The aim of the paper is to reply the theory basis for exploiting software about these problems.
该研究的主要目的是通过理论分析为开发此类问题软件提供分析借鉴依据。
Debugger is an important tool to exploit software and useful to decrease the time of exploiting software.
调试器是软件开发的重要工具,它有利于减少应用软件的开发时间。
In fact, virtual reality is exploiting software and hardware of the computer to generate a simulation of an environment, such as an easeful classroom, a breathtaking action and so on.
实际上,虚拟现实就是利用计算机的软件和硬件去产生一种境界的仿真,如仿真一个学习场所,一次惊险的行为等等。
Malicious software often infects a corporate network by exploiting security holes in web browsers to infiltrate a PC when its user visits a dodgy website.
恶意软件经常通过嗅探网络浏览器的安全漏洞来感染公司网络,当用户访问隐藏的网页时,所用电脑会感染病毒。
Security experts say Stuxnet attacked the software in specialized industrial control equipment made by Siemens by exploiting a previously unknown hole in the Windows operating system.
安全专家称,该病毒通过利用Windows操作系统以前的未知漏洞专门袭击西门子控制设备。
The bigger risk now is from "drive-by" downloads – malware (malicious software) that will try to infect Windows machines that visit a particular website by exploiting vulnerabilities in the browser.
更大的威胁在于“强迫”下载——恶意软件能够感染Windows操作系统的电脑,利用浏览器弱点链接到特定的网站。
Finally, software design and implementation of the test system is completed in the exploiting environment.
最后结合系统完成在开发环境下测试系统软件的设计与实现。
The feasibility and the necessity of the state overhaul are expounded from the aspects of system forming, key number choosing and data bank software exploiting.
从系统组成、关键数字选择和开发数据库软件的技术现实性方面阐述了状态检修的可行性与必要性。
This paper aims at exploiting a graphic control strategy configuration software, in order to create required control strategy of controller.
本文的目标是开发一个图形化控制策略组态软件,以生成控制器所需要的完成控制功能的软件。
This paper introduces the software engineering based UML and the method of exploiting object oriented GIS software supported by UML.
本文介绍了基于UML的软件工程,以及将UML用于面向对象的GIS基础软件开发的方法。
Based on the analysis of a perfect security vulnerability collection module, this article presents that exploiting a new software-security vulnerability auto-collection software is necessary.
本文在对一种完善的安全漏洞收集模型分析的基础上,指出了开发一种新的软件——安全漏洞自动收集软件的必要性。
Then the author explain that the necessary and feasibility of exploiting a set of GPS data processing software, which has independence knowledge property.
其后提出了研发一套具有自主知识产权的科研GPS数据处理软件的必要性和可行性。
Finally introduced including the main control console, the ballast work interface operation through the operating instructions of some pumps and valve which used during exploiting the software.
最后通过对软件开发过程中所用到的一些泵、阀等的使用说明来介绍包括主控制台、压载作业在内的界面操作。
To address these problems, we have started several activities that aim at exploiting the potential of open-source software for Web accessibility.
为了解决这些问题,我们开展了一些活动,目的是利用网络访问的开源软件的潜能。
To address these problems, we have started several activities that aim at exploiting the potential of open-source software for Web accessibility.
为了解决这些问题,我们开展了一些活动,目的是利用网络访问的开源软件的潜能。
应用推荐