補漏洞 的英文怎麼說

中文拼音 [lóudòng]
補漏洞 英文
close loophole
  • : Ⅰ動詞1 (修理; 修補) repair; mend; patch 2 (補充; 補足;填補) fill up; add supplement; supply; ...
  • : Ⅰ動詞1 (從孔或縫中滴下、透出或掉出) leak; drip 2 (泄漏) divulge; disclose; leak 3 (遺漏) le...
  • : Ⅰ名詞(物體上穿通的或凹入較深的部分; 窟窿; 洞穴) hole; cavity Ⅱ形容詞(深遠; 透徹) profound; thorough; clear
  • 漏洞 : 1. (空隙; 小孔) leak 2. (破綻) flaw; hole; loophole
  1. Easement : supplement to legalization of real right

    論地役權對物權法定原則
  2. Intrusion detection can monitor and analyze the behavior of users and system, audit the system configuration and holes, assess the integrality of data and sensitive system, recognize attack action, stat and audit the abnormal behavior, collect the patch related with system automatically, and record the hacker ' s action uses honey pot. intrusion detection helps system administrator monitor, audit and assess the system state easily and available

    入侵檢測具有監視分析用戶和系統的行為、審計系統配置和、評估敏感系統和數據的完整性、識別攻擊行為、對異常行為進行統計和審計、自動地收集和系統相關的丁、使用誘騙服務器記錄黑客行為等功能,使系統管理員可以較有效地監視、審計、評估自己的系統。
  3. Windows 2000 security patch : invalid rdp data vulnerability

    Windows 2000安全修程序:無效rdp數據
  4. Windows 2000 security patch : invalid rdp data vulnerability also downloaded

    Windows 2000安全修程序:無效rdp數據
  5. Windows 2000 security patch : phone book service buffer overflow vulnerability

    Windows 2000安全修程序:無效rdp數據
  6. Download details : windows 2000 security patch : invalid rdp data vulnerability

    下載詳細信息: windows 2000安全修程序:無效rdp數據
  7. Mr bloomberg cannot sell off trees to patch a hole in his budget, after all

    布隆伯格先生畢竟不能賣樹去填預算
  8. Zero - day attacks are ones that take place between the time of an exploit ' s publication and the release of the initial patch or antivirus / malware signature

    零日攻擊發生於公布日到發布丁或反病毒/惡意軟體特徵碼日之間。
  9. On the legal loophole and its supplement

    略論法律及其
  10. We have no time to work out more effective special law to remedy a legal loophole

    制定高層次的、可操作性強的專門法律,彌法律已經刻不容緩。
  11. They leave a lot of pockets of knowlege to be filled in behind.

    他們會留下許多有待填知識的
  12. How to eliminate loopholes of judicial rules

    論司法過程對法律的填
  13. If ever a leak in the tree was discovered, all it would take was a quick spell from one of the many druids in the village and the pine tree would sprout a new branch that would fill the void

    如果發現樹上出現一個,村子中眾多德魯依中的一個會迅速在那裡施加一段咒語,松樹上將萌芽出一段新枝上缺
  14. If the remedy is anticipated to be very long, the alternative is to include information about where the remedy can be downloaded to fix the vulnerability

    如果預先考慮到救代碼會很長,那麼也可以包含一些信息來說明在何處可以下載到救代碼來修改
  15. As there is more etheric grid work, the holes in one ' s waking movie screen fill in, and less of one ' s dream is broadcast onto the unconscious leading to greater possibility of expression in one ' s current physical life

    當以太晶格層更多時,在你醒著時的電影屏幕的被彌,更少夢想進入無意識,帶來當前物理生命中更多的表達可能。
  16. Microsoft has released a patch that eliminates a security vulnerability in the hyperterminal application that ships with several microsoft operating systems

    Microsoft已發布了一個修程序,它可消除隨某些microsoft操作系統提供的超級終端應用程序中的安全
  17. To the user, the update of software can mend the bug and insure the safety of the data in the computer, can increase and update the function of the software, so the user may use it handy

    因此軟體升級在我們使用計算機的時候變得越來越普遍。對于用戶來說,軟體升級可以,確保數據安全;可以增加和更新功能,用起來更加得心應手。
  18. Windows 2000 security patch : attack ep vulnerability

    Windows 2000安全修程序:通訊簿服務緩沖區溢出
  19. In any case, the most important task is to define the role of the depositary and the independent directors regardless which structure has been chosen. at least in the context of open - end funds, it is possible that the regulatory authority could conclude after sufficient experience that a contractual structure, utilizing a strong depositary without independent directors, would be sufficient to safeguard the interests of investors

    如果說emh回答了已知的信息對獲利沒有價值的結論,那麼capm則說明市場上的超額回報率是由於承擔更大的風險才形成的結論,因而在一定程度上capm充了emh的理論空白和可能的
  20. If this file is opened on an unpatched system, the attachment ( which is the worm itself ) will automatically execute. this is due to the use of the known exploit,

    如果這個檔案于未修補漏洞的internetexplorer ( ie )上開啟,其附件檔案(蠕蟲本身)就會自動執行。
分享友人