security hole 中文意思是什麼

security hole 解釋
安全漏洞
  • security : n 1 安全(感);安穩;穩妥;平安。2 確實;確信;把握;可靠性;安心。3 【軍事】防禦物。4 保護;防...
  • hole : n 1 洞,穴,孔;(衣服等上的)破洞;傷口;漏洞;窩,坑;水流的深凹處,(河道的)緩流窪。2 (獸的...
  1. A security enhancement scheme is proposed to encounter the black hole attacks in aodv protocol. this scheme may solve the black hole problem and prevent personating the destination node to some degree. 3

    針對移動adhoc網路aodv協議中所存在的黑洞攻擊,提出了一種增強安全性的解決方案,該方案能在一定程度上解決黑洞問題並可防止假冒目的節點攻擊。
  2. Could inadvertently open up a security hole

    可能會無意中打開一個安全漏洞。
  3. Method could inadvertently open up a security hole

    方法可能會無意中打開一個安全漏洞。
  4. Setting follow symlinks to no will turn off this functionality, and prevent symlinks from being followed at all. turning off follow symlinks does eliminate a potential security hole and should be done when symlinks are not needed or required. follow symlinks no

    請注意,圖2所示的頁面的大部分都是固定不變的,沒有任何「閃爍」 ,而時鐘值按服務器上的時間逐秒刷新。
  5. For maximum security if you are concerned about this very subtle - and difficult to exploit - security hole, you should perform validation similar to the web browser, and determine the server s certificate using httpsurlconnection. getservercertificates

    為了獲得最高程度的安全(如果您關心這個特別細微並且難于開發安全漏洞) ,您應該執行類似於web瀏覽器的驗證,並且使用httpsurlconnection . getservercertificates ( )來確定服務器的證書。
  6. The regular script sharp gauze production factory attendance “ township of the chinese silk screen ”, this factory manager the time is engaged in the gauze and silk screen ' s production and the sale, my factory product specification is complete, quality excellent, including : the stainless steel mesh, the ectrowelding net, the heavy hexagonal network, the ore strainer, the metal net, the round hole net, the security net, the copper screen, the steel plate lattice - work, the ginning network, the safety net, cancel the flowered net, the extra wide net, the window screening, the guard rail net, the road guard rail, the railroad guard rail, the airport guard rail, the factory railing, the garden guard rail, the black cloth and silk, to breed the cage to have, the plastic even net, the galvanization silk and so on each kind of silk screen, widely uses in professions and so on petroleum, chemical industry, building, spinning and weaving, medicine, aviation, astronautics

    楷銳金屬絲網製品廠地處「中國絲網之鄉」 ,本廠長期從事金屬絲網及絲網的生產和銷售,我廠產品規格齊全,質量精良,主要有:不銹鋼網、電焊網、重型六角網、礦篩網、金屬網片、圓孔網、防盜網、銅網、鋼板網、軋花網、安全網、勾花網、寬幅網、窗紗、護欄網、公路護欄、鐵路護欄、機場護欄、工廠圍欄、花園護欄、黑絲布、養殖籠具、塑料平網、鍍鋅絲等各種絲網,廣泛用於石油、化工、建築、紡織、醫藥、航空、航天等行業。
  7. The current internet key exchange protocol ike is too complicated to effectively prevent dos attack and has too much rounds, which will influence the performance and interoperability and cause a lot of security hole at the same time

    目前ipsec的密鑰交換協議ike過于復雜,不能有效的防止dos攻擊,協議輪數太多,這些都嚴重影響了協議的性能和互操作性,同時導致了許多安全漏洞。
  8. Apple, warning of a rare security hole in the company ' s os x operating system for the second time this month, said in a release that a " theoretical vulnerability " in an application used to get help while browsing the web could expose users to a malicious

    這是5月來蘋果第二次警告其os x操作系統當中有一個罕見的安全漏洞,其表示,一個應用程序當中出現了一個「理論上的漏洞」 ,從而使得用戶在瀏覽網頁時有可能曝露在一個惡意軟體代碼面前。
  9. The specific nature of the security hole, such as whether it makes the vulnerable to outsiders or allows virus - like code to enter the operating system, was not made clear

