单词 | vulnerabilities |
释义 |
例句释义: 弱点,脆弱性,易伤性,可捕性,漏洞,脆弱点,缺陷 1. There would be no possibility of any vulnerabilities affecting the referring page (which may be administered by someone else). 其中并没有任何缺点可以影响到所引用的页面(这台服务器是由其他人进行管理的)。 www.ibm.com 2. But it was his embrace of the American-style bonus culture that became one of his main vulnerabilities. 然而,对美式红利文化的信奉,成了他的一个主要弱点。 cn.nytimes.com 3. The company also pointed out that hackers have been using some of these vulnerabilities to launch attacks to the user's machine. 该公司还指出,已经有黑客在利用上述部分安全漏洞向用户机器发起攻击。 it.zhishi.sohu.com 4. This will help to reduce the likelihood of a full-fledged attack or to progressively weaken the attack against exploited vulnerabilities. 这将帮助减少受到全面攻击的可能性,或者主动减少对暴露的漏洞的攻击。 www.ibm.com 5. ON THE surface, China seems to understand the flaws and potential vulnerabilities of its growth model. 从表面上看,中国似乎也明白自身经济增长模式的缺陷和暗藏的危险。 www.bing.com 6. The Mtb genome is not the only new source of data able to provide insight into the TB bacterium's potential vulnerabilities. 结核分枝杆菌基因组不是唯一能提供细菌潜在弱点的新来源。 edba.ncl.edu.tw 7. This section provides an overview of what the Metasploit Framework does for users trying to discover vulnerabilities. 这个部分简要介绍MetasploitFramework对于试图发现漏洞的用户有什么用。 www.ibm.com 8. We have received no reports of any machines actually compromised as a result of the now-remedied vulnerabilities. 我们尚未收到因现在修补的这些安全性漏洞而导致机器受到损坏的报告。 service.real.com 9. If I come from a family of alcoholics, then in a social setting I need to be more cognizant of my vulnerabilities than other people do. 如果我来自一个有着酗酒背景的家庭,那在社会环境中我就必须比别人更加提防自己的脆弱。 www.bing.com 10. Not checking for SQL-specific characters can open your application up to a wide range of vulnerabilities. 不检查SQL特定的字符可能会打开您的应用程序,带来各种漏洞隐患。 www.ibm.com 1. These officials said in an open letter, the British destroyed the aircraft will result in major national security vulnerabilities. 这些官员在一封公开信中称,毁掉这些飞机将导致英国国防安全出现重大漏洞。 www.englishtang.com 2. This will help reduce session hijacking vulnerabilities since the session ID cannot be sniffed and easily hijacked. 这样会话ID不会被探嗅到而且不容易被截获,就可以减少会话截获的危险。 www.zhidun.com 3. Those numbers do not necessarily indicate that Microsoft has made progress in its fight against security vulnerabilities. 这些数字并不表示微软在安全问题上已取得进步。 dream4ever.org 4. The truth is, hackers will always be able to locate vulnerabilities and issue new malicious code to exploit them. 事实是,黑客们永远都能够找出新的系统漏洞,并且编写新的恶意代码对其进行攻击。 dream4ever.org 5. A special reward program makes it lucrative to contribute multiple vulnerabilities, he said. 对于多起安全问题的发现者,他们会得到一个特别的奖励。 mirror.dream4ever.org 6. In the build-up to the global crisis of 2008 , tiny Iceland was a canary in the mine, a leading indicator of wider vulnerabilities . 在2008年全球经济危机逐渐形成之际,小国冰岛成为了矿井中的金丝雀——一场更大范围危机的先行指标。 www.bing.com 7. Otherwise, malicious callers are able to derive from your permission, potentially causing security vulnerabilities. 否则,恶意调用方将能够从您的权限派生,有可能导致出现安全脆弱性。 msdn2.microsoft.com 8. While building its capacity to confront the enemy head on, it also must exploit vulnerabilities. 中国一边要继续打造与敌人正面对抗的能力,一边还必须发掘敌方的弱点。 www.ftchinese.com 9. There were many economists and analysts who actually predicted, early on, many risks and vulnerabilities that would have led to a crisis. 很早之前,就有许多经济学家和分析人士实际上做出过预言,认为过多的风险和漏洞将导致一场危机。 www.bing.com 10. You have to understand your vulnerabilities and invest some time to think through the risks and resiliency. 你必须了解业务的脆弱性,并花时间思考如何应对风险,如何创造应对方案。 www.bing.com 1. As an important part of the network security solution, vulnerability assessment products can find out the vulnerabilities in computers. 漏洞评估软件能够检测出计算机系统中存在的各种安全漏洞,是网络安全解决方案中的重要组成部分。 www.dictall.com 2. As you've seen in the XSS examples, most of the attacks exploit server-side vulnerabilities by injecting malicious scripts. 正如我们在XSS示例中所看到的,大多数的攻击都利用了服务器端的弱点,注入恶意脚本。 www.ibm.com 3. He wasn't outwardly sentimental, but sometimes he'd let his guard down and let me see his vulnerabilities. 丹并非多愁善感的人,但有时他会放下防备,让我看到他软弱的一面。 www.bing.com 4. Security assessments and audits means that there needs to be continuous testing for security vulnerabilities and exposures. 安全评估和审计意味着你需要持续地测试系统的安全漏洞。 blog.zhaol.cn 5. Vulnerabilities are the result of human error, and if you change the human attitude, good things will follow. 漏洞是人犯错误的结果,如果你改变人的态度,好结果会随之而来。 www.infoq.com 6. And, most importantly perhaps, it must trust reactor designers to create new reactors that do not share the vulnerabilities of older ones. 最重要的是,必须让公众相信工程师能设计出新的反应堆,使之摒弃已有的反应堆的缺陷。 dongxi.net 7. Knowing which ports are open on a host is an important first step for an attacker to deduce possible vulnerabilities to the target host. 知道主机上哪些端口是打开的,对于攻击者推断目标主机上可能存在的弱点是重要的第一步。 www.ibm.com 8. Three of the Gadget applets for Windows Vista's sidebar also had to be patched to fix one Important and two Moderate vulnerabilities. 三头带applets的是windowsvista的侧边还必须修补修补的一项重要和两个暖和的弱点。 