最后本文对对这些主要安全缺陷提出了改进建议。
Then some recommendations are provided on how to fix some main security defects.
首先介绍了2G系统结构及其存在的安全缺陷。
It first introduced 2g system architecture and the existing security defects.
周一发生在莫斯科的地铁袭击案攻击暴露了安全缺陷。
The Moscow subway attack Monday highlighted gaps in security.
但是,他和他的老战友单·希尔并没有停止对安全缺陷和反恐措施的思考。
But, along with Dan Hill, a military buddy of his, he didn't stop thinking about security weaknesses and terrorism.
而协议的安全缺陷与电脑病毒的存在,使得网络环境面临极大的危险。
And the safety of the agreement defects and the computer virus and allows for the existence of the network environment faces great danger.
利用几个安全缺陷,我们有重新配置敏感数据提取BB的服务器应用程序。
By exploiting a few security bugs we have reconfigured the app to extract sensitive data from BB's own servers.
结论手术室护理的安全缺陷时有发生,采取必要的防范措施是十分必要的。
Conclusion As security defects of nursing in operating room occur sometimes, it is essential to take necessary precautions.
简介:安全的程序必须最小化特权,以降低bug转化为安全缺陷的可能性。
Summary: Secure programs must minimize privileges so that any bugs are less likely to be become security vulnerabilities.
持续的升级/支持:Linux正不断地得到改进,安全缺陷正得到修复。
Ongoing upgrades/support: Linux is continually being improved and having security bugs fixed.
在沙特阿拉伯住宅楼宇的现场评估当前的安全问题是用来识别常见的安全缺陷。
A field assessment of current safety issues for residential buildings in Saudi Arabia is used to identify common safety deficiencies.
蓝牙协议存在一些安全缺陷,蓝牙中的鉴定机制是用来鉴定设备而不是用来鉴定用户。
Bluetooth protocol has security limitation somehow, that is, the authorization of the protocol is to authorize the bluetooth devices not the users.
IP协议由于缺乏对安全性的考虑,存在一定的安全缺陷,给黑客攻击网络以可乘之机。
Since TCP/IP shows less consideration to security, some shortcomings in security are in existence, which provides Hacker opportunities to attack network.
报告说,目前为止完成的有限研究没有发现油门踏板不能复位或油门踏板被地垫卡住之外的安全缺陷。
'the limited research completed so far has not led to identification of safety defects other than sticking gas pedals or pedal entrapment,' the report said.
静态代码安全检查工具是一种能够帮助程序员自动检测出源程序中是否存在安全缺陷的软件。
The tool of static security examining is a kind of software which can help to automatically find secure vulnerabilities in source codes.
在过去,如果一个安全缺陷被发现在窗户,你不得不补丁你所有的机械,这些机械是身体由彼此分离。
In the past, if a security vulnerability was discovered for Windows, you had to patch all your machines, which were physically separated from one another.
例如,当你学习如何为给定操作系统写驱动程序时,你将学到一些与操作系统的安全缺陷相关的东东。
When you learn how to write drivers for a given operating system, for instance, you'll learn something about the security weaknesses of that OS.
分析了3G-AKA协议的安全缺陷,提出了一个改进的3G-AKA协议,满足了更高的安全需求。
The limitations of 3G-AKA protocol are analyzed, and an improved protocol of 3G-AKA is proposed, it can provide more advanced security requirements.
本文基于对主动网络通用体系和SENCOMM的安全缺陷的分析,探讨其安全隐患、需求和信任模型。
This dissertation is based on the analysis of common architecture of active network and the security problems of SENCOMM, and discusses its hidden dangers, needs and trusts model.
NET应用程序必须引入更多的安全机制。着重分析应用程序的一些安全缺陷,并通过实例提出一些预防策略。
NET applications must import more security measure. Some security defects were analysed and some strategys were introduced by example.
在丰田与NHTSA发生争执后,两个国会委员会正起草新的汽车安全法规,可能会对拖延披露安全缺陷给予更严厉的处罚。
In the wake of Toyota's run-in with NHTSA, two Congressional committees are drafting new car safety legislation that is likely to include stiffer penalties for delays in disclosing safety defects.
本文分析了IMS认证与密钥分配协议的过程,找出了认证协议中的安全缺陷,并给出了攻击者可能进行的攻击。
In this paper, an analysis of the procedure and security of IMS (Internet protocol multimedia subsystem) authentication and key agreement protocol has been made.
更重要的是,自动变速箱问题,可以让你的车不安全缺陷——一些传输使车子滚动,即使在公园或驾驶拨了拨在中立。
More than that, automatic transmission problem can make your car unsafe - some transmission defects may cause your car to roll even with the shifter in Park or drive forward with shifter in Neutral.
本文简单介绍了dmz主机、dmz主机作用和dmz主机设置方法、dmz主机的安全缺陷及其安全缺陷的解决方案。
The paper briefly introduces the DMZ host machine, DMZ main machine function and DMZ host machine setting methods, DMZ host machine safety flaws and the related solutions.
文章在分析ARP协议工作原理、安全缺陷、攻击原理和攻击方式的基础上,详细论述了基于ARP协议攻击的防御方法。
This paper gives a general analysis of the working principle of the ARP, the security vulnerabilities of the ARP, the way of the attack and the protecting method.
并在集中式和分布式两种组密钥管理方案的基础上,提出了新的层簇式密钥管理架构,并解决了这两种方案存在的安全缺陷。
According to the root-controlling and distributing group key management schemes, this paper proposes a novel layer-cluster key management technique and resolves specific defects of the two schemes.
并在集中式和分布式两种组密钥管理方案的基础上,提出了新的层簇式密钥管理架构,并解决了这两种方案存在的安全缺陷。
According to the root-controlling and distributing group key management schemes, this paper proposes a novel layer-cluster key management technique and resolves specific defects of the two schemes.
应用推荐