• So, what's the purpose of vulnerability scanning, and how does Metasploit fit in?

    那么漏洞扫描目的什么? Metasploit如何进行漏洞扫描?

    youdao

  • AppDetectivePro has long set the standard for database vulnerability scanning, assessment and compliance capabilities.

    AppDetectivePro早已确立数据库脆弱性扫描评估履约能力标准

    youdao

  • Deployment of industrial vulnerability scanning system, industrial system vulnerabilities found in a timely manner.

    部署工控漏洞扫描系统及时发现工控系统漏洞

    youdao

  • Vulnerability scanning technology is an emerging technology, to solve it from another angle issue of network security.

    漏洞扫描技术门新兴的技术,另一个角度解决网络安全问题

    youdao

  • Vulnerability scanning helps to identify any potential security holes in either the operating system or in the configuration of Lotus Domino.

    漏洞攻击扫描有助于识别操作系统LotusDomino配置潜在安全漏洞

    youdao

  • Then it studies the network vulnerability scanning technology, witch includes port scanning, vulnerability scanning and dictionary attacking.

    目标系统漏洞信息的获取,目前主要是通过网络漏洞扫描工具实现的。

    youdao

  • IaaS providers may not allow network-based vulnerability scanning because they have no way of distinguishing friendly network scans from attack activity.

    IaaS提供商可能允许基于网络漏洞扫描因为他们无法区分善意网络扫描攻击活动

    youdao

  • Vulnerability scanning can be a very powerful tool in the ongoing struggle to uncover problems relating to software, such as configuration and patching issues.

    漏洞扫描发现软件相关问题强大工具比如配置补丁问题。

    youdao

  • In previous articles (see Resources), I covered the topic of vulnerability scanning as a tool for finding problems in your hosting and application infrastructure.

    前一篇文章中(参考资料),讨论如何使用漏洞扫描作为工具查找宿主应用程序基础设施存在的问题。

    youdao

  • At present, there are two main methods of host security detection. One is detection by using automated vulnerability scanning tools, the other is manual detection.

    目前主机安全检测方式主要利用自动化漏洞扫描工具进行检测和人工检测两种

    youdao

  • With the application and spread of the classification protection, Network Security Vulnerability Scanning should consider the efficiency and the function expansion.

    随着等级保护应用普及网络安全漏洞扫描充分考虑执行效率和功能扩展性问题。

    youdao

  • Although using Metasploit to perform your own vulnerability scanning is outside the scope of this article, many tutorials and books are available to help (see Resources).

    使用Metasploit进行漏洞扫描超出本文范围可以阅读多种教程书籍获得帮助(参见参考资料)。

    youdao

  • Because hackers want to find loopholes must first scan the vulnerability, so each company should be on its own network vulnerability scanning as a regular, regular process.

    因为黑客若想发现漏洞必须进行漏洞扫描因此每个公司应该自家网络的漏洞扫描作为一个常规的、定期的流程。

    youdao

  • The process of vulnerability scanning can be broken down into a series of steps, each of which is a vital task needed to locate the weaknesses in an application or operating system.

    漏洞扫描过程可以划分一系列步骤每个步骤都查找应用程序操作系统中的弱点所需关键任务

    youdao

  • Then, we introduced the technology of network security detection in common secure scanner including the remote OS detection, port scanning and vulnerability scanning based on using plug-in.

    然后介绍了现阶段安全扫描软件所采用安全扫描技术,介绍远程操作系统识别技术、端口扫描技术,并分析研究了基于插件的漏洞扫描技术。

    youdao

  • Also, standard tech-niques such as network-based vulnerability scanning are usually forbidden by IaaS providers because, for example, friendly scans can't be distinguished from at-tacker activity.

    此外标准的技术,基于网络漏洞扫描通常IaaS提供商禁止原因之一是无法友好的扫描攻击者的活动区别开来。

    youdao

  • The Nessus vulnerability scanner provides several important scanning features, such as high-speed discovery, asset profiling, and vulnerability analysis.

    Nessus漏洞扫描器提供几个重要扫描特性比如高速发现资产概况漏洞分析

    youdao

  • The Nessus vulnerability scanner provides several important scanning features, such as high-speed discovery, asset profiling, and vulnerability analysis.

    Nessus漏洞扫描器提供几个重要扫描特性比如高速探测资产分析漏洞分析

    youdao

  • After all, the Internet of things involves multiple levels of security, the need for continuous scanning vulnerability technology.

    毕竟物联网涉及多个层次安全需要持续扫描漏洞技术

    youdao

  • The network vulnerability scanner based on port scanning and plugin is proposed in this article.

    本文提出了基于端口扫描插件网络漏洞扫描器模型

    youdao

  • OS scanning is the prelude of hacker's attack by using OS vulnerability. Real-time detection of OS scanning is one main measure against hacker's intrusion using OS vulnerabilities.

    OS扫描黑客进行OS漏洞攻击前奏实时检测OS扫描是防止系统遭受OS漏洞攻击重要手段

    youdao

  • Network scanning is one of the methods of data acquisition in DNMAI, scanning result is some fundamental data for vulnerability analysis.

    网络扫描DNMAI数据采集方法种,扫描结果也是脆弱性分析基础数据之一。

    youdao

  • Network scanning is one of the methods of data acquisition in DNMAI, scanning result is some fundamental data for vulnerability analysis.

    网络扫描DNMAI数据采集方法种,扫描结果也是脆弱性分析基础数据之一。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定