www.vvcha.cn 9. An attacker can discover vulnerabilities much faster than you think! 攻击者找到漏洞的速度比你想想的快多了。 www.bing.com 10. This process introduces latent defects and vulnerabilities into our implementations, which accumulate in the form of growing potential risk. 此过程在我们的实现中引入了潜在缺陷和漏洞,并以不断增加的潜在风险的形式积累。 www.ibm.com 1. The German company addressed those vulnerabilities in an advisory it released last week. 这家德国公司在上周的公告中宣布已经解决了这些漏洞了。 www.bing.com 2. With a few exceptions, open source programs do generally rely on user reports and public forums to find vulnerabilities. 除了一些例外情况,开放源码的程序通常依赖用户报告和公共论坛来发现弱点。 www-128.ibm.com 3. Depending on how advanced the scanner is, the software may attempt to exploit vulnerabilities (if this feature is supported). 这个扫描器可能试图研究漏洞(如果支持该特性),但这取决于扫描器的先进程度。 www.ibm.com 4. Vulnerabilities like this highlight the necessity for added protection. 这样的漏洞使附加保护显得更重要了。 www.bing.com 5. If the values for the control come from user input, be sure to validate the values to help prevent security vulnerabilities. 如果控件的值是由用户输入的,请务必要对输入值进行验证以防止出现安全漏洞。 msdn2.microsoft.com 6. Some of the negative consequences include: user frustration, slowdowns in performance, and security vulnerabilities. 其中的一些负面影响包括:用户挫折感,性能下降,安全漏洞等。 www.bing.com 7. At the moment, we are studying critical glacial lakes, which increase vulnerabilities downstream in Nepal. 此刻,我们正在研究关键的冰川湖,它们增加了尼泊尔下游的脆弱性。 www.scidev.net 8. In case it this information is intercepted by an attacker, it can be used to reveal vulnerabilities in the computer's security system. 在这种情况下,被攻击者截获的信息,它可以用来显示在计算机的安全系统漏洞。 bbs.kafan.cn 9. Qualys maintains a hit list of the most popular vulnerabilities to help firms work out which ones they should patch first. Qualys公司提供了一个最常见的漏洞列表来帮助企业用户决定需要优先为系统打哪些补丁。 society.mblogger.cn 10. But the greater transparency also could highlight previously unknown vulnerabilities in parts of the banking system. 但是公开的细节越多越透明,银行业部分以前未知的弱点也会得到放大。 www.bing.com 1. This has led to a suggestion on the bug list to blacklist the Java plugin due to security vulnerabilities caused by the plugin itself. 由于Java插件自身的安全隐患,使得缺陷清单中的建议都建议将Java插件列黑。 www.infoq.com 2. "I have more concerns about potential risks and vulnerabilities than most people, " he said, with glum understatement. “与大多数人相比,我更加关切潜在的风险和弱点,”他轻描淡写地如许说道。 www.bing.com 3. These results clearly show that the major security vendors do not focus on vulnerabilities. 测试结果清楚表明,一些安全厂商不注重漏洞拦截。 bbs.kafan.cn 4. Trojans exploit vulnerabilities of banking software used by clients to carry out transactions over the Internet. 利用木马客户端用于通过互联网进行交易的银行软件的漏洞。 iask.sina.com.cn 5. Just make sure you and your system can provide countermeasures for any chat vulnerabilities hackers could exploit. 只需确保系统能够提供聊天漏洞的应对之策以防止黑客利用这些漏洞进行攻击。 www.ibm.com 6. These "network-based vulnerabilities" are just the kind of thing that ABMs are good at capturing. 这些“基于网络的脆弱性”恰恰是基于代理人的模型所擅长捕捉的事物。 www.bing.com 7. Furthermore, it provides a sound basis for quickly reacting in case of attack or publication of software vulnerabilities and patches. 而且,它为发生攻击或者发布软件漏洞和补丁时进行快速反应提供了一个坚实的基础。 www-128.ibm.com 8. An effective overall security strategy is to be prepared when vulnerabilities are detected. 有效且全面的安全策略是在攻击被探测到时能够有所准备。 www.ibm.com 9. RealNetworks has received no reports of machines compromised as a result of the now-remedied vulnerabilities. RealNetworks尚未收到因现在修补的这些安全性漏洞而导致机器受到损坏的报告。 service.real.com 10. Old browsers that haven't been upgraded are likely to have security vulnerabilities that attackers can exploit. 没有升级的老浏览器都可能存在能被黑客利用的安全漏洞。 www.bing.com 1. The team sends out emergency warning reports as well as weekly reports that should be reviewed to minimize potential vulnerabilities. 这个团队还每周发送紧急警告报告,应该检查这些报告以使潜在攻击最小化。 www.ibm.com 2. It's also a risky area to try to implement on your own, because even a minor and obscure oversight can lead to serious vulnerabilities. 并且,尝试实现自己的安全性也颇具风险,因为任何微小的疏忽都会导致严重的安全漏洞。 www.ibm.com 3. This results in vulnerabilities that would be difficult to discover if the components were analyzed as isolated modules. 如果这些控件被当作孤立的单元来分析,就会导致这些缺陷很难被发现。 www.ibm.com 4. But those are discussions. We look at the vulnerabilities and whether or not the groups are taking action. 但是那些只是讨论,我们瞄着危险分子和那些团体是否正在采取行动。 www.bing.com 5. Do not talk old in front of others for your predicament bare your vulnerabilities. 不要老在别人面前倾诉你的困境袒露你的脆弱。 blog.163.com 6. Anticipate developments of strategic concern and identify opportunities as well as vulnerabilities for decision-makers. 预测战略性问题的动向,发现机遇和指出薄弱环节,供决策人参考。 www.america.gov 7. Running Windows Update can often correct problems by replacing out-of-date files and fixing vulnerabilities. 运行WindowsUpdate通常可以通过替换过期文件和修复漏洞来解决问题。 windowshelp.microsoft.com 8. We examined the Green Dam software and found that it contains serious security vulnerabilities due to programming errors. 我们审查了绿色大坝软件,发现它载有严重的安全漏洞,由于编程错误。 bbs.ngacn.cc 9. On offer: a year's supply of 25 previously unknown software vulnerabilities for $2. 