• Is Security Vulnerability a Bug?

    软件安全漏洞一个缺陷吗?

    youdao

  • Is Security Vulnerability a Bug?

    受攻击是个缺陷?

    youdao

  • This creates a security vulnerability.

    这会产生安全漏洞。

    youdao

  • But improperly managed virtualization is also a potential security vulnerability.

    但是不正确虚拟化管理也是一个潜在的安全漏洞

    youdao

  • Some consider this to be a security vulnerability (the author is not among them).

    一些人认为一个安全性漏洞(作者并不认同)。

    youdao

  • Sometimes, even just reading data can be a security vulnerabilitybefore the data is even checked!

    有时即使只是读入数据可以安全漏洞——甚至在数据被检查之前

    youdao

  • Last week, CNVD compiled and released the following important security vulnerability information.

    上周CNVD整理发布以下重要安全漏洞信息

    youdao

  • Application roles depend on the security of a password, which presents a potential security vulnerability.

    应用程序角色依赖密码安全性密码具有潜在的安全漏洞。

    youdao

  • A perfect security vulnerability collection model based on the notion of vulnerability auto-collection is proposed.

    提出了一种完善安全漏洞收集模型

    youdao

  • Each entry in the database includes a brief description of the security vulnerability or exposure and any pertinent references.

    这个数据库中的每个条目包含安全漏洞简要说明相关参考资料

    youdao

  • Despite claims to the contrary, TRACE is not a security vulnerability and there is no viable reason for it to be disabled.

    虽然有很多声明相反,TRACE不是一个安全漏洞并且没有可行理由来禁用

    youdao

  • This 1.6 version fixes a critical security vulnerability. 3, this version is not compatible with previous versions of the database.

    1.6版本修补了一个致命安全漏洞3这个版本兼容以前版本数据库

    youdao

  • If a caller can influence the generated code in a way that causes a compiler error, a security vulnerability might also exist there.

    如果调用能够影响生成代码并因而导致编译器错误,则也是安全弱点

    youdao

  • After analyzing various shortcomings of evaluation methods, the paper proposes a multi-dimensional security vulnerability evaluation model.

    分析评估方法不足之处后,提出一种多维度安全漏洞风险评估方法。

    youdao

  • This paper summarizes the current studies about the security vulnerability evaluation and introduces the Common vulnerability Scoring System (CVSS).

    本文概述了目前安全漏洞评估研究现状,并介绍了通用漏洞评分系统(CVSS)。

    youdao

  • First, we outlined the basic principle of this method. Then, this paper presented how this method applied to the evaluation of security vulnerability.

    首先介绍方法基本原理然后介绍方法在安全漏洞评估中的具体实现。

    youdao

  • In the past, if a security vulnerability was discovered for Windows, you had to patch all your machines, which were physically separated from one another.

    过去如果一个安全缺陷发现窗户不得不补丁所有机械这些机械身体彼此分离

    youdao

  • The foundation of the study of computer security vulnerability includes the classification of security vulnerability and the design of vulnerability database.

    安全漏洞分类漏洞设计计算机安全漏洞研究基础

    youdao

  • Memcpy joins the ranks of other popular functions like strcpy, strncpy, strcat, strncat which were banned due to their security vulnerability through buffer overruns.

    memcpy加入到strcpy,strncpy,strcat,strncat常用函数队伍中,都是由于通过缓存溢出进行安全攻击而被禁用

    youdao

  • With the application and spread of the classification protection, Network Security Vulnerability Scanning should consider the efficiency and the function expansion.

    随着等级保护应用普及网络安全漏洞扫描充分考虑执行效率和功能扩展性问题。

    youdao

  • Let's take a look at three containers, each of which is associated with a response type that you could use in describing application security vulnerability in a Web service.

    我们检查一下三种容器其中任意一种Web服务用于描述应用程序安全漏洞响应类型相关

    youdao

  • In this case the recipe would add all the necessary code in the right places, greatly reducing the chance of a mistake leading to a runtime failure or security vulnerability.

    这种情况下,recipe正确位置添加所有必要的代码这会显著减少导致运行失败安全脆弱性错误机会

    youdao

  • It lures intruder to attack themselves by constructing an obvious security vulnerability in its system, capture the activity data when intruder attacking on the honeypot system.

    通过构造一个有明显安全漏洞系统来引诱入侵者进行攻击捕获入侵者攻击过程中在蜜罐系统活动数据

    youdao

  • In case we announce a security vulnerability patch release, you should upgrade your installation as fast as possible to ensure that it is protected from all known vulnerabilities.

    如果我们发布安全性漏洞补丁的话,应当尽快进行升级保证受攻击。

    youdao

  • Comparison of security patches is able to detect the changes between different versions of executables, analyzing changes can get the specific information of security vulnerability.

    安全补丁比较技术有效揭示同一程序补丁前后差异通过差异分析得到补漏洞的详细信息

    youdao

  • All that is required is the target person's cellphone number, a computer and some knowledge of how cellular networks work, said the report, which aimed to spotlight a security vulnerability.

    报告所需只是跟踪目标手机号码台计算机一些关于手机网络运行知识。报告旨在曝光安全漏洞。

    youdao

  • Based on the analysis of a perfect security vulnerability collection module, this article presents that exploiting a new software-security vulnerability auto-collection software is necessary.

    本文在对完善的安全漏洞收集模型分析基础指出开发一种新的软件——安全漏洞自动收集软件的必要性。

    youdao

  • This paper made use of statistical results of vulnerability scanner and intrusion detection systems and presented method of qualitative evaluation of security vulnerability based on fuzzy data fusion.

    利用漏洞扫描器入侵检测系统统计结果两方面信息提出了应用模糊信息融合安全漏洞进行定性评估方法

    youdao

  • To avoid vulnerability to security breaches, an application server that USES these trusted methods should not use un-trusted connection methods.

    为了避免安全漏洞攻击使用这些信任方法应用服务器应该使用不受信任连接方法。

    youdao

  • What if a hacker discovers a vulnerability in the security mechanism that allows him to break through the authentication without the need to know the required user's authentication information?

    如果黑客安全机制发现了一个漏洞可以破解身份验证,而不需要了解用户身份验证信息,那么会怎么样?

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定