What's a vulnerability scanner?
什么是漏洞扫描器?
Which is the best web vulnerability scanner out there?
最好的web漏洞扫描器应该是什么样的?
It has a Vulnerability Scanner and a series of security tools.
它有漏洞扫描器和一系列的安全工具。
How can I find out which web vulnerability scanner best suites my needs?
如何获知哪一款web漏洞扫描器适合需要?
In network security, the vulnerability scanner will find the hidden vulnerability.
在网络安全中漏洞扫描起着发现安全隐患的作用。
The network vulnerability scanner based on port scanning and plugin is proposed in this article.
本文提出了基于端口扫描和插件的网络漏洞扫描器模型。
Secondly, you should also check how many actual vulnerabilities the web vulnerability scanner discovered.
其次,你应该检查web漏洞扫描器发现了多少实际存在的漏洞。
The location of patch files is important for realizing the host-based vulnerability scanner and patch-pushed system(HVSPS).
补丁文件定位是实现主机漏洞扫描及补丁推送系统的关键。
Secondly, the dissertation analyzed and induced network vulnerability scanners' functions, and presented a CIM model of the scanner.
在分析和归纳网络漏洞扫描系统功能的基础上,构建了其对应的CIM通用模型。
A vulnerability scanner is similar to other types of scanners-for example, port scanners help secure the network and the systems on it.
漏洞扫描器类似于其他类型的扫描器——例如,端口扫描器有助于保障端口上的网络和系统的安全。
A web vulnerability scanner is a complex piece of software, and discovering vulnerabilities in a website can be a difficult and long process.
Web漏洞扫描器是功能复杂的软件,用它去发现站点中的漏洞的过程是漫长而艰辛的。
The dissertation studied the management information modeling method based on CIM, then presented a CIM model of network vulnerability scanner.
本文对基于CIM的管理信息建模方法进行了研究,提出了一个网络漏洞扫描系统的CIM管理信息模型。
The Nessus vulnerability scanner provides several important scanning features, such as high-speed discovery, asset profiling, and vulnerability analysis.
Nessus漏洞扫描器提供几个重要的扫描特性,比如高速发现、资产概况和漏洞分析。
The Nessus vulnerability scanner provides several important scanning features, such as high-speed discovery, asset profiling, and vulnerability analysis.
Nessus漏洞扫描器提供几个重要的扫描特性,比如高速探测、资产分析和漏洞分析。
Simply put, a vulnerability scanner is a piece of software specifically designed to search for and reveal weaknesses in an application or operating system.
简言之,漏洞扫描器是专门设计用于查找和暴露应用程序和操作系统中的弱点的软件。
The crawling process is the most crucial part of the scan, so you should always make sure that the web vulnerability scanner is able to crawl all of the website’s objects and inputs.
这个抓取的过程在扫描过程中是至关重要的一步,因此你要确定web漏洞扫描器能够抓取关于站点的所有对象和输入点。
The best way to find out which web vulnerability scanner suites your needs is to get your hands dirty and try them out yourself against a real life website that you will be securing.
最好的找到一款适合你的web漏洞扫描器软件套装的方法是,当你的站点出现问题的时候它能帮助你把站点变的安全。
In this interview we discuss the process of choosing a web vulnerability scanner and underline several factors that should be taken into consideration in the decision-making process.
在这篇访谈中,我们谈论了选择web漏洞扫描器的过程以及在选择的过程中应该注意的因素。
Each vulnerability scanner may perform its own scans and probes differently, but the result is more or less the same: a report or some sort of output informing you of the problems discovered.
每个扫描器可能都有自己的扫描和探测方法,但它们的结果都大同小异:报告所发现的问题或输出信息。
An automated web vulnerability scanner will definitely help you discover this parameter, understand how the web application works and USES such a parameter, but it will never discover flaw in it.
一款自动化web漏洞扫描器会很好的帮助你发现这个参数,并理解web应用是如何运用参数的,但是它永远不能发现应用中的缺陷。
The web vulnerability scanner crawls the website, to discover all the files and inputs present in that website, and then launches a number of security checks against those discovered objects.
Web漏斗扫描器抓取站点信息,找出所有站点中的相关文件和可输入点,并对这些发现的对象目标发起大量的安全检查。
In this paper, a scalable network vulnerability scanner system is presented, which can respond quickly to the latest discovered security holes, and greatly improve the defense capability of systems.
提出一种可扩展的网络弱点扫描系统能够在较短的时间内对新发现的安全问题迅速做出反应,极大地提高了系统的安全防御能力。
This paper made use of statistical results of vulnerability scanner and intrusion detection systems and presented method of qualitative evaluation of security vulnerability based on fuzzy data fusion.
利用漏洞扫描器及入侵检测系统的统计结果两方面信息 ,提出了应用模糊信息融合对安全漏洞进行定性评估的方法 。
Then, we introduced the technology of network security detection in common secure scanner including the remote OS detection, port scanning and vulnerability scanning based on using plug-in.
然后,介绍了现阶段安全扫描软件所采用的安全扫描技术,介绍了远程操作系统识别技术、端口扫描技术,并分析研究了基于插件的漏洞扫描技术。
Then, we introduced the technology of network security detection in common secure scanner including the remote OS detection, port scanning and vulnerability scanning based on using plug-in.
然后,介绍了现阶段安全扫描软件所采用的安全扫描技术,介绍了远程操作系统识别技术、端口扫描技术,并分析研究了基于插件的漏洞扫描技术。
应用推荐