5m, complete with instructions for exploiting the flaws. 提供的服务是:一年提供25种以前不为人所知的软件漏洞,价格为250万美元,并附有关如何利用这些漏洞的说明。 www.ftchinese.com 10. Take a look at your home and region, getting to know your vulnerabilities to storm surge, flood, wind. 观察你家和所属地区,了解有关风暴潮、洪水和风害的安全漏洞。 www.elanso.com 1. China's vulnerabilities stem more from whether or not such high levels of investment are being used efficiently. 中国脆弱与否,更多地取决于如此之高的投资水平是否正得到有效利用。 www.ftchinese.com 2. But at other times, it is the child's vulnerabilities, dependencies, and insecurities are reactivated. 但有时候,这个小孩的脆弱、依赖和不安也会被激发出来。 www.bing.com 3. In other words, the most vulnerable apps are also apps whose vulnerabilities could be mitigated by a dose of application white listing. 换句话说,最脆弱的软件,同样也是可以通过白名单来减轻其漏洞的软件。 dictsearch.appspot.com 4. They also create vulnerabilities as residents try to meet basic needs (fetching water, visiting public toilets). 在居民努力满足其基本需求(取水和上公厕等)过程中,这些因素会造成弱势情况。 web.worldbank.org 5. One of the paradoxes of great power status is that it brings its own vulnerabilities. 大国地位的矛盾之一是,它暴露了中国在某些方面的脆弱。 www.ftchinese.com 6. But it is unlikely to prove correct in the long run because China's economic and political model faces so many vulnerabilities. 但是这种观点的正确性在很长一段时间内将很难证明,因为中国的经济和政治模式仍然有很多脆弱的地方。 www.bing.com 7. Bill suggested that the security approach should include visualizing the vulnerabilities, incidents and compliance risks. Bill认为安全手段应该包括缺陷、事故及风险的可视化。 www.infoq.com 8. Cyber Security Bulletins provide weekly summaries of new vulnerabilities. Patch information is provided when available. 网络安全公告每周提供新漏洞摘要。当补丁可用时也提供补丁信息。 blog.csdn.net 9. Microsoft said the 10 critical security vulnerabilities of the corresponding patch for MS09-010. 微软称,这10个危急安全漏洞的相应补丁程序为MS09-010。 it.zhishi.sohu.com 10. When these vulnerabilities are exploited, the system or applications will perform poorly. 如果这些漏洞被人利用,应用程序或系统的性能将受到损害。 www.ibm.com 1. When researchers look for malware and attack vectors, the tendency is to look for vulnerabilities in portals or code. 当研究人员寻找恶意软件和攻击的载体时,他们往往会寻找接口或代码中的漏洞。 kb.cnblogs.com 2. A bricks and mortar store with an online brand is most likely a legitimate site. However, the site may still have vulnerabilities. 使用在线品牌的实际商店通常都是合法的站点,然而,这种站点仍然存在漏洞。 www.ibm.com 3. Threats and vulnerabilities are classified under confidentiality, integrity, and availability. 威胁和弱点在机密性、完整性和可用性中是分级的。 www.ibm.com 4. Analyze the vulnerabilities of U. S. government computer systems and civilian infrastructure and offer applicable policy recommendations. 对美国政府计算机系统和民用基础设施的弱点进行分析,并且提供适当的政策建议。 www.etiri.com.cn 5. To prevent potential vulnerabilities, do not use the sec_master or users for the trusted user account. 为防止潜在的攻击,不要使用sec_master或者用户作为信任用户帐号。 www.ibm.com 6. Of course, increased interoperability means increased vulnerabilities. 诚然,互操作性增强意味着脆弱性的增强。 www.ftchinese.com 7. Technical Cyber Security Alerts provide timely information about current security issues, vulnerabilities, and exploits. 技术网络安全警报及时提供当前安全问题,漏洞,和(漏洞)利用信息。 blog.csdn.net 8. They're asking researchers to batter and overload the neural platforms, to figure out where vulnerabilities can be detected. 他们正要求研究者对神经平台进行猛击以及过载测试,来弄明白能够查明的脆弱点到底在哪里。 www.bing.com 9. Poverty and the vulnerabilities associated with it remain entrenched. 贫困及与其如影随形的其他缺陷依旧根深蒂固。 www.ecocn.org 10. This has perhaps prompted a new realism in Russia about its vulnerabilities, which could lead to a more positive dialogue with the west. 这或许在俄罗斯引发了一种新现实主义,使它认识到自身的弱点,并可能因此更加积极地与西方进行对话。 www.ftchinese.com 1. Likewise, the service maps a threat onto several vulnerabilities, meaning that the same threat could exploit several vulnerabilities. 类似地,该服务也将威胁映射到多个漏洞,即相同的威胁可能利用多个漏洞。 www.ibm.com 2. Summary: Secure programs must minimize privileges so that any bugs are less likely to be become security vulnerabilities. 简介:安全的程序必须最小化特权,以降低bug转化为安全缺陷的可能性。 www.ibm.com 3. Staying on top of emerging vulnerabilities and threats related to all information assets on your network can be a big job. 要在与网络中的所有信息资产相关的出现的漏洞和威胁中处于主动地位的可能是个大任务。 blog.csdn.net 4. A comprehensive guide on network security vulnerabilities, threats, and countermeasures across a variety of platforms. 这是关于多种平台的网络安全弱点、威胁和对策的综合指南。 www-128.ibm.com 5. This should be true whether the vulnerabilities are in the stored procedures or in the source code on the client side. 不论漏洞是在存储过程中或是在客户端源代码中都是如此。 www.ibm.com 6. Niall Ferguson provided vivid comparisons between historical episodes of financial crises and current vulnerabilities. 尼尔·佛格森把当前的漏洞与历史上的金融危机事件作了生动鲜明的对比。 www.bing.com 7. "Zero-day" threats are always unknown and undisclosed or newly discovered software vulnerabilities. “零天”威胁总是未知的秘密或新发现的软件漏洞。 www.kpfans.com 8. also add a program to scan ports and check what service is running on this host, can further test these services, find vulnerabilities. 同时程序添加了扫描端口并检查有什么服务正运行在这台主机上,更进一步还能测试这些服务,发现系统漏洞。 