culp's Hill, although a foothold was gained near the base of the hill.
但在今年早些时候公布的一份调查中,某些公司向英国金融服务局表示,对公用事业部门的依赖,使它们仍易受到攻击。
But in a survey earlier this year, some companies told the FSA they remained vulnerable because of their reliance on public utilities.
简单的哈希(例如有时在HTTP基本身份验证中使用的哈希)易受到回复攻击的威胁,因为攻击者可以很容易地探查到通信并能够在不知道密码的情况下回复哈希。
A simple hash, as sometimes used in HTTP Basic authentication, is subject to replay attacks because one can easily sniff the traffic and replay the hash without knowing the password.
民意测试建立了成为激进分子易攻击对象的索引,这个索引里,分数低于67分的为高危险地。
The poll establishes an index of vulnerability-to-radicalisation, in which any score below 67 indicates high risk.
Linux不像其他操作系统那样易遭受病毒攻击,而且它提供了一种远程管理的安全方法。
Linux is not subject to the same level of virus attacks as other operating systems, and it provides a secure method of remote administration.
PHP4.3.9 安装程序包仅支持CGI,而 CGI使得您的Web 浏览器易受安全性问题的影响并易受到攻击。
The PHP 4.3.9 installer package only supports CGI which makes your Web server subject to security problems and attacks.
投弹手的嫌疑犯头目是埃塞俄比亚出生的穆克塔尔·易卜拉欣(Muktar Ibrahim),他在发动攻击的数月前也去了巴基斯坦,据说曾参加过苏丹的训练营。
The bombers' alleged leader, Ethiopian-born Muktar Ibrahim, had gone to Pakistan several months before the attacks and is said to have attended a training camp in Sudan.
双辊ch - 47Chinook尤其易受到那样的攻击,就是周末在阿富汗被击落的那种直升机。
Particularly susceptible to those attacks is the twin-rotor CH-47 Chinook - the kind of copter shot down over the weekend in Afghanistan.
危险:贝利说带遥控开锁装置的汽车易受这项黑客技术的攻击——但他拒绝透露哪一类汽车。
At risk: Bailey said cars with remote electronic locks are susceptible to his hack - but refused to reveal the types of car it affects.
而根据veracode的Wysopal所说,搜索“gets ”函数——一个臭名昭著的不安全字符串操作——可以揭示很可能易受内存溢出攻击的程序。
And, searching for the function "gets" — a notoriously insecure string operation — can reveal programs that are likely vulnerable to a memory overflow, said Veracode's Wysopal.
而根据veracode的Wysopal所说,搜索“gets ”函数——一个臭名昭著的不安全字符串操作——可以揭示很可能易受内存溢出攻击的程序。
And, searching for the function "gets" — a notoriously insecure string operation — can reveal programs that are likely vulnerable to a memory overflow, said Veracode's Wysopal.
应用推荐