You may optionally reboot the server and perform another security scan to see if you were able to clean up all startup scripts and infected binaries.
你可以选择重新启动服务器,并执行其他安全扫描,看看你能清理受感染的所有启动脚本和二进制文件。
Analyzes the principles of network security scan, categories the techniques used in a scan process, presents the concept and protocols each technique derives from.
分析了网络安全扫描的原理,对扫描中使用的主要技术进行了分类,并阐述了每种技术的原理及协议特性。
Then, the security scan technologies based on host and network were further researched, and the contrast of these two technologies and then introduces the popular scanner were analyzed.
然后深入研究了基于网络的安全扫描与基于主机的安全扫描两种技术,并分析了两种技术的对比,对两种技术中流行的安全扫描工具进行了研究。
Providing users with an on demand scan capability could help your company meet its security strategy.
向用户提供按需扫描功能可以帮助您的公司达到其安全策略的要求。
The administrator might send scan reports to users, and then push fixes to them to plug security holes.
管理员可能会向用户发送扫描报告,然后向这些用户提供修补程序以修补安全漏洞。
Anyone taking the test has to get a palm scan and digital signature for security measures before taking their seat and putting on a set of headphones.
出于安全考虑,每位考生在入座戴上耳机前都要进行手掌扫描和数字签名。
Additional steps can be added to the build and release process in build Forge to scan the build for security vulnerabilities and verify code quality.
可以向BuildForge中的构建还有发布过程,添加额外的步骤以浏览构建中的安全性缺陷并确保代码的质量。
Some analyze code for security problems for Web applications, and others scan code for dependency problems.
一些工具就Web应用程序的安全问题分析代码,而其他的为相关性问题扫描代码。
NetQin delivers mobile security services, including antivirus, anti-spam, privacy protection, data backup and restoration, and online virus scan, to 55 million users in more than 200 countries.
网秦提供移动安全服务,包括防病毒、防垃圾短信、隐私保护、数据备份恢复和在线病毒扫描等,目前在200多个国家有5500万用户。
It can also be used to scan the phone for security issues even if the phone is turned off.
如果电话关掉了,这项技术也可用来扫描发现手机的安全问题。
USB Virus Scan can also help you increase the security of your USB flash drive by preventing any other users to write data on them, including malicious apps.
US B病毒扫描还可以帮助您阻止任何其他用户写上的数据,包括恶意应用程序增加你的USB闪存驱动器的安全性。
To start off with, you should always run a web application security test scan against a test website.
你通常要做的是首先对要测试的站点进行web应用安全测试扫描。
Check here. you're in safe mode now, so run a full scan of your PC at maximum security levels include the option to scan within compressed files, for example.
现在,你出于安全模式,那么可以对计算机按最大安全级别(例如包括对压缩文件)进行全面扫描。
Coverity have been running a project called Scan for two years with funding provided by the Department of Homeland Security in line with its own objectives to harden open source apps.
Coverity最近两年一直在运作一个叫Scan的项目,此项目主要的资助来自于国土安全部,目的是优化开源软件程序。
To get rid of security threats, click here for a Malware Cleaner scan.
要消除安全威胁,按此清洁扫描恶意软件。
Others seek security and convenience can use watch camera to scan.
也有的寻求安全和便利就可以运用手表镜头来扫描。
Traditional security programs scan your hard drive, searching for specific threats.
传统的平安软件扫描您的硬盘驱动器,搜查特定的威吓。
Security problems and scan theory of CGI are described.
叙述了CGI的安全性及CGI漏洞扫描的原理。
Network security leak scan and vulnerability analysis are the base of system security evaluation and the essential components of Information security system.
网络安全漏洞扫描与脆弱性分析是进行系统安全评估的基础和信息安全保障体系中的必要组成部分。
As far as program preferences go, you can choose another UI language, send USB Security Utilities to the system tray area, and choose the scan report saving name.
至于节目的喜好去,你可以选择另一种UI语言,送usb安全实用程序到系统托盘区,并选择扫描节省报告名称。
Network security assessment is a complex system engineering. Most of current security evaluation tools are only used to scan and detect the security vulnerabilities of network system.
网络安全评价是一复杂的系统工程,现有的安全评估工具大都只是用于对网络系统安全漏洞进行扫描、检测。
Every week I do a full system scan with Norton Internet Security Professional.
每个星期我完全与诺顿网络安全扫描系统专业。
For example, the Symantec engineers improved the security of the products with the Proactive Threat Scan feature.
例如,赛门铁克公司的工程师改进了与主动威胁扫描功能的产品的安全性。
Security professionals are drowning in log files, vulnerability scan reports, alerts, reports, and more, but the data is not actionable.
目前,安全专业人士正被淹没在日志文件、漏洞扫描、各种提醒、各类报 告等数据的海洋中,但这些数据并非不可操控的。
You may not probe, scan or test the vulnerability of the Site or any network connected to the Site, nor breach the security or authentication measures on the Site or any network connected to the Site.
您不可以探查、扫描或测试网站或连接到网站的任何网络的漏洞,也不可以违反网站或连接到网站的任何网络上的安全性或身份验证措施。
Scan and assess the overall security posture of devices as they attempt to log onto your network.
扫描和评估,整体安全的姿态装置,因为他们试图登录到您的网络。
In addition, it also comes bundled with a few other, useful security tools, which can be used to scan, disinfect and clean the contents of a corrupted Flash drive.
此外,它还配备了一些其他的,有用的安全工具,它可以用来扫描,消毒和清洁的内容损坏的闪存。
The use of unique physical characteristics, such as fingerprints, voice patterns, or retinal scan, to authenticate a user; providing security for workstations or information stored in hard drive.
使用独特的物理特征,例如指纹、声音模式,或视网膜扫描来鉴别一个用户,为工作站或存储子硬盘的信息提供安全保证。
5 mobile phone often view the task manager, check whether there is malicious programs running in the background, and regularly use mobile phone security software to scan the mobile phone system.
经常查看手机任务管理器,检查是否有恶意程序在后台运行,并定期使用手机安全软件扫描手机系统。
5 mobile phone often view the task manager, check whether there is malicious programs running in the background, and regularly use mobile phone security software to scan the mobile phone system.
经常查看手机任务管理器,检查是否有恶意程序在后台运行,并定期使用手机安全软件扫描手机系统。
应用推荐