www.boshuo.net 9. Unfortunately, other vulnerabilities are overwhelmingly concentrated in the developing world. 不幸的是,其他弱势不可抵抗地集中在发展中国家。 www.bing.com 10. Hackers look for computers with security vulnerabilities and infect them in advance of an attack. 黑客们在攻击前先寻找有安全漏洞的计算机并加以感染。 www.bing.com 1. As a standard way of describing application security vulnerabilities using XML? 描述应用程序安全漏洞的标准化方法吗? www-128.ibm.com 2. Vulnerability-Stress Model of anxiety disorders is a Dynamic model, including interactions between many vulnerabilities and stress. 焦虑障碍的易感性-应激模型是一个多种易感因素与应激事件交互作用的动态的、发展的模型。 kns50.chkd.cnki.net 3. Third, it exposes the credentials as the username and password, which may introduce some security vulnerabilities. 最后,它将凭证暴露为用户名和密码,这可能引入一些安全缺陷。 www-128.ibm.com 4. For this article, I'll highlight those exploitable vulnerabilities that would impact the uptime availability in the SLA. 在本文中,我将重点介绍这些可利用来影响SLA中正常运行时间有效性的漏洞。 www.ibm.com 5. Financial stress testing of banks is becoming a widely used tool to assess potential vulnerabilities in a financial system. 美联储透露,对银行实行的应力测试正在成为评估金融系统潜在脆弱性的一种广泛使用的工具。 www.america.gov 6. The iframe data-transmission mechanism described above introduces security vulnerabilities. 上述iframe数据传输机制同样会带来安全漏洞。 www.ibm.com 7. The connection string builder classes are designed to eliminate guesswork and protect against syntax errors and security vulnerabilities. 连接字串产生器类别的目的是排除不确定性,并可防止语法错误和安全性漏洞。 technet.microsoft.com 8. The fourth section applies financial soundness indicators to assess the vulnerabilities of selected emerging market banking systems. 第四部分使用各种金融健全指标对主要新兴市场银行体系的各种弱点进行了评估。 210.32.205.64 9. They study Internet security vulnerabilities, handle computer security incidents, and publish security alerts. 他们研究因特网的安全弱点,处理计算机安全事故并发布安全警告。 www-128.ibm.com 10. The four threats all exploit vulnerabilities of the assets in computing systems. These four threats are shown in Fig. 10-1. 这四种威胁都利用了计算机系统资源的脆弱性,图10-1表示这四种威胁。 www.educity.cn 1. Identify security vulnerabilities, assess the risk and provide practical recommendations to management. 识别安全漏洞,评估风险,并提供切实可行的建议。 jobs.zhaopin.com 2. Servers that are accessible to the public on the Internet are commonly probed for vulnerabilities daily. 对于允许公众在Internet上访问的服务器,通常每天都会有人探测其是否存在安全漏洞。 msdn2.microsoft.com 3. Servers that are accessible to the public on the Internet are constantly probed for vulnerabilities. 对于允许公众在Internet上访问的服务器,总会不断有人探测其是否存在安全漏洞。 msdn2.microsoft.com 4. An emerging approach to protecting against vulnerabilities is smarter tools which have awareness of dangerous resources and techniques. 针对安全漏洞提供防护的一种新方法就是使用更加智能的工具,这些工具能够感知到危险的资源和技术。 www.ibm.com 5. Your code and security reviews should carefully examine these extensibility points to identify security vulnerabilities. 在检查代码和安全性时,要仔细检查这些扩展点以确定是否存在安全漏洞。 msdn2.microsoft.com 6. As a countermeasure, review your application logic and eliminate all XSS and CSRF vulnerabilities . 对策是审核你的web应用逻辑来堵上所有的XSS和CSRF漏洞。 www.bing.com 7. The payouts are used to gain a competitive edge over rivals by having their products recognize more vulnerabilities. 这一行为,因为多以暴露对手的产品弱点而让竞争白热化。 mirror.dream4ever.org 8. In chart above, the number of vulnerabilities that can be directly attributed to buffer overflows is displayed. 以上图表中,显示了可以直接归为缓冲区溢位的弱点数。 www.ibm.com 9. In is proposed an approach that combines penetration testing with anomaly detection for uncovering SQL Injection vulnerabilities. 在提出了一种方法,即结合渗透测试,对于揭露异常检测SQL注入漏洞。 wenwen.soso.com 10. The exercise temporarily eased fears about European banks' vulnerabilities to the burgeoning sovereign-debt crisis. 这一行动暂时缓解了人们对于欧洲银行容易受迅速发展的主权债务危机影响的担忧。 c.wsj.com 1. The PHP Group's updates, which fix those vulnerabilities and several smaller bugs, have been posted to the group's Web site. PHP组织修补这个安全漏洞及更正了其它一些PHP中的小错误,并在其网站作了发布。 dream4ever.org 2. All vulnerabilities and countermeasures are demonstrated using a sample application built with jQuery Mobile, PHP, and MySQL. 使用通过jQueryMobile、PHP和MySQL构建的示例应用程序展示所有漏洞和对策。 www.ibm.com 3. This article provided a high-level introduction to using Metasploit to provide a generic overview of your system's vulnerabilities. 本文介绍了如何使用Metasploit来提供对系统漏洞的概览。 www.ibm.com 4. Once you have gone through the installation process, these vulnerabilities will no longer exist on your system. 完成安装程序后,您的系统中将不再存在这些安全性缺陷。 www.microsoft.com 5. It is at the local level that these vulnerabilities can most effectively be addressed. 而且这些脆弱性在地方层面能够得到最有效的解决。 www.ztgy.org 6. Vulnerability exploiting is to find potential unknown vulnerabilities of software by various techniques and tools. 漏洞挖掘是指对未知漏洞的探索,应用各种技术和工具,找出软件中的潜在漏洞; www.fabiao.net 7. Design-level vulnerabilities are the hardest defect category to handle, but they're also the most prevalent and critical. 设计级别系统漏洞最难的缺陷类别来处理,但他们也是最流行和关键的。 blog.sina.com.cn 8. If you know nothing about XSS or CSRF , take the time to learn more about these security vulnerabilities. 