Another is to find ways to ensure that software developers produce code with fewer flaws in it so that hackers have fewer security holes to exploit.
另一种是找到确保软件开发人员编写的代码中有更少的缺陷的方法,这样黑客就有更少的安全漏洞可以利用。
Security holes are often rooted in a program that isn't robust in the face of unexpected data.
安全漏洞经常植根于在意料之外的数据面前表现得不够健壮的程序中。
Another problem is that the default configurations leave security holes that hackers can exploit.
另一个问题是默认配置存在一些安全漏洞,很容易被黑客用来实施攻击。
The main way rogue programs get into a system is by exploiting security holes in the operating system.
恶意的程序进入系统的主要方法是利用操作系统的安全性漏洞。
The administrator might send scan reports to users, and then push fixes to them to plug security holes.
管理员可能会向用户发送扫描报告,然后向这些用户提供修补程序以修补安全漏洞。
The authors blame the separation of task modules in SOAP processing frameworks for such security holes.
文章的几位作者抱怨造成这种安全漏洞的原因是SOAP处理框架中对任务模块的拆分。
Therefore you will need to keep up with cumulative fixes if you want all known security holes to be closed.
因此,如果您想要修复所有已知的安全漏洞,则需要保持累积修复最新。
A worm is a small piece of software that USES computer network and security holes to replicate itself.
蠕中病毒是一种小软件,它利用计算机网络和安全漏洞来进行自我复制。
The good news is many common programming errors that result in security holes simply aren't possible in PHP.
值得庆幸的是,导致安全漏洞的很多编程错误在PHP中不可能存在。
Enabling at least one of them is a useful tool for finding programming errors that may result in security holes.
至少启用它们中的一个,可以有效地发现可能导致安全漏洞的编程错误。
In this article, I'll detail many of the common PHP programming mistakes that can result in security holes.
再这篇文章里,我会详细的阐述一些经常导致安全漏洞的PHP编程错误。
You obviously need to make sure you don't open any potential security holes in adding an appliance to your server.
显然,您需要确保在向服务器添加工具时不会打开任何潜在的安全性漏洞。
The more complicated computer operating systems get, the more riddled they are with unnoticed security holes.
计算机系统越复杂,千疮百孔的安全漏洞就越多。
Applications that did not leverage application server security were typically found to have serious security holes.
在不利用应用服务器安全性的应用程序中,常常会发现很严重的安全性漏洞。
Entity resolution (including the reading of the external DTD subset) opens a number of potential security holes in XML.
实体解析(包括读取外部dtd子集)打开了XML中的一些潜在安全漏洞。
As the system changes over time some level of security should keep up, and even improve if new security holes are discovered.
因为随着时间的推移系统会更改,所以,如果发现新的安全漏洞,应保持甚至提高安全级别。
These variables don't really require initialization in your scripts, so it's easy to write scripts with gaping security holes.
因为在脚本中并不真正需要初始化这些变量,所以很容易编写出带有安全漏洞的脚本。
An example of this is security holes in a Web page's code that can allow an online banking client to see another client's data.
这样的例子之一就是web页面的代码中的一个安全漏洞,它可以允许一个在线银行客户看到其它客户的数据。
Popular software that runs on millions of machines all over the world contains security holes, most of which are critical.
运行在全世界数百万机器上的流行软件都有安全漏洞,并且大多数是危险的。
Testing the correctness of the system configuration and security holes, and prompts the administrator to fix vulnerabilities.
检测系统配置的正确性和安全漏洞,并提示管理员修补漏洞。
Developers need to understand security threats, the tools provided to counter them, and how to avoid self-inflicted security holes.
开发人员需要了解安全威胁、针对安全威胁所提供的工具,以及如何避免自己造成的安全漏洞。
Some argue that clouds are more secure than many private networks, while others consider that cloud computing may open more security holes.
有些人认为云比许多私有网络要安全,另一些人则认为云计算可能敞开了更多的安全漏洞。
Vulnerability scanning helps to identify any potential security holes in either the operating system or in the configuration of Lotus Domino.
漏洞攻击扫描有助于识别操作系统或LotusDomino配置中潜在的安全漏洞。
It added that there would be a heavy focus on creating a system that would not require users to worry about security holes and virus warnings.
博客上还写道,到时大家一定会非常关注这样一款无需担心安全漏洞和病毒的操作系统。
If you build a model of your system that is useful for predicting latency of user requests, it probably won't help you discover security holes.
如果你建立的模型对于预测用户请求的延时非常有效,它不一定能帮你发现安全漏洞。
The good news however is that Microsoft says it's a lot more stable than the beta version with lots of bugs fixed and security holes plugged.
微软说这个版本比beta版更稳定,很多漏洞也修复了。
Microsoft and Apple have been notified of these security holes and are supposedly looking into them. Neither company commented on the matters.
目前有关的漏洞已经被分别提交给微软和苹果公司,不过目前为止他们还没有对此作出任何回应。
This not only speeds up the development of rich applications, but it also tightens up PHP security by reducing the risk of security holes in your coding.
这不仅加速了复杂程序的开发,同时也减少了你代码中的安全漏洞从而加强了PHP的安全性。
Malicious software often infects a corporate network by exploiting security holes in web browsers to infiltrate a PC when its user visits a dodgy website.
恶意软件经常通过嗅探网络浏览器的安全漏洞来感染公司网络,当用户访问隐藏的网页时,所用电脑会感染病毒。
Malicious software often infects a corporate network by exploiting security holes in web browsers to infiltrate a PC when its user visits a dodgy website.
恶意软件经常通过嗅探网络浏览器的安全漏洞来感染公司网络,当用户访问隐藏的网页时,所用电脑会感染病毒。
应用推荐