恶意的程序进入系统的主要方法是利用操作系统的安全性漏洞。
The main way rogue programs get into a system is by exploiting security holes in the operating system.
显然,您需要确保在向服务器添加工具时不会打开任何潜在的安全性漏洞。
You obviously need to make sure you don't open any potential security holes in adding an appliance to your server.
漏洞利用(exloit)是一个揭示或利用安全性漏洞的程序。
An exploit is a program that demonstrates or exploits the vulnerability.
这是一个安全性漏洞,因为入侵者可能可以伪装成消息传递引擎并截获总线通信流。
This is a security hole because an intruder could potentially pretend to be a messaging engine and compromise the bus traffic.
事实证明几乎所有软件的安全性漏洞都是由相对较小的一组常见错误引起的。
It turns out that nearly all software vulnerabilities are caused by a relatively small set of common mistakes.
在不利用应用服务器安全性的应用程序中,常常会发现很严重的安全性漏洞。
Applications that did not leverage application server security were typically found to have serious security holes.
如果我们发布了安全性漏洞补丁的话,你应当尽快进行升级以保证其不受攻击。
In case we announce a security vulnerability patch release, you should upgrade your installation as fast as possible to ensure that it is protected from all known vulnerabilities.
本文首先分析了搜索引擎所产生的安全性漏洞并针对这些漏洞提出了技术对策。
This paper analyzes security bugs with the search engine and puts forward corresponding technical countermeasures.
本文首先分析了搜索引擎所产生的安全性漏洞并针对这些漏洞提出了技术对策。
The thesis discusses security bugs of Internet OS and Internet application, and gives security measures to these bugs.
提早在开发周期中评估威胁,可增加在侦测到安全性漏洞时减少可能损害的机会。
Evaluating threats early in the development cycle gives you the opportunity to mitigate potential damage wherever a vulnerability is detected.
虽然对其的回答有一点困难,但是肯定的是工具可以找出确实邪恶的安全性漏洞、复杂的代码,和性能瓶颈。
While the answer to that one is a bit intractable, it's certainly the case that tools can find security holes, complex code, and performance bottlenecks that are evil indeed.
安全性漏洞(vulnerability)就是一个缺陷,它使程序有可能无法满足其安全性需求。
A vulnerability is a flaw that makes it possible for a program to fail to meet its security requirements.
即使以后发现这些组件的安全性漏洞,也可以迅速修复,并将修正后的组件应用到所有使用该组件的应用程序中。
Even if vulnerabilities are found later, they can be fixed once and the fix applies to every application that USES the component.
可编程逻辑器件安全性漏洞检测平台正是为了检测出逻辑芯片内可能存在的攻击后门和设计缺陷而研制的,从而确保电子设备中信息安全可靠。
This paper is aimed at detecting the backdoor attacks and design defects which might be embedded in logic chips, so as to insure the salty and creditability of the information in electronic equipment.
但是有一个合理的“反诉”:由于Windows用户比较多,所以对Windows的攻击就可能比较多,这意味着更有可能发现Windows的安全性漏洞。
But there's a reasonable counter-claim: since there are more Windows users, perhaps Windows is attacked more often, meaning that Windows vulnerabilities are more likely to be found.
解决方案还提供漏洞评估和配置审计功能,让 DBA 可以直接评估数据库的安全性。
The solution also provides vulnerability assessment and configuration-auditing capabilities that enable DBAs to directly evaluate the security of their databases.
利益干系人更愿意在功能上花费更多,而不是安全性;如果出现了安全漏洞,开发人员也很少被惩罚。
Often the stakeholders would like to spend more on functionality than security and then if there is a security breach then the developer is seldom punished.
这不仅加速了复杂程序的开发,同时也减少了你代码中的安全漏洞从而加强了PHP的安全性。
This not only speeds up the development of rich applications, but it also tightens up PHP security by reducing the risk of security holes in your coding.
并且,尝试实现自己的安全性也颇具风险,因为任何微小的疏忽都会导致严重的安全漏洞。
It's also a risky area to try to implement on your own, because even a minor and obscure oversight can lead to serious vulnerabilities.
使用RFID intheSupplyChain引领您的组织走向未来,其中解释了业务流程、操作和实现问题、风险、漏洞,以及安全性和隐私。
Bring your organization into the future with RFID in the Supply Chain, which explains business processes, operational and implementation problems, risks, vulnerabilities, and security and privacy.
医疗设备像其它计算机系统一样,同样很容易出现安全漏洞,从而影响到设备的安全性和有效性。
Medical devices, like other computer systems, are also vulnerable to security breaches, which affect the security and effectiveness of the device.
计算机系统安全漏洞的研究以及漏洞库的建设,对于提高系统安全性、减少安全事件发生具有重要意义。
The research on computer vulnerabilities and the building of the vulnerability database are significant in improving system's security and reducing computer security incidents.
计算机系统安全漏洞的研究以及漏洞库的建设,对于提高系统安全性,减少安全事件发生具有重要意义。
The research on computer vulnerabilities and the building of the vulnerability database are significant for improving system's security and reducing computer security incidents.
无疑,在这个网络化的信息时代,这些漏洞使得缓冲区溢出攻击极易传播和蔓延,极大地威胁了系统的安全性。
Undoubtedly, in this networked information era, these bugs make the Buffer Overflow Attack very easy propagate, it threatens the systematic security greatly.
您不可以探查、扫描或测试网站或连接到网站的任何网络的漏洞,也不可以违反网站或连接到网站的任何网络上的安全性或身份验证措施。
You may not probe, scan or test the vulnerability of the Site or any network connected to the Site, nor breach the security or authentication measures on the Site or any network connected to the Site.
对张劼等人提出的一类可验证的门限签名方案进行了安全性分析,发现它存在安全漏洞,容易受到合谋攻击和伪造攻击,并且不具备不可否认性。
Through the cryptanalysis of a verifiable threshold signature scheme presented by Zhang and Wen, concluded it not only exist collusion attack and forgery attack, but have no undeniability.
应用程序角色依赖于密码的安全性,而密码具有潜在的安全漏洞。
Application roles depend on the security of a password, which presents a potential security vulnerability.
高风险通常安装无需用户交互通过安全漏洞,并会严重损害系统的安全性。
High risks are typically installed without user interaction through security exploits, and can severely compromise system security.
不正确管理代码访问安全性(CAS)策略可能会导致安全漏洞。
Improperly administering code access security (CAS) policy can potentially create security weaknesses.
不正确管理代码访问安全性(CAS)策略可能会导致安全漏洞。
Improperly administering code access security (CAS) policy can potentially create security weaknesses.
应用推荐