We see our own vulnerabilities in them.
我们从他们身上看到了自己的弱点。
A.Determine privacy vulnerabilities.
确定隐私的薄弱环节。
This is also one of its vulnerabilities.
这也是在虚拟世界的安全漏洞中的一个。
Next, identify vulnerabilities your project could have.
接下来,需要标识项目可能具有的漏洞。
Out of your vulnerabilities will come your strength.
从你的脆弱里面走出来就会变成你的力量。
Such vulnerabilities are also known as control challenges.
这种漏洞也被称为控制的挑战。
You can also use it to test for vulnerabilities on a site.
也可以使用它来测试站点上的漏洞。
Vulnerabilities exist at entry and exit points in the system.
弱点存在于系统的入口和出口。
Finally, Web-application vulnerabilities for the cloud space.
最后一点,Web应用在云计算领域的脆弱性。
An attacker can discover vulnerabilities much faster than you think!
攻击者找到漏洞的速度比你想想的快多了。
For you to know yourself better, especially your vulnerabilities.
更好地了解自身,尤其是自身的脆弱性。
It is the last line of defense to unknown security vulnerabilities.
以此来作为对未知安全漏洞最后的防御手段。
We are all fragile, he thought, and Emma has her vulnerabilities too.
我们都很脆弱,艾玛也有她的弱点,乔。
But, there are some vulnerabilities that automated software cannot discover.
但是一些漏洞,自动化软件是发现不了的。
Dell's battery recall reveals the technology industry's vulnerabilities.
戴尔电池召回事件暴露了科技产业的软肋。
The fourth category is evaluating software security and vulnerabilities.
第四类是软件安全漏洞评估。
WHO is working to address the specific vulnerabilities and health needs of women.
世卫组织正在努力处理妇女的特定脆弱性和卫生需求。
To begin, you need to understand some of the vulnerabilities you'll be looking for.
首先,需要了解一些您要寻找的漏洞。
Last week, the overall level of information security vulnerabilities threaten high.
上周信息安全漏洞威胁整体评价级别为高。
Ironically, in the past, she has been the most popular when she shows her vulnerabilities.
具讽刺意味的是,过去,当她表现出自己的弱点时,曾经是最受欢迎的时期。
With routine auditing, vulnerabilities in the network can also be quickly uncovered.
也可在例行审核中,迅速发现网络易受到攻击的薄弱位置。
The main challenge is that vulnerabilities are all too common in today's Web applications.
最大的挑战是,在当今的Web应用程序中这些缺陷都太常见。
It is at the local level that these vulnerabilities can most effectively be addressed.
而且这些脆弱性在地方层面能够得到最有效的解决。
The good technology in these products can go a long way in preventing vulnerabilities.
这些产品中的优秀技术可在相当长的一段时间内防止攻击。
With this information in hand, you can then check these vulnerabilities and defend against them.
有了这些信息,就可以检查这些漏洞并进行防御。
Once you decide to commit to someone, over time, their flaws, vulnerabilities, pet peeves.
一旦你做出了决定,随着时间的流逝。
Once you decide to commit to someone, over time, their flaws, vulnerabilities, pet peeves.
一旦你做出了决定,随着时间的流逝。
应用推荐