漏洞 的英文怎麼說

中文拼音 [lóudòng]
漏洞 英文
1. (空隙; 小孔) leak 2. (破綻) flaw; hole; loophole
  • : Ⅰ動詞1 (從孔或縫中滴下、透出或掉出) leak; drip 2 (泄漏) divulge; disclose; leak 3 (遺漏) le...
  • : Ⅰ名詞(物體上穿通的或凹入較深的部分; 窟窿; 洞穴) hole; cavity Ⅱ形容詞(深遠; 透徹) profound; thorough; clear
  1. Based on the frequent occurrence of international aerial crimes, the rampancy and cruelty of criminals and the reality of brutal consequence, the essay analyses the features of the crime of aircraft hijacking, the crime of imperiling international civil aerial security and the crime of obstructing international aerial navigation with the component terms from three important international conventions on punishing aerial crimes in order to help people to appreciate the appearance and the essence of typical international aerial crimes deeply, to regard the motion of the crimes and to overwhelm the offence forcefully. based on the core of the legislative status of international civil aerial security, the jurisdiction of the aerial crimes, one emphasis of the article is to clarify concrete clauses on jurisdiction in the three conventions and analyses the important principle of " aut reddere, aut punire ". based on the problems on the jurisdiction of crimes in international society, it quests the implementation of t he principles of jurisdiction, pleading and extradition in the three conventions deeply

    基於目前國際社會航空犯罪時有發生,犯罪分子猖獗狠毒,危害後果十分殘重的現實,本文從國際社會關于懲治航空犯罪的三個重要國際公約(東京、海牙、蒙特利爾公約)中規定的各種航空犯罪的定義入手,深入展開了對劫持航空器罪、危害航空器飛行安全罪、危害國際民用航空機場安全罪的犯罪特徵及其構成條件的分析,以期幫助人們更深刻認識這些典型的國際航空犯罪的表現及其實質,嚴密注視這些犯罪的動向,對其進行及時有力的打擊;鑒于國際民用航空安全法律地位問題的核心是解決航空犯罪的管轄權問題,本文重點闡釋了三個公約關于管轄的具體規定,並側重分析了「或引渡或起訴」的重要原則;鑒于目前國際社會打擊國際航空犯罪管轄方面存在諸多實際問題,本文對公約規定的管轄、起訴、引渡原則的實現方式作了深入探討;鑒于各國在國內立法上對于空中犯罪的懲治、對違約國的制裁、對這類犯罪的預防措施等方面存在一些漏洞,本文根據目前掌握的一些資料,在獨立思考的基礎上,提出了一些不成熟的看法及建議,以期對國際社會懲治航空犯罪貢獻自己微薄之力。
  2. After an in - depth examination of the relevant procedures, he concluded that management controls were lax and loopholes were aplenty

    他花了一段時間觀察整個收集和處理車資程序,發現巴士公司的管理鬆散,工序亦存在相當多而明顯的漏洞
  3. To raise both economic and social benefits of hospitals, many measures need to be considered : management through net - works ; raising the quality of the staff of shroff ; establish rules and regulations ; set up 3 - level auditing system ; consummate the management course of the patients ' charge ; make up of various possible leaks ; reduce the patients ' arrearage

    通過微機網路化管理,提高收費員的整體素質,建章立規,實行三級審核制度,完善在院病人費用的環節管理,堵塞各種漏洞,減少出院病人欠款,使醫院社會效益和經濟效益同步上升。
  4. It tries to terminate and deletes the w32. blaster worm process

    也使用到這漏洞。它會嘗試暫停和刪除w32
  5. Even from the first, the words went wrong, the catbird pecked away the nightingale.

    一開始字里行間就漏洞百出,貓聲鳥居然把夜鶯啄得鎩羽而歸。
  6. If funds should be collected level by level before the competent department hands them over to the central treasury at last, the ministry of finance shall supervise the handing over and the financial supervisor ' s office stationed by the ministry of finance in the place shall inspect the collecting and handing over of funds

    各級財政部門要進一步建立和完善有關收入的繳庫(含財政預算外資金專戶)制度、繳庫單分送制度,認真履行監督、檢查職責,根據公、檢、法、工商部門行政性收費和罰沒收入的執收、執罰和解繳情況,加強催繳和監繳,並建立稽查機制,堵塞漏洞,做到應收盡收。
  7. Chartists fall prey to their own behavioural flaw, finding “ confirmation ” of patterns everywhere, as if they were reading clouds in their coffee futures

