This limits the security provided by these passwords (because anyone with access to the source code can find out how the passwords are loaded).
这限制了由这些密码提供的安全性(因为任何访问源代码的人都可以了解到密码的载入方式)。
For the sake of security, however, I would recommend downloading the latest source code and compiling it yourself.
不过,为了安全起见,我建议您下载最新的源代码并自己编译它。
A FLOSS program's source code is available for public review, and there's been a raging controversy about how that affects security.
人们可以评审FLOSS程序的源代码,这样会如何影响安全性存在着激烈辩论。
While many people swear by it for mundane tasks like security and logging, others balk at injecting code that cannot be easily viewed in the source.
很多人一边诅咒着那些需要重复实现的任务,例如安全与日志;一方面又由于注入代码在源代码中无法清晰可见,而回避AOP。
Today, IBM announced two acquisitions: source code and application security company ounce Labs, and SPSS, a provider of predictive analytics.
IBM于今天宣布完成两笔收购:源代码及应用安全公司Ounce Labs和预测分析公司SPSS。
Significantly enhances source code security.
极大地增强源代码的安全性。
An SMS security system development scenarios, including case development source code and database files.
说明:一个短信防伪系统的开发案例,包括案例开发源程序及数据库文件。
The core content is the implementation of code security and code plagiarism detect via static analysis of source codes based on the idea of white box test.
核心内容包括了基于白箱测试的思想,通过对源代码进行静态分析,实现对代码的安全检查和对代码剽窃的自动检测。
The security patch comparison technology can effectively disclose the differences between two neighboring versions of the same source code file.
安全补丁比较技术能够有效地揭示同一程序两个相邻版本之间的差异。
Rumours about a security breach at Kaspersky resulting in source code being leaked have been going around since 2009.
关于在卡巴斯基安全造成破坏的源代码被泄露的传言,2009年以来一直在进行左右。
Permission demands are closely controlled through security policy, hosting environment, and code-source permission grants.
权限请求通过安全策略、宿主环境以及代码源权限授予进行严格的控制。
Comodo Dragon Internet browser is based on the source code of Google Chrome browser but has a number of improvements, which includes fixes some privacy and security improvements.
科莫多龙的互联网浏览器是基于谷歌浏览器的源代码,但有一些改进,其中包括修复一些隐私和安全的改善。
Low security keys are often generated by software-based CSPs and exported to a file so they can be checked into source code management systems during project development.
安全性低的密钥通常由基于软件的csp生成并导出到文件,以便项目开发期间可以将它们登记到源代码管理系统中。
Nowadays, there are many analysis technologies and methods based on the source codes which have done well to enhance the software code security.
然而大量使用的商业软件是以二进制代码形式存在的,这使得以源代码为分析对象的软件代码安全分析技术无能为力。
Source code security audit to detect loopholes in the code, can detect the C, C++, Perl, PHP and Python code errors and security vulnerabilities, network security must engage in to look at.
源代码安全审计,检测代码中的漏洞,可以 检测C, C++,Perl,PHPand Python 代码中的漏洞和安全错误,搞网络安全的一定要看看。
Source code security audit to detect loopholes in the code, can detect the C, C++, Perl, PHP and Python code errors and security vulnerabilities, network security must engage in to look at.
源代码安全审计,检测代码中的漏洞,可以 检测C, C++,Perl,PHPand Python 代码中的漏洞和安全错误,搞网络安全的一定要看看。
应用推荐