The solution also provides vulnerability assessment and configuration-auditing capabilities that enable DBAs to directly evaluate the security of their databases.
解决方案还提供漏洞评估和配置审计功能,让 DBA 可以直接评估数据库的安全性。
"Microsoft is continuing its investigation of public reports of attacks against a new vulnerability in IE," the company said in a security alert updated yesterday.
微软在昨天更新的安全警报中说,“我们正在对新出现的IE漏洞报告进行调查。”
In this case the recipe would add all the necessary code in the right places, greatly reducing the chance of a mistake leading to a runtime failure or security vulnerability.
在这种情况下,recipe会在正确的位置添加所有必要的代码,这会显著减少导致运行失败或安全脆弱性的错误机会。
The immediate cause of the vulnerability was that one of Sendmail's security checks was flawed, permitting a buffer overflow.
造成这一漏洞的直接原因是,Sendmail的一个安全检测是有缺陷的,可以发生缓冲区溢出。
Vulnerability scanning helps to identify any potential security holes in either the operating system or in the configuration of Lotus Domino.
漏洞攻击扫描有助于识别操作系统或LotusDomino配置中潜在的安全漏洞。
Let's take a look at three containers, each of which is associated with a response type that you could use in describing application security vulnerability in a Web service.
让我们检查一下三种容器,其中任意一种都与您在Web服务中用于描述应用程序安全漏洞的响应类型相关。
According to the site, vulnerability phyla are classified into "seven plus one" pernicious kingdoms presented in the order of importance to software security
根据这个站点的分类,任何一个漏洞”门“都可以归类到下面这个”7+1“个的致命”界“,下面的些”界“的先后顺序是按照影响软件安全的程度从高到低排序的。
While the OWASP Top Ten list, presented by InfoQ, focuses on web application security risks, the CWE Top 25 covers a broader range of issues including the famous buffer overrun vulnerability.
曾在InfoQ中发布过owaspTop10列表,它所关注的是web应用程序的安全风险,而CWE的Top25的覆盖范围更广,包括著名的缓冲区溢出缺陷。
Each entry in the database includes a brief description of the security vulnerability or exposure and any pertinent references.
这个数据库中的每个条目包含对安全漏洞的简要说明和相关的参考资料。
We can also describe computer vulnerability - that is, security-related bugs that you close with vendor-provided patches - as a weakening or removal of a certain resistance strength.
我们可以还把计算机的漏洞描述成——也就是你可以用供应商所提供的补丁来弥补的安全相关错误——某种抵抗能力的弱化或消失。
Memcpy joins the ranks of other popular functions like strcpy, strncpy, strcat, strncat which were banned due to their security vulnerability through buffer overruns.
memcpy加入到strcpy,strncpy,strcat,strncat等常用函数的队伍中,都是由于可通过缓存溢出进行安全攻击而被禁用。
The web vulnerability scanner crawls the website, to discover all the files and inputs present in that website, and then launches a number of security checks against those discovered objects.
Web漏斗扫描器抓取站点信息,找出所有站点中的相关文件和可输入点,并对这些发现的对象目标发起大量的安全检查。
Econolite’s StrongPoint network security appliance was recently the subject of an ITS network vulnerability assessment and penetration test performed by Sword & Shield Enterprise Security.
美国Econolite公司开发的StrongPoint网络安全装置最近接受了Sword&Shield企业安全公司的智能交通系统(ITS)易损性评估和渗透性试验。
After all, the Internet of things involves multiple levels of security, the need for continuous scanning vulnerability technology.
毕竟物联网涉及多个层次的安全,需要持续扫描漏洞的技术。
Vulnerability scanning technology is an emerging technology, to solve it from another angle issue of network security.
漏洞扫描技术是一门新兴的技术,它从另一个角度解决网络安全问题。
From the current point of view, their vulnerability to operating system of many enterprises has been neglected, leading to hackers, malware swoop, caused serious harm to enterprise security.
从目前来看,很多企业一直忽略的操作系统自身漏洞,导致黑客、恶意程序趁虚而入,给企业安全造成了严重危害。
First, we outlined the basic principle of this method. Then, this paper presented how this method applied to the evaluation of security vulnerability.
首先介绍了此方法的基本原理,然后介绍了该方法在安全漏洞评估中的具体实现。
The research on computer vulnerabilities and the building of the vulnerability database are significant in improving system's security and reducing computer security incidents.
计算机系统安全漏洞的研究以及漏洞库的建设,对于提高系统安全性、减少安全事件发生具有重要意义。
The research on computer vulnerabilities and the building of the vulnerability database are significant for improving system's security and reducing computer security incidents.
计算机系统安全漏洞的研究以及漏洞库的建设,对于提高系统安全性,减少安全事件发生具有重要意义。
Security requirement analysis is a very important part of software vulnerability analysis technology, it points out the analysis direction and improves efficiency.
安全需求分析是软件漏洞分析中极重要的一个环节,能够指明分析的方向,提高分析的效率。
Network security leak scan and vulnerability analysis are the base of system security evaluation and the essential components of Information security system.
网络安全漏洞扫描与脆弱性分析是进行系统安全评估的基础和信息安全保障体系中的必要组成部分。
In this paper, a scalable network vulnerability scanner system is presented, which can respond quickly to the latest discovered security holes, and greatly improve the defense capability of systems.
提出一种可扩展的网络弱点扫描系统能够在较短的时间内对新发现的安全问题迅速做出反应,极大地提高了系统的安全防御能力。
All that is required is the target person's cellphone number, a computer and some knowledge of how cellular networks work, said the report, which aimed to spotlight a security vulnerability.
报告称,所需的只是跟踪目标的手机号码,一台计算机和一些关于手机网络运行的知识。报告旨在曝光安全漏洞。
This paper analyzes authentication and key distribution protocol of the procedure and security of UMTS. The vulnerability and possible attack to this protocol are described.
详细分析了UMTS认证和密钥分配协议的过程以及协议的安全性,找出协议中存在的弱点和可能的攻击,提出了公钥加密协议的改进方法。
Multi-factors defined in CC are replaced by MTSF(mean time to security failure) as the metric of vulnerability complexity.
把CC评估标准定义的多个变量映射为以平均安全时间为参数的度量指标。
You may not probe, scan or test the vulnerability of the Site or any network connected to the Site, nor breach the security or authentication measures on the Site or any network connected to the Site.
您不可以探查、扫描或测试网站或连接到网站的任何网络的漏洞,也不可以违反网站或连接到网站的任何网络上的安全性或身份验证措施。
Have studied the vulnerability of the network and security countermeasure of vulnerability and established the foundation further for the online security respect.
为网络安全方面进一步研究网络脆弱性以及脆弱性的安全对策奠定了基础。
With the application and spread of the classification protection, Network Security Vulnerability Scanning should consider the efficiency and the function expansion.
随着等级保护的应用和普及,网络安全漏洞扫描需充分考虑执行效率和功能的扩展性问题。
Then, we introduced the technology of network security detection in common secure scanner including the remote OS detection, port scanning and vulnerability scanning based on using plug-in.
然后,介绍了现阶段安全扫描软件所采用的安全扫描技术,介绍了远程操作系统识别技术、端口扫描技术,并分析研究了基于插件的漏洞扫描技术。
Another facet of your system's vulnerability would relate to the communications protocol being used and what security mechanisms it supports.
您的系统的弱点另一个小平面与使用的通信协议将关连,并且什么安全机制它支持。
应用推荐