如果你知道什么的XSS或CSRF的,花时间去学习更多的有关这些安全漏洞。 bluoe.blog.163.com 9. With high savings and a current-account surplus, China lacks many of the vulnerabilities that toppled Western credit systems in 2008. 正是由于存在高储蓄率和经常账户盈余,中国才少了很多导致西方信用体系在2008年崩溃的漏洞。 chinese.wsj.com 10. This article describes the common types of Web application vulnerabilities and provides a framework to address these issues. 本文描述了常见的Web应用程序攻击类型,并提供了一个解决这些问题的框架。 www-128.ibm.com 1. However, this mechanism also presents some significant security vulnerabilities. 但是,这种机制也暴露出一些严重的安全漏洞。 www.ibm.com 2. The site can be accessed only from the local computer, reducing security vulnerabilities. 只能从本地计算机访问站点,减少了安全漏洞。 msdn2.microsoft.com 3. The only thing that was known is very, very complex on the Windows part, the dropper part, used multiple zero-day vulnerabilities. 唯一知道的是,它的Windows部分,注入器部分非常非常复杂,使用了多重零日漏洞攻击。 www.ted.com 4. They study Internet security vulnerabilities and provide security incidents and publish responses. 他们研究因特网安全性弱点并提供安全性事件和发布响应。 www-128.ibm.com 5. The common causes for these vulnerabilities are poor programming practices and software configuration errors. 引起这些弱点的共同原因是编程太差和软件配置错误。 bbs.51testing.com 6. president of Heidel and Associates, told Psychiatric News that "individuals bring their own vulnerabilities to a situation. " 告诉《精神病学新闻》,“个体把他们的脆弱点带到了某个环境中。” www.bing.com 7. In a network vulnerabilities, I walk down the leg and my stomach. 在一个网络弱点走下来,我的腿和我的腹部。 wenwen.soso.com 8. It turns out that nearly all software vulnerabilities are caused by a relatively small set of common mistakes. 事实证明几乎所有软件的安全性漏洞都是由相对较小的一组常见错误引起的。 www.ibm.com 9. Such tools, called vulnerability checking tools, detect the potential vulnerabilities in advance. 此类工具称为漏洞检查工具,它们能预先检测出潜在的漏洞。 www.ibm.com 10. In essence the criminal hackers are looking to break the application quickly by testing a lot of known vulnerabilities. 实际上,这些不怀好意的黑客就是为了测试多个未知的漏洞,从而迅速地破解应用程序。 space.cnblogs.com 1. Even so, the sheer numbers of vulnerabilities that Wu has found may be troubling, particularly in Apple's software. 尽管如此,但是这些由Wu所发现的为数不少的漏洞仍然可能会他带来麻烦,特别是苹果软件上的漏洞。 www.bing.com 2. Smallness brings its own challenges and vulnerabilities. 其规模之小给自身带来了挑战和劣势。 www.ftchinese.com 3. These vulnerabilities, to imported cases, to disrupted economies and businesses, affect all countries. 这些疾病易传入的弱点中断了商务经济,影响了所有国家。 www.bing.com 4. This article gives practical advice on dodging Web services vulnerabilities while speeding up your Ajax applications. 本文介绍一些实用的建议,帮助您在避开Web服务漏洞的同时改善Ajax应用程序的性能。 www.ibm.com 5. If the values for this column come from user input, be sure to validate the values to reduce security vulnerabilities. 如果该列的值来自用户输入,请务必验证这些值以减少安全漏洞。 msdn2.microsoft.com 6. RealNetworks, Inc. Releases Update to Address Security Vulnerabilities. RealNetworks,Inc.发布更新以弥补安全性漏洞。 service.real.com 7. Vulnerabilities are detected by comparing SQL commands issued in the presence of attacks with the ones previously learned. 漏洞是探测到SQL命令比较发行的额外攻击的存在已经学过的。 wenwen.soso.com 8. Scan each system discovered to uncover vulnerabilities, and move toward exploiting the vulnerability. 扫描发现的每个系统,发现漏洞并利用该漏洞。 www.ibm.com 9. Vulnerable virtual machine template images cause OS or application vulnerabilities to spread over many systems. 有漏洞的虚拟机模板镜像会导致许多操作系统或应用程序上的漏洞传播到更多系统。 www.infoq.com 10. It equally shows up the projects which are slow to respond to vulnerabilities. 它同时显示了那些对于攻击反应迟钝的项目。 www.bing.com 1. Code Search could also allow code auditors to warn people of vulnerabilities in a program much faster. 代码搜索还可以使代码审查者更快捷地警告人们程序中存在的漏洞。 blog.sina.com.cn 2. After putting the assets together, you then identify and assess vulnerabilities on a regular schedule. 整理资产之后,您可按照常规来识别和评估漏洞。 www.ibm.com 3. Thus the supporting services and API functions share many vulnerabilities with the Web applications layer. 因此,配套服务和API函数也具有Web应用程序层的许多漏洞。 www.infoq.com 4. Discuss vulnerabilities and security flaws on this public mailing list. 在这个公共邮件列表中讨论漏洞和安全隐患。 www-128.ibm.com 5. RealNetworks takes all security vulnerabilities very seriously. 但RealNetworks将严肃对待所有安全性漏洞。 service.real.com 6. An Automated Approach for Identifying Potential Vulnerabilities in Software. 摘要:介绍了一种识别软件中存在的潜在脆弱性的自动化错误注入方法。 www.itsec.gov.cn 7. Improper disposal can cause the wrong handle to be used, which often leads to security vulnerabilities. 不适当的处理可能导致使用错误的句柄,这通常会造成安全弱点。 msdn2.microsoft.com 8. Your goal is to mitigate the risks of exploiting vulnerabilities to an acceptable level. 您的目标是将漏洞被利用的风险减轻到可接受的程度。 www.ibm.com 9. It shows that the complexity of such systems creates a large seedbed of potential vulnerabilities. 这表明了这类系统本身的复杂性为产生潜在的安全漏洞创建了一个大温床。 www.infoq.com 10. Using the URL for access control, or security-sensitive decisions can expose your application to canonicalization security vulnerabilities. 使用URL进行访问控制或安全敏感性决策会将应用程序暴露在规范化安全漏洞之下。 msdn2.microsoft.com 1. Hence, it is necessary to develop a software can detect the script vulnerabilities positively to deal with network security. 