• Security professionals are drowning in log files, vulnerability scan reports, alerts, reports, and more, but the data is not actionable.

    目前,安全专业人士淹没日志文件漏洞扫描、各种提醒、各类 告等数据的海洋中,这些数据并非不可操控的。

    youdao

  • Because hackers want to find loopholes must first scan the vulnerability, so each company should be on its own network vulnerability scanning as a regular, regular process.

    因为黑客若想发现漏洞必须进行漏洞扫描因此每个公司应该自家网络的漏洞扫描作为一个常规的、定期的流程。

    youdao

  • The crawling process is the most crucial part of the scan, so you should always make sure that the web vulnerability scanner is able to crawl all of the website’s objects and inputs.

    这个抓取过程扫描过程中至关重要一步,因此确定web漏洞扫描器能够抓取关于站点所有对象输入点。

    youdao

  • Scan each system discovered to uncover vulnerabilities, and move toward exploiting the vulnerability.

    扫描发现每个系统发现漏洞利用漏洞

    youdao

  • Network security leak scan and vulnerability analysis are the base of system security evaluation and the essential components of Information security system.

    网络安全漏洞扫描脆弱性分析进行系统安全评估基础信息安全保障体系中的必要组成部分

    youdao

  • Finally, as a complement to the leak scan technology, vulnerability analysis technology is also introduced and discussed briefly in the paper.

    最后作为网络漏洞扫描技术补充简要介绍讨论了系统脆弱性分析技术。

    youdao

  • You may not probe, scan or test the vulnerability of the Site or any network connected to the Site, nor breach the security or authentication measures on the Site or any network connected to the Site.

    可以探查扫描测试网站连接网站任何网络漏洞也不可以违反网站或连接到网站的任何网络安全性身份验证措施

    youdao

  • You may not probe, scan or test the vulnerability of the Site or any network connected to the Site, nor breach the security or authentication measures on the Site or any network connected to the Site.

    可以探查扫描测试网站连接网站任何网络漏洞也不可以违反网站或连接到网站的任何网络安全性身份验证措施

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定