• Every system has vulnerabilities that a knowledgeable thief could theoretically exploit.

    每个系统都有漏洞理论上具备相关知识的小偷就可以对其加以利用。

    youdao

  • Every one of them has vulnerabilities that a knowledgeable thief could theoretically exploit.

    每个系统都漏洞如果小偷具备相关知识,理论上就可以对其加以利用。

    youdao

  • It isn't surprising that you'll find plenty of strong opinions about the potential vulnerabilities of popular home-security systems.

    并不意外的是,关于受大众喜爱的家庭安全系统具有潜在缺陷发现许多很有说服力的观点

    youdao

  • So it isn't surprising that you'll find plenty of strong opinions about the potential vulnerabilities of popular home-security systems.

    因此发现很多关于盛行家庭安全系统潜在漏洞强烈意见并不奇怪

    youdao

  • Several massive leakages of customer and employee data this year have left managers hurriedly peering into their intricate IT systems and business processes in search of potential vulnerabilities.

    今年严重客户雇员资料泄漏事件使得管理者们匆忙仔细检查他们复杂的信息系统业务流程寻找可能存在的安全隐患。

    youdao

  • We see our own vulnerabilities in them.

    我们他们身上看到自己弱点

    youdao

  • A.Determine privacy vulnerabilities.

    确定隐私薄弱环节

    youdao

  • New vulnerabilities and new threats emerge.

    出现了漏洞威胁

    youdao

  • This is also one of its vulnerabilities.

    也是虚拟世界安全漏洞中的一个

    youdao

  • Next, identify vulnerabilities your project could have.

    接下来需要标识项目可能具有漏洞

    youdao

  • Such vulnerabilities are called logical vulnerabilities.

    一些漏洞称为逻辑性漏洞。

    youdao

  • Guard against Cross-Site Scripting (XSS) vulnerabilities.

    保护站点脚本(Cross - site scripting,XSS)漏洞

    youdao

  • Such vulnerabilities are also known as control challenges.

    这种漏洞称为控制挑战

    youdao

  • You can also use it to test for vulnerabilities on a site.

    可以使用测试站点漏洞

    youdao

  • Vulnerabilities exist at entry and exit points in the system.

    弱点存在于系统入口出口

    youdao

  • An attacker can discover vulnerabilities much faster than you think!

    攻击找到漏洞速度想想的快多了

    youdao

  • Poverty and the vulnerabilities associated with it remain entrenched.

    贫困与其如影随形的其他缺陷依旧根深蒂固。

    youdao

  • But, there are some vulnerabilities that automated software cannot discover.

    但是一些漏洞自动化软件发现了的。

    youdao

  • After you assess vulnerabilities, prioritize them according to business risk.

    评估漏洞之后根据业务风险为其划分优先级。

    youdao

  • It cannot defend against vulnerabilities in third-party scripts or servers.

    不能抵御第三方脚本服务器中的安全漏洞

    youdao

  • WHO is working to address the specific vulnerabilities and health needs of women.

    世卫组织正在努力处理妇女特定脆弱性卫生需求

    youdao

  • To mitigate these vulnerabilities, you need to conduct a vulnerability assessment.

    缓解这种漏洞需要执行漏洞评估

    youdao

  • It equally shows up the projects which are slow to respond to vulnerabilities.

    同时显示了那些对于攻击反应迟钝项目

    youdao

  • This TAI addresses the security vulnerabilities in the previous TAI and is preferred.

    这种TAI解决前一种TAI安全漏洞,应该优先选用它。

    youdao

  • Some vulnerabilities are not overly complex, and are thus easy for hackers to exploit.

    一些脆弱点复杂因而很容易黑客利用

    youdao

  • Your goal is to mitigate the risks of exploiting vulnerabilities to an acceptable level.

    目标漏洞被利用的风险减轻接受程度。

    youdao

  • Most users' knowledge of security vulnerabilities of their systems is vague at best.

    大多数使用者对于安全攻击知识匮乏。

    youdao

  • When these vulnerabilities are exploited, the system or applications will perform poorly.

    如果这些漏洞人利用,应用程序系统性能将受到损害。

    youdao

  • When these vulnerabilities are exploited, the system or applications will perform poorly.

    如果这些漏洞人利用,应用程序系统性能将受到损害。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定