This made it easy to exploit security vulnerabilities remotely.
这使得很容易地远程利用的安全漏洞。
It is the last line of defense to unknown security vulnerabilities.
以此来作为对未知安全漏洞最后的防御手段。
The attacker is often security vulnerabilities discoverer and users.
攻击者往往是安全漏洞的发现者和使用者。
This TAI addresses the security vulnerabilities in the previous TAI and is preferred.
这种TAI解决了前一种TAI的安全漏洞,应该优先选用它。
Last week, the overall level of information security vulnerabilities threaten high.
上周信息安全漏洞威胁整体评价级别为高。
Most users' knowledge of security vulnerabilities of their systems is vague at best.
大多数使用者对于安全攻击的知识都很匮乏。
The iframe data-transmission mechanism described above introduces security vulnerabilities.
上述 iframe 数据传输机制同样会带来安全漏洞。
Summarize common classes of security vulnerabilities and their taxonomy at the code level.
总结了现有的常见软件安全漏洞和代码层的软件安全漏洞分类。
You can use this option to minimize the risk of security vulnerabilities in the AIX operating system.
可以使用这个选项尽可能降低AIX操作系统中的安全风险。
On-demand scripts can include malicious code aimed at exploiting security vulnerabilities such as XSS.
按需脚本可能包含打算攻击XXS等安全漏洞的恶意代码。
Old browsers that haven't been upgraded are likely to have security vulnerabilities that attackers can exploit.
没有升级的老浏览器都可能存在能被黑客利用的安全漏洞。
A probing attack can use error messages generated by an application to search for security vulnerabilities.
探测攻击可使用由应用程序生成的错误消息来搜索安全漏洞。
Experiments show that users can find security vulnerabilities of a local or remote server using this scanner.
实验表明,通过使用该扫描器,用户可以不留痕迹地发现一台本地或远程服务器的安全性弱点。
In fact, only two security vulnerabilities have been identified in the default installation over the past 10 years.
事实上,在过去的10年中,默认安装中仅发现了两个安全漏洞。
Some of the negative consequences include: user frustration, slowdowns in performance, and security vulnerabilities.
其中的一些负面影响包括:用户挫折感,性能下降,安全漏洞等。
Propose a security vulnerabilities detection model which use static analysis and dynamic verification strategy.
提出了一个静态分析,动态验证的安全漏洞检测模型。
General negative test cases, for security vulnerabilities, must be included. The list would include tests to ensure that.
针对安全漏洞,必须采用常规的负面测试用例。
You will also need to work with your hosting provider to fix all security vulnerabilities associated with your site.
你还须要与你的主机托管供给商,以肯定所有的安全马脚,与你的站点。
Summary: Secure programs must minimize privileges so that any bugs are less likely to be become security vulnerabilities.
简介:安全的程序必须最小化特权,以降低bug转化为安全缺陷的可能性。
2017 seventh issue of security vulnerabilities, the highest proportion of applications, followed by WEB application vulnerabilities.
2017年第七期发布的安全漏洞中,应用程序占比最高,其次是WEB应用漏洞。
Security vulnerabilities are on security agreement in the concrete implementation errors, is the accident appear abnormal conditions.
安全漏洞是在对安全协议的具体实现中发生的错误,是意外出现的非正常情况。
Detection of Security Vulnerabilities in Applications with Static analysis requires precise context-sensitive alias analysis information.
使用静态分析方法检测应用程序安全漏洞的基础是精确的上下文敏感别名分析信息。
In the right hands, this tool can offer a very powerful means of uncovering security vulnerabilities in software and assisting in their repair.
如果用于正当目的,这个工具能够提供揭示软件安全漏洞的强大方法并协助修补漏洞。
Given Ruby's growing use in web frameworks (such as Ruby on Rails), you can also learn the most recent security vulnerabilities and their solutions.
鉴于Ruby在Web框架中的广泛应用(比如rubyon Rails),您还可以了解最新的安全漏洞及其解决方案。
Additional steps can be added to the build and release process in build Forge to scan the build for security vulnerabilities and verify code quality.
可以向BuildForge中的构建还有发布过程,添加额外的步骤以浏览构建中的安全性缺陷并确保代码的质量。
Not that security vulnerabilities aren't discovered in Google Chrome, but, it is considered to be more secure than its counterparts like ie and Firefox.
这并不是说着google浏览器Chrome没有发现安全漏洞,但是,它比同行的IE和Firefox对安全的考虑更多。
While many such security vulnerabilities have been discovered in the past, this one is different because it does not affect only ie but also Firefox.
虽然过去也发现了很多漏洞,但这一次却很特别,因为它不仅影响IE还波及到了Firefox。
Normally, this is a very good behavior because it prevents cross-site scripting security vulnerabilities from occurring when you access pages on the Web.
通常,这是一种很好的行为,因为它防止了在访问网页时跨站点脚本安全性隐患的发生。
Normally, this is a very good behavior because it prevents cross-site scripting security vulnerabilities from occurring when you access pages on the Web.
通常,这是一种很好的行为,因为它防止了在访问网页时跨站点脚本安全性隐患的发生。
应用推荐