Vulnerability scanning helps to identify any potential security holes in either the operating system or in the configuration of Lotus Domino.
漏洞攻击扫描有助于识别操作系统或LotusDomino配置中潜在的安全漏洞。
From the current point of view, their vulnerability to operating system of many enterprises has been neglected, leading to hackers, malware swoop, caused serious harm to enterprise security.
从目前来看,很多企业一直忽略的操作系统自身漏洞,导致黑客、恶意程序趁虚而入,给企业安全造成了严重危害。
Vulnerability repair of electric power production and control area secondary system is a necessary and important part of security protection work.
电力生产控制区二次系统漏洞修补属于安全防护工作中必不可少的重要组成部分。
Network security leak scan and vulnerability analysis are the base of system security evaluation and the essential components of Information security system.
网络安全漏洞扫描与脆弱性分析是进行系统安全评估的基础和信息安全保障体系中的必要组成部分。
This method partition the vulnerability more in detail, and make the system security administrators can patch the more serious vulnerabilities in the shortest times.
该方法使漏洞严重性划分得更加细致,从而使系统安全管理员可以在最短的时间内修补更严重的安全漏洞。
In this paper, a scalable network vulnerability scanner system is presented, which can respond quickly to the latest discovered security holes, and greatly improve the defense capability of systems.
提出一种可扩展的网络弱点扫描系统能够在较短的时间内对新发现的安全问题迅速做出反应,极大地提高了系统的安全防御能力。
A computer network vulnerability evaluation system is designed based on attack graph modeling method. The computer network security evaluation tools and model check tools are integrated in the system.
以攻击图建模方法为基础,提出了一种综合利用网络安全评估工具、模型检验工具的计算机网络脆弱性评估系统的设计方案。
This method divides the vulnerability in detail, and helps system security administrators patch the vulnerabilities in the shortest time.
该方法使漏洞严重性划分得更加细致,从而使系统安全管理员可以在最短的时间内修补更严重的安全漏洞。
It lures intruder to attack themselves by constructing an obvious security vulnerability in its system, capture the activity data when intruder attacking on the honeypot system.
它通过构造一个有明显安全漏洞的系统来引诱入侵者对其进行攻击,捕获入侵者攻击过程中在蜜罐系统上的活动数据。
This paper summarizes the current studies about the security vulnerability evaluation and introduces the Common vulnerability Scoring System (CVSS).
本文概述了目前的安全漏洞评估研究现状,并介绍了通用漏洞评分系统(CVSS)。
System has taken some security measures to maintain system security, of preventing SQL injection vulnerability functions.
系统也采取了一些安全措施维护系统安全,实现防止SQL注入漏洞等功能。
"Exploitation of this vulnerability allows attackers to break out of an isolated guest system to compromise the underlying host system that controls it," claimed Core Security.
“利用这个弱点,使攻击者以突破的一个孤立的客户系统,以妥协背后的主机系统控制它”,声称为核心的安全。
In order to safeguard the security of network information system, the network vulnerability detecting system is worth of thorough research.
为了保障网络信息系统的安全,必须对网络漏洞探测系统进行深入的研究。
In order to safeguard the security of network information system, the network vulnerability detecting system is worth of thorough research.
为了保障网络信息系统的安全,必须对网络漏洞探测系统进行深入的研究。
应用推荐