    上述安全漏洞的性質,諸如其是否會導致計算機易受外部攻擊,或是使得諸如蠕蟲病毒的代碼進入操作系統,現在還不得而知。
  10. Via ports scanning, it can gained many useful information, also find out system security hole

    通過埠掃描,可以得到許多有用的信息,從而發現系統的安全漏洞。
  11. To call this a security hole is to understate the point woefully

    不幸的是,將它稱之為安全性漏洞有些輕描淡寫。
  12. Third, this paper introduce the security structure, security system and algorithm of the 3g system, discussing the security measure of 3g system in the aspect of wireless interface in detail, which including user identity confide ntiality, authentication integrality data, etc. finally, the author stress analyzing the 3g authentication, key agreement protocol and its security, finding the security hole and putting forward new authentication and key agreement protocol based on ecc

    介紹了第三代移動通信系統安全結構、安全體制和演算法,詳細論述了3g系統在無線介面方面的各種安全措施包括用戶身份保密、認證與數據完整性等內容。重點分析了3g認證與密鑰分配協議及其安全性,找出了其中的安全漏洞,提出了新的基於橢圓曲線密碼體制的認證與密鑰分配協議。
  13. Due to the some normal ids ' s low efficiency, high error report rate, bad self - security, this thesis has given out a new - type hybrid intrusion detection system ( hsids ) design with high efficiently, good self - security, combining the distrubited information gathering with the centralized managerment, and combining the nid and the hid. the detailed design scheme also has been presented. the hsids adopts the " black hole " hidden setting, greatly decreasing the posiblity for hacker to discover and attack the hsids

    在hsids中,採用「黑洞」式隱形設置,可以大大減少hsids系統被黑客發現並攻擊的可能;系統採用的將nid與hid相結合的方式可降低入侵信息的漏報與誤報率;改進的檢測演算法提高了檢測引擎的速度;採用開放的檢測規則方便了系統的升級,提升了檢測能力; web方式的安全管理可以很好地控制整個監控網路的安全情況;被動防禦與主動防禦相結合更有效的防止了入侵者對系統的入侵。
  14. This paper first introduce the new technology bluetooth, then discuss the security of bluetooth at link layer including the management of link key ( classify 、 generate and transfer ) 、 pairing 、 authentication and encryption. at last discuss the security hole in bluetooth such as initialization key 、 unit key 、 authentication and bluetooth device address and the methods to solve the problem

    文中首先簡要介紹了藍牙這一新技術;接著討論了藍牙鏈路層的安全問題,包括鏈路字的管理(分類、生成及傳遞) 、配對過程、鑒權過程和加密過程。
  15. Century ck security locks, it consists of a number of pieces of metal matrix linking, rod sets the key to hoist sets pole, key sets are available under the front bar defense the pearl for anti - shedding, key hole internal opened a hole which compatible with the pearl for anti - shedding

    當鑰匙套桿插入葫蘆型鑰匙孔內時,推動鑰匙上的推拉滑塊,讓鑰匙套桿上的防脫落珠與鑰匙控內的防脫落孔相吻合,徹底避免了因操作不當而將鑰匙擰斷或拉斷,大大提高了鏈節式軟鑰匙的使用壽命。
  16. As should be obvious, this is a potential security hole

    非常明顯,這是一個潛在的安全漏洞。
  17. That would create a serious security hole in your architecture

    這會在您的體系結構中產生嚴重的安全漏洞。
  18. You must be careful that you do not create a security hole in this process

    您必須非常小心,不要在這一過程中製造安全漏洞。
  19. Seattle reuters - apple computer inc., long considered to be relatively immune to the security holes and viruses that plague longtime rival microsoft corp. ' s windows, said on friday a security hole in its s vulnerable to attack

    一直以來都被認為相對微軟的windows操作系統不會面臨安全漏洞或是受到病毒攻擊的蘋果公司表示,其軟體當中出現的一個安全漏洞使得用戶的電腦很容易受到攻擊。
  20. First, the paper points out that the buffer overflow is most dangerous security hole of software, expounds background and studies of this field, and shows the advantages and disadvantages of original static and dynamic buffer overflow analysis method

    本文首先闡述了課題的研究背景、意義以及國內外研究現狀,分析了國內外緩沖區溢出漏洞分析的典型技術和系統,研究分析了溢出漏洞靜態分析和動態分析技術的優缺點。
分享友人