所以,制作一个能够主动检测脚本漏洞的软件以应对网络安全的这一问题是很有必要的。 e6top.com 2. This TAI addresses the security vulnerabilities in the previous TAI and is preferred. 这种TAI解决了前一种TAI的安全漏洞,应该优先选用它。 www.ibm.com 3. The purpose of Web application security design is to eliminate vulnerabilities. Web应用程序安全设计的目的是消除漏洞。 www-128.ibm.com 4. from UNKNOWN vulnerabilities in the system and user programs. 来自未知的漏洞,在系统和用户程序。 bbs.kafan.cn 5. This update resolves vulnerabilities in Microsoft Virtual Machine (Microsoft VM). 此更新解决Microsoft虚拟机(MicrosoftVM)中的漏洞问题。 www.microsoft.com 6. In practical applications, we need to effectively detect these vulnerabilities and avoid the disclosure of security information. 在现实的应用中,我们需要有效地检测测这些漏洞并加以解决,避免安全信息的泄露。 www.fabiao.net 7. AppDetectivePro discovers, examines, reports and proposes fixes for database security vulnerabilities and misconfigurations. AppDetectivePro发现、审查、报告并提出数据库的安全漏洞和错误配置。 www.etiri.com.cn 8. These vulnerabilities determine that it is a long term for African civil societies to attain their development and maturity. 这种脆弱性决定了非洲公民社会的发展和完善将是一个长期过程。 qk.cass.cn 9. What sectors and sites remain most vulnerable to terrorist attacks, and in what priority should these vulnerabilities be addressed? 哪些区域和场所最易遭受恐怖袭击,对此,我们应该给这些地区哪些优先政策? www.bing.com 10. This tool only for technological research and validating vulnerabilities in the test environment. 本工具仅用于试验环境的技术研究以及漏洞的验证。 bbs.ahu.edu.cn 1. Keep yourself informed about the latest attack techniques and vulnerabilities affecting your platform. 跟踪攻击技术的最新发展,以及你使用的平台的最新安全漏洞。 blog.163.com 2. If the vulnerabilities of each asset change before the due time for another assessment, repeat the first two steps. 如果任何资产的漏洞在另一次预计评估时间之前发生变化,则重复前两个步骤。 www.ibm.com 3. This section also points out vulnerabilities in the evidence collection process, and cases that are difficult to handle. 同时,对调查取证中的薄弱环节、执法容易出现偏差的地方,也进行了详细规定。 www.dachengnet.com 4. In this article, I discuss principles for managing XML deployment to avoid such vulnerabilities. 在本文中,我们讨论了为了避免出现这种缺陷而对管理XML部署所采用的一些准则。 www.ibm.com 5. But Friedberg is an honest enough observer to also point to China's own vulnerabilities. 但弗里德伯格是一个足够诚实的观察人士,他也指出了中国自身的弱点。 www.ftchinese.com 6. At present, however, the computer system security the biggest threat is itself vulnerabilities. 目前来看,对计算机系统安全威胁最大的就是本身的漏洞。 wenwen.soso.com 7. Because you want to use the fuzzing feature to test for vulnerabilities, first look at where the different vulnerabilities can exist. 由于您想要使用fuzzing特性来测试漏洞,所以首先来看哪些地方可以存在各种不同的漏洞。 www.ibm.com 8. In the past three years the authorities have addressed some systemic vulnerabilities that were revealed by the Lehman drama (say with CDS). 过去3年,相关部门已经解决了雷曼闹剧(比方说CDS)所揭示出的一些系统性缺陷。 www.ftchinese.com 9. Vulnerabilities in file format handling are increasingly being uncovered. 越来越多的文件格式处理不当漏洞被发现和曝光。 mirror.dream4ever.org 10. A plethora of e-mail content security technologies have emerged in recent years to address such vulnerabilities. 最近几年已经有太多旨在解决此类漏洞而产生的电子邮件内容安全的技术了。 blog.sina.com.cn 1. A more important concern, in turn, is that the large amount of traffic exposes Ajax applications to Web services vulnerabilities. 而更严重的问题是,大量的通信会使Ajax应用程序受到Web服务漏洞的威胁。 www.ibm.com 2. Recommendation 3 Detected with system maintenance tools you did not have vulnerabilities, if a re-patched. 建议3用系统维护工具检测一下有没有系统漏洞,如果有重新打上补丁。 wenwen.soso.com 3. Individual incidents, trends and patterns in attacks, and vulnerabilities that can be exploited. 个别事件,趋势和模式的攻击,以及可以利用的漏洞。 blog.sina.com.cn 4. Most services are likely Web services, which share many vulnerabilities with Web applications. 大多数服务都可能是Web服务,从而也具有许多Web应用程序漏洞。 www.infoq.com 5. These vulnerabilities allow hackers to remotely access all data on a personal computer. 新的漏洞可以让攻击者远程控制用户的所有数据。 www.chinadaily.com.cn 6. But this both couples them to, and exacerbates, the vulnerabilities of the deficit economies. 但是这更加剧恶化了脆弱的赤字经济。 www.bing.com 7. They are ask users to "treat it with a sceptical eye, and report bugs and vulnerabilities. " 他们要求用户要带着怀疑的眼光来使用,并随时报告使用中的故障和弱点。 www.suiniyi.com 8. A risk is the likelihood of a threat agent taking advantage of one or more vulnerabilities. 风险是构成威胁的个体利用一个或多个漏洞的可能性。 www.ibm.com 9. CLASP will be updated periodically to reflect any new classes of vulnerabilities that researchers may discover. CLASP将会阶段性的更新以反映研究员可能发现的任何新类。 www.ibm.com 10. Vulnerabilities exist at entry and exit points in the system. 弱点存在于系统的入口和出口。 www.ibm.com 1. White-hat hacking Experts hired by companies to test their websites or email systems for vulnerabilities. 白帽黑客专家,指公司雇佣专家去测试他们的官网网站或email系统是否易受攻击。 www.bing.com 2. A risk is the loss potential or probability that a threat will exploit vulnerabilities of a cloud service. 风险就是黑客利用云服务的漏洞可能导致的损失或发生这种情况的可能性。 www.ibm.com 3. Finally, Web-application vulnerabilities for the cloud space. 最后一点,Web应用在云计算领域的脆弱性。 