另外操作系统漏洞导致的浏览器问题也不在该计划范围之内。
Bugs that take advantage of vulnerabilities in the base operating system of the computer running the Web browser will also be ineligible.
部署工控漏洞扫描系统,及时发现工控系统漏洞。
Deployment of industrial vulnerability scanning system, industrial system vulnerabilities found in a timely manner.
减少漏洞:通过离线安装补丁,可以极大减少系统漏洞。
Reduce flaw: Install a patch through leaving a line, OK and great reduce systematic flaw.
了解病毒和系统漏洞的最新动态,堵上系统存在的漏洞。
Understand the newest trends of virus and systematic flaw, block up on the flaw that the system exists.
典型的缺陷包括功能缺失、差劲的运行效率、以及系统漏洞。
Typical shortcomings include missing functionality, poor runtime performance, and bugs.
此外,它还呼吁银行系统以外的商家检查系统漏洞,升级验钞机。
In addition, it called on non-banking businesses to check for loopholes and upgrade detectors.
问题是微软的操作系统漏洞很多,经常需要更新,不管你装的是否盗版。
The problem is Microsoft's operating system has many holes, which should be updated from time to time, whether your operating system is piratic or not.
而对目标系统漏洞信息的获取,目前主要是通过网络漏洞扫描工具实现的。
Then it studies the network vulnerability scanning technology, witch includes port scanning, vulnerability scanning and dictionary attacking.
“目的是让攻击者取得控制,”7月份的文章在讲述多种演练可以发现系统漏洞的时候说。
"Goal is for attacker to gain control," the July paper said in describing the many kinds of maneuvers that could exploit system holes.
电力生产控制区二次系统漏洞修补属于安全防护工作中必不可少的重要组成部分。
Vulnerability repair of electric power production and control area secondary system is a necessary and important part of security protection work.
在这种情况下,被攻击者截获的信息,它可以用来显示在计算机的安全系统漏洞。
In case it this information is intercepted by an attacker, it can be used to reveal vulnerabilities in the computer's security system.
我有很强的逻辑思维能力,这点使我擅长业务分析,也能很快的发现系统漏洞并解决。
I have a strong logical thinking ability, it gives me a good business analysis, but also be able to quickly discover and address vulnerabilities.
消极防御只能被动挨打,单纯依靠封堵现有的系统漏洞不能从根本上解决信息安全问题。
Negative defense will only lead to be attacked and only depending on sealing off the existed system leaks can't solve information security problems.
蠕虫的定义如下,蠕虫是一个自包含软件组件,可以自动执行可识别和攻击目标系统漏洞的探测操作。
By definition, a worm is a self-contained software component that automatically performs probe actions designed to identify and exploit vulnerabilities on a targeted system.
CVE 体系结构的建立对理解、避免、检测和消除计算机系统漏洞具有理论和实践意义。
This CVE structure is valuable for the understanding, avoiding, detecting and removing of vulnerabilities and exposures.
新的安全特性增加了更深层次的管理、用户治理和审计,从而减少系统漏洞并大大提高开发人员的效率。
New security capabilities add deeper levels of management, user governance, and auditing to decrease system vulnerabilities, while maximizing developer productivity.
首先,要对系统漏洞、潜在的攻击者及攻击目的、可能导致的后果等进行安全风险分析评估。
First of all, it is necessary to analyze and evaluate the security risk of the system vulnerabilities, the potential attackers and the purpose of the attack, and the possible consequences.
由于网络技术的飞速发展,网络规模迅猛增长和计算机系统日益复杂,导致新的系统漏洞层出不穷。
Along with the rapid development of network technology, the more complication of computer and the more enlarged size of Internet, the more leaks may existed in new system.
但另一方面,但没有什么灵丹妙药可以绕过DPI。通常用户只能通过“寻找系统漏洞”的方式来暂时的逃避它。
But on the other hand, Sennhauser says there's no magic bullet for getting around DPI as users can usually only temporarily elude it by "finding flaws in their system."
然后,选择作为攻击目标利用系统漏洞、各种攻击手段发现突破口,获取超级用户权限、提升用户权限。
Then, choose target system vulnerability, all kinds of attacks by means of breakthrough, obtain found super user permissions, improve user permissions.
本文在深入研究系统漏洞和网络攻击模式的基础上,提出与实现了一种面向网络攻击的智能决策支持系统。
This article further investigates system vulnerability and network attack patterns, designs and implements a network attack intelligent decision support systems (NAIDSS).
智慧城市中的系统在建设过程中可能存在以下的系统安全隐患:边信道攻击、系统漏洞、硬件故障、程序缺陷。
Smart city system in the construction process may be the following system security risks: side channel attacks, system vulnerabilities, hardware failures, program defects.
一次完整的攻击过程通常会包括一系列单独的攻击行为,每个攻击行为是对某个系统漏洞(脆弱性)的一次利用。
A complete attack process usually includes a series of attack actions, and every attack action is a use of system vulnerability.
如果视窗系统漏洞剥削WindowsServer 2008,然而,这将危及所有的虚拟机运行在它在一杆。
If a Windows vulnerability exploited Windows Server 2008, however, that would jeopardize all the VMs that are running on it in one shot.
本文首先研究了智能决策支持系统的体系结构、集成方式和知识库设计,然后对系统漏洞和网络攻击模式进行了深入探讨。
This article studies the system structure, the integrated way and the design of IDSS knowledge base at first, and then deeply discusses the system vulnerability and network attack modeling.
即便我们可以采用不同的测量方式,例如代码行数、类的数量、函数指针的数量、系统漏洞的数量,等等,软件还是缺乏一种定义良好的原子结构。
Software also lacks a well defined atomic unit of work — even though we can apply various measures, such as lines-of-code, number of classes, number of function points, number of bugs, etc.
星期六一些准备购买墨尔本电影节入场券的影迷们被告知,抗议者们利用一个系统漏洞提交了虚假的购票需求,导致了电影节入场券售罄的假象。
Filmgoers trying to buy tickets for the Melbourne film festival on Saturday were informed that the event was sold out after protestors exploited a loophole to make phony ticket purchases.
当然,Linux也较少受到病毒和恶意软件的攻击,而且其系统漏洞往往都能被即时发现,开发者和用户所组成的快速军团也能迅速地修复这些漏洞。
Of course, Linux also gets attacked less frequently by viruses and malware, and vulnerabilities tend be found and fixed more quickly by its legions of developers and users.
基于主动、被动探测攻击目标并分析其数据报的网络特征值,可以得出攻击目标的操作系统类型等重要信息,进而得出与之相关的系统漏洞,为入侵和攻击提供重要依据。
By analyzing the networking character values actively and passively, attacker can get a lot of information about target host, such as the type of operating system.
基于主动、被动探测攻击目标并分析其数据报的网络特征值,可以得出攻击目标的操作系统类型等重要信息,进而得出与之相关的系统漏洞,为入侵和攻击提供重要依据。
By analyzing the networking character values actively and passively, attacker can get a lot of information about target host, such as the type of operating system.
应用推荐