vulnerabilities
英音[ ˌvʌlnərəˈbɪlɪtiz ] 美音[ ˌvʌlnərəˈbɪlɪtiz ]

缺陷

常用释义

词性释义

n.

缺陷(vulnerability 的复数形式);脆弱点
例句
  • 全部
  • 缺陷
  • 脆弱点
There would be no possibility of any vulnerabilities affecting the referring page (which may be administered by someone else).
其中并没有任何缺点可以影响到所引用的页面(这台服务器是由其他人进行管理的)。
But it was his embrace of the American-style bonus culture that became one of his main vulnerabilities.
然而,对美式红利文化的信奉,成了他的一个主要弱点。
该公司还指出,已经有黑客在利用上述部分安全漏洞向用户机器发起攻击。
This will help to reduce the likelihood of a full-fledged attack or to progressively weaken the attack against exploited vulnerabilities.
这将帮助减少受到全面攻击的可能性,或者主动减少对暴露的漏洞的攻击。
从表面上看,中国似乎也明白自身经济增长模式的缺陷和暗藏的危险。
The Mtb genome is not the only new source of data able to provide insight into the TB bacterium's potential vulnerabilities.
结核分枝杆菌基因组不是唯一能提供细菌潜在弱点的新来源。
This section provides an overview of what the Metasploit Framework does for users trying to discover vulnerabilities.
这个部分简要介绍MetasploitFramework对于试图发现漏洞的用户有什么用。
我们尚未收到因现在修补的这些安全性漏洞而导致机器受到损坏的报告。
如果我来自一个有着酗酒背景的家庭,那在社会环境中我就必须比别人更加提防自己的脆弱。
不检查SQL特定的字符可能会打开您的应用程序,带来各种漏洞隐患。
这些官员在一封公开信中称,毁掉这些飞机将导致英国国防安全出现重大漏洞。
This will help reduce session hijacking vulnerabilities since the session ID cannot be sniffed and easily hijacked.
这样会话ID不会被探嗅到而且不容易被截获,就可以减少会话截获的危险。
Those numbers do not necessarily indicate that Microsoft has made progress in its fight against security vulnerabilities.
这些数字并不表示微软在安全问题上已取得进步。
事实是,黑客们永远都能够找出新的系统漏洞,并且编写新的恶意代码对其进行攻击。
A special reward program makes it lucrative to contribute multiple vulnerabilities, he said.
对于多起安全问题的发现者,他们会得到一个特别的奖励。
In the build-up to the global crisis of 2008 , tiny Iceland was a canary in the mine, a leading indicator of wider vulnerabilities .
在2008年全球经济危机逐渐形成之际,小国冰岛成为了矿井中的金丝雀——一场更大范围危机的先行指标。
否则,恶意调用方将能够从您的权限派生,有可能导致出现安全脆弱性。
中国一边要继续打造与敌人正面对抗的能力,一边还必须发掘敌方的弱点。
很早之前,就有许多经济学家和分析人士实际上做出过预言,认为过多的风险和漏洞将导致一场危机。
You have to understand your vulnerabilities and invest some time to think through the risks and resiliency.
你必须了解业务的脆弱性,并花时间思考如何应对风险,如何创造应对方案。
As an important part of the network security solution, vulnerability assessment products can find out the vulnerabilities in computers.
漏洞评估软件能够检测出计算机系统中存在的各种安全漏洞,是网络安全解决方案中的重要组成部分。
正如我们在XSS示例中所看到的,大多数的攻击都利用了服务器端的弱点,注入恶意脚本。
He wasn't outwardly sentimental, but sometimes he'd let his guard down and let me see his vulnerabilities.
丹并非多愁善感的人,但有时他会放下防备,让我看到他软弱的一面。
安全评估和审计意味着你需要持续地测试系统的安全漏洞。
漏洞是人犯错误的结果,如果你改变人的态度,好结果会随之而来。
And, most importantly perhaps, it must trust reactor designers to create new reactors that do not share the vulnerabilities of older ones.
最重要的是,必须让公众相信工程师能设计出新的反应堆,使之摒弃已有的反应堆的缺陷。
知道主机上哪些端口是打开的,对于攻击者推断目标主机上可能存在的弱点是重要的第一步。
Three of the Gadget applets for Windows Vista's sidebar also had to be patched to fix one Important and two Moderate vulnerabilities.
三头带applets的是windowsvista的侧边还必须修补修补的一项重要和两个暖和的弱点。
攻击者找到漏洞的速度比你想想的快多了。
This process introduces latent defects and vulnerabilities into our implementations, which accumulate in the form of growing potential risk.
此过程在我们的实现中引入了潜在缺陷和漏洞,并以不断增加的潜在风险的形式积累。
1·It isn't surprising that you'll find plenty of strong opinions about the potential vulnerabilities of popular home-security systems.
并不意外的是,关于受大众喜爱的家庭安全系统具有潜在缺陷,你会发现有许多很有说服力的观点。
2·However, this approach only protects those specific functions, not stack overflow vulnerabilities in general, and it only protects the stack, not local values in the stack.
然而,这种方法仅保护那些特定的函数,而不是从总体上防止堆栈溢出缺陷,并且它仅保护堆栈,而不保护堆栈中的局部变量。
3·The economic downturn threatens to expose some of Singapore's vulnerabilities, including a wide gap be - tween rich and poor and a heavy dependence on foreign investment for growth.
经济低迷将使新加坡暴露出自身的一些缺陷,包括贫富之间的鸿沟,以及经济增长对外国投资的强烈依赖。
4·In this article, I discuss principles for managing XML deployment to avoid such vulnerabilities.
在本文中,我们讨论了为了避免出现这种缺陷而对管理XML部署所采用的一些准则。
5·Poverty and the vulnerabilities associated with it remain entrenched.
贫困及与其如影随形的其他缺陷依旧根深蒂固。
1·Some vulnerabilities are not overly complex, and are thus easy for hackers to exploit.
一些脆弱点不太复杂,因而很容易被黑客利用。
2·We found that the majority of vulnerabilities are usually caused by a small logic error or a case that the software developer hadn't uncovered or accounted for.
我们发现大部分脆弱点通常由小的逻辑错误或软件开发人员没发现或解决的情况所引起。
3·In the end, it is the responsibility of everyone associated with a piece of software to keep security a focus and to try to mitigate vulnerabilities.
最后,与软件相关的每个人都有责任关注安全性,并试图减少脆弱点。
4·Taking a deeper look at threats and vulnerabilities, he cautions on the possibility of information being compromised without proper safeguards in place.
通过对威胁和脆弱点的深入观察,他提醒人们,缺乏适当的保护可能会造成信息破坏。
5·Vulnerabilities occur across a wide spectrum, from the obvious — like using a weak password or storing unprotected private data — to the more nuanced — like unchecked input.
脆弱点出现的范围很广,从明显的——像使用不健壮的密码或存储无保护的私有数据——到更有细微差异的——像未检查的输入。
常用短语
vulnerability analysis
vulnerability analysis - 脆弱性分析;弱点分析
同义词
n.
缺陷(vulnerability的复数形式);脆弱点