www.infoq.com 4. Higher results give you information about the creature's powers, resistances, and vulnerabilities. 更高的检定结果可以让你知道这只生物的能力,抗力,和弱点。 www.anetcity.com 5. The following six threat categories can help you identify vulnerabilities and potential attack vectors in your own applications. 以下六种威胁类别可以帮助您确定自己的应用程序中的漏洞以及可能受到的攻击范围。 msdn2.microsoft.com 6. If this property is set dynamically using user input, be sure to validate the value to reduce security vulnerabilities. 如果该属性是使用用户输入动态设置的,请务必验证它的值以减少安全漏洞。 msdn2.microsoft.com 7. Buffer overflow vulnerabilities can be prevented in C and C with knowledge, caution, and tools. 借助知识、谨慎和工具,C和C 中的缓冲区溢出缺陷是可以防止的。 www.ibm.com 8. This leaves the many more mundane but less rectifiable vulnerabilities in American society. 这给美国社会留下了很多更平淡无奇或更难以矫正的脆弱性。 www.bing.com 9. Vulnerability Scanning is the process of identifying known vulnerabilities of computing systems on the network. 漏洞扫描是指识别网络上的计算机系统的已知漏洞的过程。 zhidao.baidu.com 10. Now that we have working definitions for these terms, let's look at some of the misconceptions that lead to vulnerabilities. 既然我们已经清楚了这些术语的定义,那么让我们来研究一下可能导致漏洞的误解。 www.ibm.com 1. With this information in hand, you can then check these vulnerabilities and defend against them. 有了这些信息,就可以检查这些漏洞并进行防御。 www.ibm.com 2. However, cross-tenant access vulnerabilities are relevant for all three resource types. 然而,跨租户访问漏洞就与所有三种类型的资源都有关系。 www.infoq.com 3. Researchers also found security vulnerabilities in the software. 研究人员还发现了软件中存在的安全漏洞。 chinese.wsj.com 4. Consider establishing a newsfeed for new threats and vulnerabilities. 可以考虑通过新闻feed了解新的威胁和漏洞。 www.ibm.com 5. A mashup application or page must address CSRF, Ajax vulnerabilities, XSS, and other potential security weaknesses. mashup应用程序或页面必须解决CSRF、Ajax漏洞、XSS和其他潜在的安全漏洞。 www.ibm.com 6. Vulnerabilities influence the loss event frequency. 而漏洞则对造成损害的事件的发生频率具有影响。 www.infoq.com 7. For some types of vulnerabilities the Fink Core Team might choose to take immediate action. 对一些脆弱性的问题Fink核心团队可能会采取立即的行动。 www.finkproject.org 8. Will people focus on your value or your vulnerabilities? 那人们是会关注你的价值还是弱点呢? www.bing.com 9. Microsoft has released a patch that eliminates two security vulnerabilities in Microsoft Windows Media Player for Windows XP MPXP. Microsoft已发布了一个修补程序,消除了MicrosoftWindowsMediaPlayerforWindowsXPMPXP中的两个安全漏洞。 www.microsoft.com 10. SQL Critical Update will fix vulnerabilities that it discovers; it cannot be used to simply disable an instance of SQL Server. SQL关键更新将修复发现的漏洞;它不能用于禁用SQLServer实例。 www.microsoft.com 1. To accommodate a wider scope and range of threats, vulnerabilities, and risks in today's world we need to expand the risk life cycle. 为了处理当今世界中更大范围的威胁、漏洞和风险,我们需要对此风险生命周期进行扩展。 www.ibm.com 2. We need to constantly be looking at where are our vulnerabilities and what needs to be done to shore them up. 我们需要不断地去发现我们容易受攻击的薄弱环节,以及采取措施去巩固它们。 online.english61.com 3. They also addressed vulnerabilities in chrome access by remote hosts and file uploading. 他们还解决了通过远程主机和文件上传进行访问时而产生攻击的弱点。 www.infoq.com 4. We proposed a method to forbid attackers to exploit the buffer overflow vulnerabilities. 本文提出了一种阻止攻击者利用缓冲区溢出漏洞的方法。 lib.cqvip.com 5. But western officials are also having nightmares about the vulnerabilities of their own scieties. 但是,西方官员同样梦魇不断,因为本国社会也容易遭受类似攻击。 www.ftchinese.com 6. This update addresses those vulnerabilities. 此更新可以解决这些漏洞问题。 www.microsoft.com 7. This download addresses three vulnerabilities, the most serious of which could enable an attacker to gain control over an affected server. 此下载程序用于消除三个漏洞,最严重的情况是,这些漏洞可使攻击者控制受影响的服务器。 www.microsoft.com 8. But this concentration has created new vulnerabilities and forms of contagion risk. 但这种集中行动已带来了新的漏洞和风险蔓延形式。 www.ftchinese.com 9. SQL injection vulnerabilities are yet another class of input validation flaws. SQL注入攻击是另一种输入验证上的漏洞。 www.zhidun.com 10. These vulnerabilities raise the need for well-designed and adequately funded fiscal stimulus programs in many of MENA counties. 这些弱点进一步说明,许多中东和北非地区国家必须制定精心设计和有充分资金支持的财政刺激方案。 web.worldbank.org 1. You've probably heard this called cross-site scripting (XSS) vulnerabilities. 您可能听说过称为cross-sitescripting(XSS)的漏洞。 www.ibm.com 2. This message board still has a few security vulnerabilities. Can you spot them? 这个公告板还有几个安全漏洞。你能找出来吗? blog.nulltao.net 3. As SEOs, we know that search traffic has vulnerabilities and fluctuations that are out of our control. 作为SEO从业人士,我们都知道搜索流量脆弱并且容易波动,让人难以掌控。 www.bing.com 4. The rating agencies recently laid out two important vulnerabilities that might lead them to mark it down. 评级机构近来列出了两个可能导致其调降美国信用评级的重要弱点。 www.ftchinese.com 5. In fact, only two security vulnerabilities have been identified in the default installation over the past 10 years. 事实上,在过去的10年中,默认安装中仅发现了两个安全漏洞。 www.ibm.com 6. We'll look at how you can find the lines of code containing these vulnerabilities and eliminate them so the uptime availability stays high. 我们将着眼于您如何找到包含这些漏洞的代码行,并且消除漏洞,以便维持长久的正常运行时间。 