• Another is to find ways to ensure that software developers produce code with fewer flaws in it so that hackers have fewer security holes to exploit.

    另一种找到确保软件开发人员编写代码缺陷的方法,这样黑客更少的安全漏洞可以利用

    youdao

  • You should also consider the following potential security holes.

    应当考虑以下潜在的安全漏洞

    youdao

  • You can be certain that potential intruders learn of those security holes quickly.

    可以肯定潜在入侵者会很快了解那些安全性漏洞

    youdao

  • Usually hackers or computer virus intrude a computer system by security holes.

    通常计算机黑客电脑病毒利用安全漏洞入侵计算机系统

    youdao

  • Security holes are often rooted in a program that isn't robust in the face of unexpected data.

    安全漏洞经常植根于意料之外数据面前表现得不够健壮程序

    youdao

  • Another problem is that the default configurations leave security holes that hackers can exploit.

    另一个问题默认配置存在一些安全漏洞,很容易被黑客用来实施攻击。

    youdao

  • The main way rogue programs get into a system is by exploiting security holes in the operating system.

    恶意程序进入系统主要方法利用操作系统的安全性漏洞

    youdao

  • The administrator might send scan reports to users, and then push fixes to them to plug security holes.

    管理员可能会用户发送扫描报告然后这些用户提供修补程序修补安全漏洞

    youdao

  • The authors blame the separation of task modules in SOAP processing frameworks for such security holes.

    文章的几位作者抱怨造成这种安全漏洞原因是SOAP处理框架任务模块拆分

    youdao

  • Therefore you will need to keep up with cumulative fixes if you want all known security holes to be closed.

    因此如果想要修复所有已知安全漏洞,则需要保持累积修复最新。

    youdao

  • The good news is many common programming errors that result in security holes simply aren't possible in PHP.

    值得庆幸导致安全漏洞很多编程错误PHP可能存在

    youdao

  • Enabling at least one of them is a useful tool for finding programming errors that may result in security holes.

    至少启用它们中的一个,可以有效地发现可能导致安全漏洞编程错误

    youdao

  • In this article, I'll detail many of the common PHP programming mistakes that can result in security holes.

    篇文章里,我会详细阐述一些经常导致安全漏洞的PHP编程错误

    youdao

  • You obviously need to make sure you don't open any potential security holes in adding an appliance to your server.

    显然需要确保服务器添加工具时不会打开任何潜在的安全性漏洞

    youdao

  • The more complicated computer operating systems get, the more riddled they are with unnoticed security holes.

    计算机系统复杂千疮百孔安全漏洞就越多。

    youdao

  • Applications that did not leverage application server security were typically found to have serious security holes.

    利用应用服务器安全性的应用程序中,常常发现严重的安全性漏洞。

    youdao

  • Entity resolution (including the reading of the external DTD subset) opens a number of potential security holes in XML.

    实体解析(包括读取外部dtd子集)打开了XML中的一些潜在安全漏洞

    youdao

  • As the system changes over time some level of security should keep up, and even improve if new security holes are discovered.

    因为随着时间推移系统会更改,所以,如果发现新的安全漏洞保持甚至提高安全级别

    youdao

  • These variables don't really require initialization in your scripts, so it's easy to write scripts with gaping security holes.

    因为脚本并不真正需要初始化这些变量所以容易编写带有安全漏洞的脚本。

    youdao

  • An example of this is security holes in a Web page's code that can allow an online banking client to see another client's data.

    这样例子之一就是web页面代码中的安全漏洞可以允许一个在线银行客户看到其它客户的数据。

    youdao

  • Popular software that runs on millions of machines all over the world contains security holes, most of which are critical.

    运行全世界数百万机器的流行软件安全漏洞,并且大多数危险

    youdao

  • Testing the correctness of the system configuration and security holes, and prompts the administrator to fix vulnerabilities.

    检测系统配置正确性安全漏洞提示管理员修补漏洞

    youdao

  • Developers need to understand security threats, the tools provided to counter them, and how to avoid self-inflicted security holes.

    开发人员需要了解安全威胁针对安全威胁所提供工具以及如何避免自己造成的安全漏洞

    youdao

  • Some argue that clouds are more secure than many private networks, while others consider that cloud computing may open more security holes.

    有些认为许多私有网络安全一些人则认为计算可能敞开更多安全漏洞。

    youdao

  • Vulnerability scanning helps to identify any potential security holes in either the operating system or in the configuration of Lotus Domino.

    漏洞攻击扫描有助于识别操作系统LotusDomino配置潜在安全漏洞

    youdao

  • It added that there would be a heavy focus on creating a system that would not require users to worry about security holes and virus warnings.

    博客上写道,到时大家一定会非常关注这样一款无需担心安全漏洞病毒操作系统

    youdao

  • If you build a model of your system that is useful for predicting latency of user requests, it probably won't help you discover security holes.

    如果建立模型对于预测用户请求延时非常有效,不一定发现安全漏洞。

    youdao

  • The good news however is that Microsoft says it's a lot more stable than the beta version with lots of bugs fixed and security holes plugged.

    微软这个版本beta版稳定很多漏洞也修复了。

    youdao

  • The good news however is that Microsoft says it's a lot more stable than the beta version with lots of bugs fixed and security holes plugged.

    微软这个版本beta版稳定很多漏洞也修复了。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定