正如今年的互联网安全漏洞的数量所显示,虚拟牧场和草类牧场一样容易受其影响。
As this year's crop of internet-security breaches shows, virtual pastures are just as prone to it as the grassy sort.
另一种是找到确保软件开发人员编写的代码中有更少的缺陷的方法,这样黑客就有更少的安全漏洞可以利用。
Another is to find ways to ensure that software developers produce code with fewer flaws in it so that hackers have fewer security holes to exploit.
这会在架构中造成严重的安全漏洞。
That would create a serious security hole in your architecture.
非常明显,这是一个潜在的安全漏洞。
这也是在虚拟世界的安全漏洞中的一个。
哪怕有安全漏洞被发现,我也不是太担心。
Even if a security hole is found, I'm not too worried about it.
针对安全漏洞,必须采用常规的负面测试用例。
General negative test cases, for security vulnerabilities, must be included. The list would include tests to ensure that.
这一改动填补了上周末出现的一个潜在安全漏洞。
This plugs a potential security hole that came to light over the weekend.
但是不正确的虚拟化管理也是一个潜在的安全漏洞。
But improperly managed virtualization is also a potential security vulnerability.
恶意软件像一盏聚光灯,投射到软件的安全漏洞上。
The malware casts a spotlight on several security weaknesses.
据估算,高达60%的安全漏洞是由用户错误引起的。
Mistakes by users are estimated to be responsible for as many as 60% of breaches of computer security.
它不能抵御第三方脚本或服务器中的安全漏洞。
It cannot defend against vulnerabilities in third-party scripts or servers.
没有升级的老浏览器都可能存在能被黑客利用的安全漏洞。
Old browsers that haven't been upgraded are likely to have security vulnerabilities that attackers can exploit.
这种TAI解决了前一种TAI的安全漏洞,应该优先选用它。
This TAI addresses the security vulnerabilities in the previous TAI and is preferred.
笔者已经详细的了解了西门子软件的安全漏洞在哪里。
Its authors had detailed knowledge of Siemens' software and its security weaknesses.
在对外部世界实现soa之前,应该决定您将如何处理安全漏洞。
Before implementing your SOA to the outside world, decide how you will handle a security breach.
事实上,在过去的10年中,默认安装中仅发现了两个安全漏洞。
In fact, only two security vulnerabilities have been identified in the default installation over the past 10 years.
还要知道,从流程输入消息指定人员解析结果可能会导致安全漏洞。
Also know that specifying staff resolution results from the process input message might lead to a security hole.
第二个安全漏洞与攻击者借助用户可管理数据来控制业务流程有关。
The second vulnerability has to do with using user-controllable data to control a business process.
安全漏洞经常植根于在意料之外的数据面前表现得不够健壮的程序中。
Security holes are often rooted in a program that isn't robust in the face of unexpected data.
值得庆幸的是,导致安全漏洞的很多编程错误在PHP中不可能存在。
The good news is many common programming errors that result in security holes simply aren't possible in PHP.
因此,如果您想要修复所有已知的安全漏洞,则需要保持累积修复最新。
Therefore you will need to keep up with cumulative fixes if you want all known security holes to be closed.
这个数据库中的每个条目包含对安全漏洞的简要说明和相关的参考资料。
Each entry in the database includes a brief description of the security vulnerability or exposure and any pertinent references.
有时,即使只是读入数据也可以是安全漏洞——甚至在数据被检查之前!
Sometimes, even just reading data can be a security vulnerability — before the data is even checked!
至少启用它们中的一个,可以有效地发现可能导致安全漏洞的编程错误。
Enabling at least one of them is a useful tool for finding programming errors that may result in security holes.
至少,安全漏洞响应计划应该包括联系人列表、初始响应团队和基本指示。
At a minimum, security breach response plans should include a list of contacts, an initial response team, and basic instructions.
其中的一些负面影响包括:用户挫折感,性能下降,安全漏洞等。
Some of the negative consequences include: user frustration, slowdowns in performance, and security vulnerabilities.
您应当作出明智的决策,确定服务提供商的托管位置以及存在的安全漏洞。
You should make informed decisions about where he will host and what his vulnerabilities will be.
您应当作出明智的决策,确定服务提供商的托管位置以及存在的安全漏洞。
You should make informed decisions about where he will host and what his vulnerabilities will be.
应用推荐