www.ibm.com 7. This article provides a framework to secure these vulnerabilities. 本文提供了一个保护这些漏洞的框架。 www-128.ibm.com 8. A lack of clarity yields confusion, and this breeds vulnerabilities. 不清楚就会产生混乱,也就会引起安全隐患。 dictsearch.appspot.com 9. Other unpublicised vulnerabilities are common and could be used by a well-financed aggressor, experts said. 专家表示,其它未经公开的漏洞比比皆是,资金充裕的攻击者可能会加以利用。 www.ftchinese.com 10. The strike has exposed unexpected vulnerabilities in Honda's China supply chain. 本田的罢工事件暴露出本田中国公司供应链中令人意想不到的脆弱。 c.wsj.com 1. It cannot defend against vulnerabilities in third-party scripts or servers. 它不能抵御第三方脚本或服务器中的安全漏洞。 www.ibm.com 2. You can use this option to minimize the risk of security vulnerabilities in the AIX operating system. 可以使用这个选项尽可能降低AIX操作系统中的安全风险。 www.ibm.com 3. This analysis doesn't uncover internal application vulnerabilities, but does expose most others. 这一分析不会揭示内部应用程序漏洞,但会揭示其他大多数漏洞。 www.ibm.com 4. To mitigate these vulnerabilities, you need to conduct a vulnerability assessment. 要缓解这种漏洞,您需要执行漏洞评估。 www.ibm.com 5. Some vulnerabilities are not overly complex, and are thus easy for hackers to exploit. 一些脆弱点不太复杂,因而很容易被黑客利用。 www.ibm.com 6. So why are buffer overflow vulnerabilities still being produced? 所以,为什麽现在仍产生缓冲区溢位这种致命错误呢? www.ibm.com 7. Multiple security vulnerabilities exist in Microsoft Excel 2002 that could allow the elevation of rights. MicrosoftExcel2002中存在多个安全漏洞,这些漏洞可能允许提升权限。 www.microsoft.com 8. The current crisis exposed two huge vulnerabilities. 当前的危机暴露出两个软肋。 www.bing.com 9. XSS vulnerabilities represent a large portion of all the documented Web-site vulnerabilities in 2007 (see Resources). XSS漏洞代表2007年所有归档的Web站点的大部分漏洞(请参阅参考资料)。 www.ibm.com 10. That gives hackers a window of time in which to exploit those vulnerabilities. 这给了黑客利用这些漏洞的时间。 www.bing.com 1. And by building up reserves while avoiding foreign-currency debt, they've removed many of the vulnerabilities of the past. 而且,通过一边增加外汇储备一边避免外债,它们已经摆脱了许多过去的弱点。 www.bing.com 2. There are a number of tools that can help detect buffer overflow vulnerabilities before they're released. 有许多工具可以在缓冲区溢出缺陷导致问题之前帮助检测它们。 www.ibm.com 3. After you assess vulnerabilities, prioritize them according to business risk. 在评估漏洞之后,根据业务风险为其划分优先级。 www.ibm.com 4. Many intrusion vulnerabilities such as SQL injection, CSRF, and XSS are preventable using a comprehensive input-validation framework. 如果使用一个综合的输入验证框架,许多输入漏洞,如SQL注入、CSRF和XSS,都是可以避免的。 www.ibm.com 5. Before we take a closer look at cloud-specific vulnerabilities, however, we must first establish what a "vulnerability" really is. 然而,在我们仔细分析特定于云计算语境的漏洞之前,我们必须先确定到底什么才算得上是一个真正的“漏洞”。 www.infoq.com 6. A mass-mailing computer virus could also quickly begin using the vulnerabilities to spread. 一类垃圾邮件病毒也可能会马上利用这个漏洞,得以快速传播。 dream4ever.org 7. Yet, despite all these vulnerabilities, the Miro has inexplicably done quite well for itself. 然而,尽管有这些弱点,难以理解地是他为自身做得相当好。 blog.sina.com.cn 8. New vulnerabilities and new threats emerge. 出现了新漏洞和新威胁。 www.ibm.com 9. Most users' knowledge of security vulnerabilities of their systems is vague at best. 大多数使用者对于安全攻击的知识都很匮乏。 www.ibm.com 10. Hackers locate obscure software vulnerabilities which allow them to "overrun" the buffers with their own data. 黑客定位模糊不清软件漏洞,使它们能够“越位”缓冲器与自己的数据。 bbs.kafan.cn 1. "There are a lot of vulnerabilities, " admits an American general, "There are backups, but our space architecture is very fragile. " “还存在着许多弱点,”一名美国将军承认,“我们虽然有备用品,但我们的太空建筑还很脆弱。” www.ecocn.org 2. The second step is to identify vulnerabilities that a hacker or attacker could maliciously exploit. 第二步是确定电脑黑客或攻击者可能恶意攻击的漏洞。 www.ibm.com 3. Are there other vulnerabilities? Nobody will know until Vista is more widely used. 只有Vista被广泛使用后才会知道是否还会有其他漏洞。 www.ecocn.org 4. Check for vulnerabilities of your computer systems: Warning! The test found visible port(s) on your system: 21, 23, 80, 1080, 3128. 检查您的计算机系统是否有漏洞:警告!本测试发现您的系统存在可见端口:21、23、80、1080、3128。 bbs.kafan.cn 5. This is of particular concern for prevention of Wi-Fi vulnerabilities. 这是对预防Wi-Fi弱点的特别关注。 www-128.ibm.com 6. Are there any serious vulnerabilities on the list? 列表上有没有提到什么严重的安全性漏洞? www-128.ibm.com 7. Sites such as Security Focus (see Resources) collect information on a number of exploits and vulnerabilities and are worth watching. SecurityFocus(参见参考资料)之类的站点收集了大量有关攻击和安全漏洞的信息,值得一看。 www.ibm.com 8. It, too, is intended to trap malware as itexploits vulnerabilities and gains a copy ofthat malware for further analysis. 该工具也是用来捕获恶意软件的,并能截获恶意软件的副本以便于进一步的分析之用。 www.bing.com 9. For example, someone may scan your Web server with the intention of finding exposed services or other vulnerabilities that can be exploited. 例如,某人可能扫描您的Web服务器,其目的是找到暴露的服务或其他可以利用的漏洞。 www.ibm.com 10. These weaknesses of coding in Web 2. 0 sites are known in the security industry as cross-site scripting, or XSS vulnerabilities. 网络安全业内将Web2.0网站内的这些编码缺陷,称为跨站脚本(XSS)或跨站脚本漏洞。 www.ftchinese.com |
随便看 |
|
英汉双解词典包含2704715条英汉词条,基本涵盖了全部常用单词的翻译及用法,是英语学习的有利工具。