    圖表分析師成為自身行為漏洞的犧牲品:他們四處尋找對模式的「證實」 ,就好像他們從所持的咖啡期貨中看出的花樣。
  8. While dissertating the functions of ngos, the author attempts to discard traditional approaches discussing in general functions of ngos ’, but tries to make further expansion, clarify the functions of ngos different fields during the transformation period, and discuss mainly it ’ s two major functions in accelerating social development and the reform of the government ; meanwhile, this article also points out the main problems of ngos in the transformation period : the indeterminate circumscription between ngos and government organizations, misplaced the organization goals, undivided functions of community and politics ; the lapsus in management and difficulties in operation caused by double management system ; the low level of ngos ’ internal management, weak survival ability, and the limited ability in mobilizing resources ; deficient management evaluation mechanism in ngos ’ ; low level of legalized management of ngos ’

    在論述非政府組織的作用時,試圖拋開過去泛泛而談其作用的做法,做了進一步的拓展,釐清轉型期非政府組織在不同領域的作用,將其主要定位在對促進政府改革的作用和在社會發展中的作用兩大方面。同時,本文也指出了轉型期非政府組織存在的主要問題:非政府組織與政府組織的界限不明確,組織目標錯位,政社不分;雙重管理體製造成管理體制的漏洞和運作上的困難;非政府組織內部管理水平低,生存能力較弱,資源動員能力有限;非政府組織內部管理評估機制匱乏;非政府組織管理的法制化程度低等。
  9. If it ' s got lots of holes, then it ' s a colander

    如果是有很多漏洞,那一個
  10. He was consistent in what he said, and there was no loophole.

    他說話嚴密,沒有漏洞
  11. Some think of cosmic string. then they soon realize that this will require the total energy from the universe to construct the time machine out of cosmic string and hence is also impossible. that leads to the suggestion by many scientists of the not - yet - proven " chronology protection conjecture ", which says that the laws of physics do not allow time machines to the past

    在科普刊物中,我們間中便會聽說有科學家提出回到過去的方法,但經詳細研究后發現,所有這些方法都有很大的漏洞,例如有人曾經提出利用黑的近親蟲作為時光機,但這時光機只是單向:只能進入不能離開又有人曾利用宇宙弦作回到過去的工具,后來卻發現需要全宇宙的能量才能建造那時光機,所以也是不可行的。
  12. Network security techniques include router filter, firewalls, intrusion detection, audit, counteroffensive and etc. in these techniques, router filter and firewalls are static security techniques, and others are dynamic security techniques

    目前網路安全技術包括路由器、防火墻、漏洞防堵、入侵檢測、審計和反攻擊等,其中路由器過濾、防火墻、漏洞防堵屬于靜態安全技術,而入侵檢測、審計和反攻擊等屬于動態防護。
  13. Cryptanalysis of a remote login authentication scheme based on geometric and improvement approach

    遠程登錄幾何認證方案的安全漏洞分析和解決辦法
  14. This thesis mainly analyses security in the wtls and reasons for defects, study two solutions of security in the wtls which are elliptic curve and ripemd160 cryptograph algorithm

    本文主要分析了wtls的安全漏洞及其存在的原因,並在此基礎上研究了兩種解決wtls安全問題的方法? ?橢圓曲線和ripemd ? 160演算法。
  15. General speaking, the detection of the vulnerability is a technique filled with inspiration and luck, but thorough analysis shows it is also deducible. if more people understand the hacking technique, it will no longer be magic mastered only by a few experts

    總的來說,漏洞的發現和利用雖然是一項充滿了靈感和機遇的技術,但是仔細分析起來,其中仍然存在明顯的規律,掌握了這些規律,攻擊技術就不單單是少數專家手中的魔術,而可以被更多的人所掌握,為國家所用。
  16. Our derivation of the chain rule contains one flaw.

    我們推導鏈式法則的過程中有一個漏洞
  17. Easement : supplement to legalization of real right

    論地役權對物權法定原則漏洞的補充
  18. A web application requires protection for vulnerabilities on page static data ; for example form action, links, buttons, and hidden fields

    Web應用程序要求保護頁面靜態數據中的漏洞,如操作、鏈接、按鈕和隱藏欄位。
  19. Without a guarantee on the integrity and identity of shared content, a p2p application runs the risk of introducing so many security holes that microsoft outlook - never a good example of security - will look like fort knox by comparison

    沒有對共享內容的完整性和同一性的保證,一個p2p應用就會冒引入許多安全漏洞的風險,以至於microsoft outlook從來不是一個安全的好示例相比之下就會像fort knox一樣。
  20. There's a technical gap in the army's method.

    陸軍的方法在技術上有一個漏洞
分享友人