• Bugs that take advantage of vulnerabilities in the base operating system of the computer running the Web browser will also be ineligible.

    另外操作系统漏洞导致浏览器问题不在该计划范围之内

    youdao

  • For example, someone may scan your Web server with the intention of finding exposed services or other vulnerabilities that can be exploited.

    例如某人可能扫描Web服务器目的找到暴露服务其他可以利用的漏洞

    youdao

  • As Web services technology becomes an increasingly important component of the Internet topography, wireless networks will encounter a whole new set of vulnerabilities.

    随着Web服务技术成为因特网领域中日益重要组件无线网络面临一些全新的弱点。

    youdao

  • The final stop for a Web victim includes a drive-by download attempt after the malware checks for vulnerabilities in the browser, Adobe or Quicktime software on the user's desktop.

    据Websense公司称,恶意软件检查浏览器中存在漏洞网站受害者最后下载软件,首先试图用户桌面上下载adobe公司QuickTime软件。

    youdao

  • A more important concern, in turn, is that the large amount of traffic exposes Ajax applications to Web services vulnerabilities.

    严重问题大量通信会使Ajax应用程序受到Web服务漏洞的威胁。

    youdao

  • This makes it easier and faster for attackers to find vulnerabilitiesnot for people that want to attack a (specific) Web site, but for people that want to attack any Web site.

    使得攻击者可以更快容易发现弱点——这些攻击者们希望攻击不是某个特定Web站点而是任何Web站点。

    youdao

  • Security research firm Core Security Technologies said Friday that it discovered another set of vulnerabilities in Internet Explorer, a day after Microsoft Corp patched the Web browser.

    安全研究公司CoreSecurityTechnologies22日表示他们又发现了微软IE几个漏洞。 而仅天之前微软刚刚才给IE打了新的补丁。

    youdao

  • The overview explains the importance of using Rational AppScan, to ensure the elimination of Web security vulnerabilities within the application development process of a public facing Web application.

    概述解释使用RationalAppScan重要性,即确保能够在应用程序开发过程消除网络安全性缺陷

    youdao

  • Usually Web servers remove scripts from user input, but often attackers exploit vulnerabilities to bypass these filters, resulting in major attacks such as the Yamanner or MySpace worms.

    通常Web服务器用户输入中移除脚本但是攻击经常利用服务器的弱点绕过这些过滤器从而造成一些重大的攻击,比如说YamannerMySpaceIn蠕虫

    youdao

  • You'll need a team of developers, testers, system administrators, and potential users to speed up Ajax applications while dodging Web services vulnerabilities.

    提高Ajax应用程序的性能,同时避开Web服务漏洞团队需要开发人员测试人员系统管理员潜在用户组成。

    youdao

  • This article gives practical advice on dodging Web services vulnerabilities while speeding up your Ajax applications.

    本文介绍一些实用建议,帮助您避开Web服务漏洞同时改善Ajax 应用程序的性能。

    youdao

  • The main challenge is that vulnerabilities are all too common in today's Web applications.

    最大挑战当今Web应用程序中这些缺陷常见

    youdao

  • Without a specialized team of security analysts, it may seem impossible for the average Web developer to fight against these vulnerabilities.

    没有专门安全分析师团队一般Web开发人员似乎这些漏洞束手无策。

    youdao

  • Secondly, you should also check how many actual vulnerabilities the web vulnerability scanner discovered.

    其次应该检查web漏洞扫描器发现了多少实际存在的漏洞

    youdao

  • A web vulnerability scanner is a complex piece of software, and discovering vulnerabilities in a website can be a difficult and long process.

    Web漏洞扫描器功能复杂软件用它去发现站点中的漏洞的过程漫长艰辛的。

    youdao

  • Although scanners are a good way to find possible vulnerabilities in a Web site, the best security companies always test possible vulnerabilities by hand for false positives.

    尽管扫描程序找到Web站点可能存在的漏洞方式,但是由于存在误报,最好安全公司总是要手动测试可能的漏洞。

    youdao

  • We've already described two typical vulnerabilities for Web application technologies: session riding and hijacking vulnerabilities and injection vulnerabilities.

    我们已经描述了两个典型Web应用程序技术漏洞会话控制劫持漏洞,以及注入漏洞。

    youdao

  • XSS vulnerabilities represent a large portion of all the documented Web-site vulnerabilities in 2007 (see Resources).

    XSS漏洞代表2007年所有归档Web站点大部分漏洞(请参阅参考资料)。

    youdao

  • Given Ruby's growing use in web frameworks (such as Ruby on Rails), you can also learn the most recent security vulnerabilities and their solutions.

    鉴于RubyWeb框架中的广泛应用(比如rubyon Rails),可以了解最新安全漏洞及其解决方案。

    youdao

  • Finally, Web-application vulnerabilities for the cloud space.

    最后一点,Web应用计算领域的脆弱性

    youdao

  • Normally, this is a very good behavior because it prevents cross-site scripting security vulnerabilities from occurring when you access pages on the Web.

    通常一种好的行为因为防止了访问网页跨站点脚本安全性隐患发生

    youdao

  • In this article, I'll show you why online collaboration is getting more popular with Web 2.0 tools and how it comes with vulnerabilities that can be exploited by hackers.

    本文中,展示为什么使用Web 2.0工具进行在线协作会越来越流行,这种协作会带来哪些可能黑客利用漏洞

    youdao

  • Other Web-application-specific vulnerabilities concern the browser's front-end component.

    其他特定于Web应用程序的漏洞浏览器前端组件有关。

    youdao

  • Google hackingthe term for using Google queries to search for vulnerabilities in Web sitesis a popular way to find servers with specific flaws.

    Google黑客——一名词使用Google查询寻找网站中的弱点——寻找具有特定漏洞的服务器的流行方式

    youdao

  • Can you elaborate on the new features in Core Rule Set project and how they help developers and web admins protect web applications against security vulnerabilities.

    能否详细谈谈核心规则项目有哪些特性这些新特性是如何帮助开发者Web管理员保护Web应用免受安全攻击的困扰。

    youdao

  • Securing Web services with ACLs, however, does not mitigate the risk of exposing Web services (and non-Web services) vulnerabilities to a malicious attack.

    访问控制表保护Web服务然而这并不能减轻Web服务(以及web服务)漏洞受到恶意攻击危险

    youdao

  • 2017 seventh issue of security vulnerabilities, the highest proportion of applications, followed by WEB application vulnerabilities.

    2017年第七期发布安全漏洞中,应用程序最高其次WEB应用漏洞。

    youdao

  • 2017 seventh issue of security vulnerabilities, the highest proportion of applications, followed by WEB application vulnerabilities.

    2017年第七期发布安全漏洞中,应用程序最高其次WEB应用漏洞。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定