• The solution also provides vulnerability assessment and configuration-auditing capabilities that enable DBAs to directly evaluate the security of their databases.

    解决方案提供漏洞评估配置审计功能让 DBA 可以直接评估数据库安全性

    youdao

  • "Microsoft is continuing its investigation of public reports of attacks against a new vulnerability in IE," the company said in a security alert updated yesterday.

    微软昨天更新安全警报,“我们正在出现的IE漏洞报告进行调查。”

    youdao

  • In this case the recipe would add all the necessary code in the right places, greatly reducing the chance of a mistake leading to a runtime failure or security vulnerability.

    这种情况下,recipe正确位置添加所有必要的代码这会显著减少导致运行失败安全脆弱性错误机会

    youdao

  • The immediate cause of the vulnerability was that one of Sendmail's security checks was flawed, permitting a buffer overflow.

    造成漏洞直接原因Sendmail的一个安全检测有缺陷的,可以发生缓冲区溢出

    youdao

  • Vulnerability scanning helps to identify any potential security holes in either the operating system or in the configuration of Lotus Domino.

    漏洞攻击扫描有助于识别操作系统LotusDomino配置潜在安全漏洞

    youdao

  • Let's take a look at three containers, each of which is associated with a response type that you could use in describing application security vulnerability in a Web service.

    我们检查一下三种容器其中任意一种Web服务用于描述应用程序安全漏洞响应类型相关

    youdao

  • According to the site, vulnerability phyla are classified into "seven plus one" pernicious kingdoms presented in the order of importance to software security

    根据这个站点分类,任何漏洞可以归类下面这个”7+1“个的致命“,下面的些”界“的先后顺序是按照影响软件安全的程度从高到低排序的。

    youdao

  • While the OWASP Top Ten list, presented by InfoQ, focuses on web application security risks, the CWE Top 25 covers a broader range of issues including the famous buffer overrun vulnerability.

    InfoQ中发布过owaspTop10列表,它所关注web应用程序安全风险,而CWE的Top25覆盖范围广,包括著名缓冲区溢出缺陷

    youdao

  • Each entry in the database includes a brief description of the security vulnerability or exposure and any pertinent references.

    这个数据库中的每个条目包含安全漏洞简要说明相关参考资料

    youdao

  • We can also describe computer vulnerability - that is, security-related bugs that you close with vendor-provided patches - as a weakening or removal of a certain resistance strength.

    我们可以计算机漏洞描述成——也就是可以供应商所提供的补丁来弥补的安全相关错误——某种抵抗能力的弱化消失。

    youdao

  • Memcpy joins the ranks of other popular functions like strcpy, strncpy, strcat, strncat which were banned due to their security vulnerability through buffer overruns.

    memcpy加入到strcpy,strncpy,strcat,strncat常用函数队伍中,都是由于通过缓存溢出进行安全攻击而被禁用

    youdao

  • The web vulnerability scanner crawls the website, to discover all the files and inputs present in that website, and then launches a number of security checks against those discovered objects.

    Web漏斗扫描器抓取站点信息,找出所有站点中的相关文件可输入点这些发现对象目标发起大量安全检查

    youdao

  • Econolite’s StrongPoint network security appliance was recently the subject of an ITS network vulnerability assessment and penetration test performed by Sword & Shield Enterprise Security.

    美国Econolite公司开发StrongPoint网络安全装置最近接受Sword&Shield企业安全公司的智能交通系统(ITS易损性评估渗透性试验

    youdao

  • The essence of software vulnerability is to exploit and affect system security.

    软件脆弱性本质利用该脆弱性可以影响系统安全

    youdao

  • After all, the Internet of things involves multiple levels of security, the need for continuous scanning vulnerability technology.

    毕竟物联网涉及多个层次安全需要持续扫描漏洞技术

    youdao

  • Vulnerability scanning technology is an emerging technology, to solve it from another angle issue of network security.

    漏洞扫描技术门新兴的技术,另一个角度解决网络安全问题

    youdao

  • From the current point of view, their vulnerability to operating system of many enterprises has been neglected, leading to hackers, malware swoop, caused serious harm to enterprise security.

    目前来看很多企业一直忽略操作系统自身漏洞导致黑客恶意程序趁虚而入企业安全造成了严重危害

    youdao

  • First, we outlined the basic principle of this method. Then, this paper presented how this method applied to the evaluation of security vulnerability.

    首先介绍方法基本原理然后介绍方法在安全漏洞评估中的具体实现。

    youdao

  • The research on computer vulnerabilities and the building of the vulnerability database are significant in improving system's security and reducing computer security incidents.

    计算机系统安全漏洞研究以及漏洞建设对于提高系统安全性减少安全事件发生具有重要意义。

    youdao

  • The research on computer vulnerabilities and the building of the vulnerability database are significant for improving system's security and reducing computer security incidents.

    计算机系统安全漏洞研究以及漏洞建设对于提高系统安全性减少安全事件发生具有重要意义。

    youdao

  • Security requirement analysis is a very important part of software vulnerability analysis technology, it points out the analysis direction and improves efficiency.

    安全需求分析软件漏洞分析重要一个环节,能够指明分析的方向提高分析的效率。

    youdao

  • Network security leak scan and vulnerability analysis are the base of system security evaluation and the essential components of Information security system.

    网络安全漏洞扫描脆弱性分析进行系统安全评估基础信息安全保障体系中的必要组成部分

    youdao

  • In this paper, a scalable network vulnerability scanner system is presented, which can respond quickly to the latest discovered security holes, and greatly improve the defense capability of systems.

    提出一种可扩展网络弱点扫描系统能够在较短的时间内发现安全问题迅速做出反应极大地提高系统的安全防御能力

    youdao

  • All that is required is the target person's cellphone number, a computer and some knowledge of how cellular networks work, said the report, which aimed to spotlight a security vulnerability.

    报告所需只是跟踪目标手机号码台计算机一些关于手机网络运行知识。报告旨在曝光安全漏洞。

    youdao

  • This paper analyzes authentication and key distribution protocol of the procedure and security of UMTS. The vulnerability and possible attack to this protocol are described.

    详细分析了UMTS认证密钥分配协议过程以及协议的安全性,找出协议中存在弱点可能攻击,提出了公钥加密协议的改进方法。

    youdao

  • Multi-factors defined in CC are replaced by MTSF(mean time to security failure) as the metric of vulnerability complexity.

    把CC评估标准定义多个变量映射为平均安全时间参数的度量指标

    youdao

  • You may not probe, scan or test the vulnerability of the Site or any network connected to the Site, nor breach the security or authentication measures on the Site or any network connected to the Site.

    可以探查扫描测试网站连接网站任何网络漏洞也不可以违反网站或连接到网站的任何网络安全性身份验证措施

    youdao

  • Have studied the vulnerability of the network and security countermeasure of vulnerability and established the foundation further for the online security respect.

    网络安全方面进一步研究网络脆弱性以及脆弱性安全对策奠定了基础

    youdao

  • With the application and spread of the classification protection, Network Security Vulnerability Scanning should consider the efficiency and the function expansion.

    随着等级保护应用普及网络安全漏洞扫描充分考虑执行效率和功能扩展性问题。

    youdao

  • Then, we introduced the technology of network security detection in common secure scanner including the remote OS detection, port scanning and vulnerability scanning based on using plug-in.

    然后介绍了现阶段安全扫描软件所采用安全扫描技术,介绍远程操作系统识别技术、端口扫描技术,并分析研究了基于插件的漏洞扫描技术。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定