• Web漏洞扫描器能帮助我们修补漏洞吗?

    Can web vulnerability scanners help you remediate the vulnerability?

    youdao

  • 最好web漏洞扫描应该是什么样的?

    Which is the best web vulnerability scanner out there?

    youdao

  • 如何获知哪一web漏洞扫描适合需要

    How can I find out which web vulnerability scanner best suites my needs?

    youdao

  • 什么漏洞扫描

    What's a vulnerability scanner?

    youdao

  • 部署工控漏洞扫描系统及时发现工控系统漏洞

    Deployment of industrial vulnerability scanning system, industrial system vulnerabilities found in a timely manner.

    youdao

  • 叙述了CGI安全性CGI漏洞扫描原理

    Security problems and scan theory of CGI are described.

    youdao

  • 网络安全漏洞扫描起着发现安全隐患的作用。

    In network security, the vulnerability scanner will find the hidden vulnerability.

    youdao

  • 网络漏洞扫描方法分为直接测试推断认证测试。

    Hole scanning is divided into directly test, concluding and authentication test.

    youdao

  • 漏洞扫描发现软件相关问题强大工具比如配置补丁问题

    Vulnerability scanning can be a very powerful tool in the ongoing struggle to uncover problems relating to software, such as configuration and patching issues.

    youdao

  • 补丁文件定位实现主机漏洞扫描补丁推送系统关键

    The location of patch files is important for realizing the host-based vulnerability scanner and patch-pushed system(HVSPS).

    youdao

  • 对于正在评估web漏洞扫描应该读读这篇访谈文章。

    A must read interview for anyone who is interested in evaluating web vulnerability scanners.

    youdao

  • 其次应该检查web漏洞扫描发现了多少实际存在的漏洞

    Secondly, you should also check how many actual vulnerabilities the web vulnerability scanner discovered.

    youdao

  • 很多软件公司开发出web漏洞扫描,然后试用版的许可证。

    Most of the software companies developing web vulnerability scanners will willingly give you evaluation licenses.

    youdao

  • 基础之上,本文提出了一个基于木马体系结构漏洞扫描模型。

    NVS is based on Trojan horse architecture and facing to network attack.

    youdao

  • 漏洞扫描技术门新兴的技术,另一个角度解决网络安全问题

    Vulnerability scanning technology is an emerging technology, to solve it from another angle issue of network security.

    youdao

  • 互联网上找到很多关于web漏洞扫描信息他们性能指标

    You can also find a lot of information on the Internet about web vulnerability scanners and their performance.

    youdao

  • 目标系统漏洞信息的获取,目前主要是通过网络漏洞扫描工具实现的。

    Then it studies the network vulnerability scanning technology, witch includes port scanning, vulnerability scanning and dictionary attacking.

    youdao

  • 那么漏洞扫描目的什么? Metasploit如何进行漏洞扫描

    So, what's the purpose of vulnerability scanning, and how does Metasploit fit in?

    youdao

  • Nessus漏洞扫描提供几个重要扫描特性比如高速发现资产概况漏洞分析

    The Nessus vulnerability scanner provides several important scanning features, such as high-speed discovery, asset profiling, and vulnerability analysis.

    youdao

  • Nessus漏洞扫描提供几个重要扫描特性比如高速探测资产分析漏洞分析

    The Nessus vulnerability scanner provides several important scanning features, such as high-speed discovery, asset profiling, and vulnerability analysis.

    youdao

  • 最后作为网络漏洞扫描技术补充简要介绍讨论了系统脆弱性分析技术。

    Finally, as a complement to the leak scan technology, vulnerability analysis technology is also introduced and discussed briefly in the paper.

    youdao

  • 分析归纳网络漏洞扫描系统功能基础上,构建了其对应的CIM通用模型

    Secondly, the dissertation analyzed and induced network vulnerability scanners' functions, and presented a CIM model of the scanner.

    youdao

  • 简言之漏洞扫描专门设计用于查找暴露应用程序操作系统中的弱点软件

    Simply put, a vulnerability scanner is a piece of software specifically designed to search for and reveal weaknesses in an application or operating system.

    youdao

  • 目前主机安全检测方式主要利用自动化漏洞扫描工具进行检测和人工检测两种

    At present, there are two main methods of host security detection. One is detection by using automated vulnerability scanning tools, the other is manual detection.

    youdao

  • IaaS提供商可能允许基于网络漏洞扫描因为他们无法区分善意网络扫描攻击活动

    IaaS providers may not allow network-based vulnerability scanning because they have no way of distinguishing friendly network scans from attack activity.

    youdao

  • Web漏洞扫描功能复杂软件用它去发现站点中的漏洞过程漫长艰辛的。

    A web vulnerability scanner is a complex piece of software, and discovering vulnerabilities in a website can be a difficult and long process.

    youdao

  • Metasploit常规漏洞扫描器更进一步支持研究自己攻击交付机制

    Metasploit goes a step beyond regular vulnerability scanners: it provides you the ability to develop your own exploits and delivery mechanisms.

    youdao

  • 随着等级保护应用普及网络安全漏洞扫描充分考虑执行效率和功能扩展性问题。

    With the application and spread of the classification protection, Network Security Vulnerability Scanning should consider the efficiency and the function expansion.

    youdao

  • 漏洞扫描过程可以划分一系列步骤每个步骤都查找应用程序操作系统中的弱点所需关键任务

    The process of vulnerability scanning can be broken down into a series of steps, each of which is a vital task needed to locate the weaknesses in an application or operating system.

    youdao

  • 漏洞扫描过程可以划分一系列步骤每个步骤都查找应用程序操作系统中的弱点所需关键任务

    The process of vulnerability scanning can be broken down into a series of steps, each of which is a vital task needed to locate the weaknesses in an application or operating system.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定