管理员可能会向用户发送扫描报告,然后向这些用户提供修补程序以修补安全漏洞。
The administrator might send scan reports to users, and then push fixes to them to plug security holes.
漏洞扫描过程可以划分为一系列步骤,每个步骤都是查找应用程序或操作系统中的弱点所需的关键任务。
The process of vulnerability scanning can be broken down into a series of steps, each of which is a vital task needed to locate the weaknesses in an application or operating system.
在前一篇文章中(见参考资料),我讨论了如何使用漏洞扫描作为工具,以查找宿主和应用程序基础设施中存在的问题。
In previous articles (see Resources), I covered the topic of vulnerability scanning as a tool for finding problems in your hosting and application infrastructure.
应用推荐