管理员可能会向用户发送扫描报告,然后向这些用户提供修补程序以修补安全漏洞。
The administrator might send scan reports to users, and then push fixes to them to plug security holes.
漏洞扫描过程可以划分为一系列步骤,每个步骤都是查找应用程序或操作系统中的弱点所需的关键任务。
The process of vulnerability scanning can be broken down into a series of steps, each of which is a vital task needed to locate the weaknesses in an application or operating system.
在前一篇文章中(见参考资料),我讨论了如何使用漏洞扫描作为工具,以查找宿主和应用程序基础设施中存在的问题。
In previous articles (see Resources), I covered the topic of vulnerability scanning as a tool for finding problems in your hosting and application infrastructure.
简言之,漏洞扫描器是专门设计用于查找和暴露应用程序和操作系统中的弱点的软件。
Simply put, a vulnerability scanner is a piece of software specifically designed to search for and reveal weaknesses in an application or operating system.
尽管扫描程序是找到Web站点中可能存在的漏洞的很好方式,但是由于存在误报,最好的安全公司还总是要手动测试可能的漏洞。
Although scanners are a good way to find possible vulnerabilities in a Web site, the best security companies always test possible vulnerabilities by hand for false positives.
尽管扫描程序是找到Web站点中可能存在的漏洞的很好方式,但是由于存在误报,最好的安全公司还总是要手动测试可能的漏洞。
Although scanners are a good way to find possible vulnerabilities in a Web site, the best security companies always test possible vulnerabilities by hand for false positives.
应用推荐