Buffer overflow vulnerabilities account for about half of all the software vulnerabilities.
在所有的软件安全漏洞中,缓冲区溢出漏洞大约占一半。
The coders - expert computer hackers who discover software vulnerabilities and create viruses.
程序编码员——电脑黑客一旦发现软件漏洞,就会编写病毒程序。
"Zero-day" threats are always unknown and undisclosed or newly discovered software vulnerabilities.
“零天”威胁总是未知的秘密或新发现的软件漏洞。
It turns out that nearly all software vulnerabilities are caused by a relatively small set of common mistakes.
事实证明几乎所有软件的安全性漏洞都是由相对较小的一组常见错误引起的。
Hackers locate obscure software vulnerabilities which allow them to "overrun" the buffers with their own data.
黑客定位模糊不清软件漏洞,使它们能够“越位”缓冲器与自己的数据。
Malvertising, as this practice is known, can exploit software vulnerabilities or dispatch deceptive pop-up messages.
恶意广告,其做法早已为人们熟知,就是发现软件漏洞或者发出欺诈的弹出式信息。
In the first quarter of 2008 alone, 1,474 different software vulnerabilities were reported with only 64 of them having posted solutions.
在2008年第一季度,所有报告的1,474个不同的软件脆弱点只有64个被解决。
ThreadFix is a software vulnerability aggregation and management system that reduces the time it takes to fix software vulnerabilities.
ThreadFix是软件漏洞聚合和管理系统,可让你减少修复软件漏洞所花费的时间。
Usually a hacker using different server hardware and software vulnerabilities to get access to the server and control over sensitive information.
通常黑客利用各种服务器软硬件漏洞,获得服务器的控制权与敏感信息。
In order to avoid system crashes and data loss accidents caused by software vulnerabilities, the security and reliability of storage management software are most concerned about the user.
为了避免由于软件漏洞导致的系统崩溃、数据丢失意外的发生,存储软件产品的安全性和可靠性成为目前用户最关心的问题。
It can enumerate product names and vulnerabilities, including software flaws and configuration problems, identify the presence of vulnerabilities and assign severity scores to software flaws.
它可以列举产品名称和脆弱性,包括软件的漏洞和配置问题,找出存在的漏洞,并分配软件缺陷严重分值。
But, there are some vulnerabilities that automated software cannot discover.
但是一些漏洞,自动化软件是发现不了的。
But the document can also be used by software designers, architects and even CIOs, which should be aware of these possible vulnerabilities and take appropriate measures.
同时文档还适用于软件设计师、架构师、甚至cio,他们应该了解这些可能出现的弱点,并采取恰当的措施。
By definition, a worm is a self-contained software component that automatically performs probe actions designed to identify and exploit vulnerabilities on a targeted system.
蠕虫的定义如下,蠕虫是一个自包含软件组件,可以自动执行可识别和攻击目标系统漏洞的探测操作。
In the right hands, this tool can offer a very powerful means of uncovering security vulnerabilities in software and assisting in their repair.
如果用于正当目的,这个工具能够提供揭示软件安全漏洞的强大方法并协助修补漏洞。
It keeps vendors focused on continuous improvement and it puts software users on notice that securing only the obvious vulnerabilities is not good enough.
这样会让提供商集中精力进行持续改进,而且让软件用户知道仅保护明显的漏洞并不够。
We found that the majority of vulnerabilities are usually caused by a small logic error or a case that the software developer hadn't uncovered or accounted for.
我们发现大部分脆弱点通常由小的逻辑错误或软件开发人员没发现或解决的情况所引起。
Majia and his fellow hackers keep secret their knowledgeof certain so-called zero-day vulnerabilities — software flaws — forfuture use, he says.
马甲和他的同行们会对他们知道的一些所谓“零天漏洞”——即软件缺陷——保密,以备将来使用。
In the end, it is the responsibility of everyone associated with a piece of software to keep security a focus and to try to mitigate vulnerabilities.
最后,与软件相关的每个人都有责任关注安全性,并试图减少脆弱点。
Depending on how advanced the scanner is, the software may attempt to exploit vulnerabilities (if this feature is supported).
这个扫描器可能试图研究漏洞(如果支持该特性),但这取决于扫描器的先进程度。
FoxIt Software, makers of the popular free alternative PDF reader, FoxIt reader, announced patches for three public vulnerabilities that were discovered in the past few weeks.
FoxItReader(一款流行的免费PD F阅读器软件)的提供者FoxIt Soft ware公司针对在过去几周内发现的三个安全漏洞发布了安全补丁。
A web vulnerability scanner is a complex piece of software, and discovering vulnerabilities in a website can be a difficult and long process.
Web漏洞扫描器是功能复杂的软件,用它去发现站点中的漏洞的过程是漫长而艰辛的。
The final stop for a Web victim includes a drive-by download attempt after the malware checks for vulnerabilities in the browser, Adobe or Quicktime software on the user's desktop.
据Websense公司称,恶意软件检查出浏览器中存在漏洞后,网站受害者的最后一站为下载软件,首先试图在用户的桌面上下载adobe公司或QuickTime软件。
The more a software is installed, say like Linux, the less number of vulnerabilities should be expected since they would have most likely be discovered and corrected.
软件安装的次数越多,就像Linux,缺陷被发现及纠正的机会就越大,因此缺陷的数量就会越少。
The software can also be scanned for security issues, such as cross-site scripting and Structured Query Language (SQL) injection vulnerabilities.
软件还可以扫描安全性问题,例如跨站点的脚本以及StructuredQueryLanguage (SQL)注射脆弱性。
Cisco is warning of three vulnerabilities within its Internet Operating System software that could allow a denial-of-service attack or let a hacker run arbitrary code on an affected switch router.
Cisco已经被警告,在InternetOperatingSystem软件中具有三个可能引发拒绝服务,运行任意代码和系统出错的漏洞. "因为运行IOS的设备跨越数个不同类型的网络,第二轮大型拒绝服务攻击可能因此而起."
Microsoft also wants to educate more Chinese software developers on security issues to shield Windows and Internet Explorer users from vulnerabilities in third-party programs, said Lambert.
除此以外,微软还愿意在安全问题方面,向从事开发第三方软件的中国程序员提供帮助,以保障Windows系统和IE浏览器用户的安全风险。
Buffer overrun vulnerabilities are so difficult to prevent that scores of them are being found and exploited in operating system and application software every day.
缓冲区溢出漏洞是那么难相处,以防止数十种,他们都是被找到和利用操作系统和应用软件,每一天。
Mr Rios has already found tens of thousands of corporate heating, air-conditioning and ventilation systems online, many with vulnerabilities in their software that a hacker could exploit.
里奥斯先生已经发现在数以万计联机的企业供暖,空调和通风系统中,很多控制软件都存在黑客可以利用的漏洞。
Mr Rios has already found tens of thousands of corporate heating, air-conditioning and ventilation systems online, many with vulnerabilities in their software that a hacker could exploit.
里奥斯先生已经发现在数以万计联机的企业供暖,空调和通风系统中,很多控制软件都存在黑客可以利用的漏洞。
应用推荐