Bugs that take advantage of vulnerabilities in the base operating system of the computer running the Web browser will also be ineligible.
另外操作系统漏洞导致的浏览器问题也不在该计划范围之内。
For example, someone may scan your Web server with the intention of finding exposed services or other vulnerabilities that can be exploited.
例如,某人可能扫描您的Web服务器,其目的是找到暴露的服务或其他可以利用的漏洞。
As Web services technology becomes an increasingly important component of the Internet topography, wireless networks will encounter a whole new set of vulnerabilities.
随着Web服务技术成为因特网领域中日益重要的组件,无线网络将面临一些全新的弱点。
The final stop for a Web victim includes a drive-by download attempt after the malware checks for vulnerabilities in the browser, Adobe or Quicktime software on the user's desktop.
据Websense公司称,恶意软件检查出浏览器中存在漏洞后,网站受害者的最后一站为下载软件,首先试图在用户的桌面上下载adobe公司或QuickTime软件。
A more important concern, in turn, is that the large amount of traffic exposes Ajax applications to Web services vulnerabilities.
而更严重的问题是,大量的通信会使Ajax应用程序受到Web服务漏洞的威胁。
This makes it easier and faster for attackers to find vulnerabilities — not for people that want to attack a (specific) Web site, but for people that want to attack any Web site.
这使得攻击者可以更快、更容易地发现弱点——这些攻击者们希望攻击的不是某个特定的Web站点,而是任何Web站点。
Security research firm Core Security Technologies said Friday that it discovered another set of vulnerabilities in Internet Explorer, a day after Microsoft Corp patched the Web browser.
安全研究公司CoreSecurityTechnologies22日表示,他们又发现了微软IE的几个漏洞。 而仅在一天之前微软刚刚才给IE打了新的补丁。
The overview explains the importance of using Rational AppScan, to ensure the elimination of Web security vulnerabilities within the application development process of a public facing Web application.
概述中解释了使用RationalAppScan的重要性,即确保能够在应用程序开发过程中消除网络安全性缺陷。
Usually Web servers remove scripts from user input, but often attackers exploit vulnerabilities to bypass these filters, resulting in major attacks such as the Yamanner or MySpace worms.
通常,Web服务器从用户输入中移除脚本,但是攻击者经常会利用服务器的弱点绕过这些过滤器,从而造成一些重大的攻击,比如说Yamanner或MySpaceIn蠕虫。
You'll need a team of developers, testers, system administrators, and potential users to speed up Ajax applications while dodging Web services vulnerabilities.
要提高Ajax应用程序的性能,同时避开Web服务漏洞,您的团队需要由开发人员、测试人员、系统管理员和潜在用户组成。
This article gives practical advice on dodging Web services vulnerabilities while speeding up your Ajax applications.
本文介绍一些实用的建议,帮助您在避开Web服务漏洞的同时改善Ajax 应用程序的性能。
The main challenge is that vulnerabilities are all too common in today's Web applications.
最大的挑战是,在当今的Web应用程序中这些缺陷都太常见。
Without a specialized team of security analysts, it may seem impossible for the average Web developer to fight against these vulnerabilities.
没有专门的安全分析师团队,一般的Web开发人员似乎对这些漏洞束手无策。
Secondly, you should also check how many actual vulnerabilities the web vulnerability scanner discovered.
其次,你应该检查web漏洞扫描器发现了多少实际存在的漏洞。
A web vulnerability scanner is a complex piece of software, and discovering vulnerabilities in a website can be a difficult and long process.
Web漏洞扫描器是功能复杂的软件,用它去发现站点中的漏洞的过程是漫长而艰辛的。
Although scanners are a good way to find possible vulnerabilities in a Web site, the best security companies always test possible vulnerabilities by hand for false positives.
尽管扫描程序是找到Web站点中可能存在的漏洞的很好方式,但是由于存在误报,最好的安全公司还总是要手动测试可能的漏洞。
We've already described two typical vulnerabilities for Web application technologies: session riding and hijacking vulnerabilities and injection vulnerabilities.
我们已经描述了两个典型的Web应用程序技术漏洞:会话控制和劫持漏洞,以及注入漏洞。
XSS vulnerabilities represent a large portion of all the documented Web-site vulnerabilities in 2007 (see Resources).
XSS漏洞代表2007年所有归档的Web站点的大部分漏洞(请参阅参考资料)。
Given Ruby's growing use in web frameworks (such as Ruby on Rails), you can also learn the most recent security vulnerabilities and their solutions.
鉴于Ruby在Web框架中的广泛应用(比如rubyon Rails),您还可以了解最新的安全漏洞及其解决方案。
Finally, Web-application vulnerabilities for the cloud space.
最后一点,Web应用在云计算领域的脆弱性。
Normally, this is a very good behavior because it prevents cross-site scripting security vulnerabilities from occurring when you access pages on the Web.
通常,这是一种很好的行为,因为它防止了在访问网页时跨站点脚本安全性隐患的发生。
In this article, I'll show you why online collaboration is getting more popular with Web 2.0 tools and how it comes with vulnerabilities that can be exploited by hackers.
在本文中,我将向您展示为什么使用Web 2.0工具进行在线协作会越来越流行,这种协作会带来哪些可能被黑客利用的漏洞。
Other Web-application-specific vulnerabilities concern the browser's front-end component.
其他特定于Web应用程序的漏洞与浏览器的前端组件有关。
Google hacking — the term for using Google queries to search for vulnerabilities in Web sites — is a popular way to find servers with specific flaws.
Google黑客——这一名词指使用Google查询来寻找网站中的弱点——是一种寻找具有特定漏洞的服务器的流行方式。
Can you elaborate on the new features in Core Rule Set project and how they help developers and web admins protect web applications against security vulnerabilities.
能否详细谈谈核心规则集项目有哪些新特性,这些新特性是如何帮助开发者和Web管理员保护Web应用免受安全攻击的困扰。
Securing Web services with ACLs, however, does not mitigate the risk of exposing Web services (and non-Web services) vulnerabilities to a malicious attack.
用访问控制表保护Web服务,然而,这并不能减轻Web服务(以及非web服务)漏洞受到恶意攻击的危险。
2017 seventh issue of security vulnerabilities, the highest proportion of applications, followed by WEB application vulnerabilities.
2017年第七期发布的安全漏洞中,应用程序占比最高,其次是WEB应用漏洞。
2017 seventh issue of security vulnerabilities, the highest proportion of applications, followed by WEB application vulnerabilities.
2017年第七期发布的安全漏洞中,应用程序占比最高,其次是WEB应用漏洞。
应用推荐