vulnerabilities 中文意思是什麼

vulnerabilities 解釋
不安全因素
  1. A web application requires protection for vulnerabilities on page static data ; for example form action, links, buttons, and hidden fields

    Web應用程序要求保護頁面靜態數據中的漏洞,如操作、鏈接、按鈕和隱藏欄位。
  2. The primary representations of the vulnerabilities of water resource in hengyang basin where is a typical hilly region with red and purple soils in south china are analyzed : the precipitation re source varies greatly in spatial and temporal distribution ; the soils and rock property are not in favor of water and soil conserving ; the structure of crops needs a high water consumption ; and the farm irrigation works are timeworn and frangible

    摘要以中國南方典型的紅壤和紫色土丘陵區衡陽盆地為例,分析論述了衡陽盆地地表水資源脆弱性主要表現在:降水資源時空分佈不均勻;不利於水土保持的地表物質組成和植被覆蓋;耗水量大的農業種植結構以及調蓄水功能弱的農田水利工程體系等方面。
  3. Mitigate risk of vulnerabilities with a sla guarantee

    用sla保證來降低漏洞的風險
  4. Hackers who attack computer systems are becoming more nimble and are taking less time to exploit system vulnerabilities, a new report says

    一項新的報告說:攻擊電腦系統的黑客變得越來越機敏,他們找到電腦系統漏洞所花的時間越來越少。
  5. When the source code is available, an attacker can look for all suspect function calls, and then try to determine which ones might end up being vulnerabilities. looking at the program, it is also easier for an attacker to figure out how to cause a buffer overflow with real inputs

    如果randchar不是0 ,將從口令短語中隨機選擇一個字,並隨機添加一個標點字元或數,這樣就在短語中每個字提供的13位熵的基礎上再增加5 . 5位的熵。
  6. The first way is the laziest and offers the highest performance, but it has several vulnerabilities to both deliberate attacks and innocent mistakes

    第一種方式是最懶散的,並且提供了最好的性能,但是對于蓄意攻擊和無意識的失誤,它有幾個薄弱環節。
  7. The following six threat categories can help you identify vulnerabilities and potential attack vectors in your own applications

    以下六種威脅類別可以幫助您確定自己的應用程序中的漏洞以及可能受到的攻擊范圍。
  8. On the research of corresponding countermeasures, by analyzing and discussing the vulnerabilities to spa, dpa for rsa and rsa - crt, the improved algorithms and

    在能量分析的防禦研究中,針對攻擊手段分別給出防禦措施和改進演算法。
  9. Last, i give some examples on how to write exploit programs after finding vulnerabilities. i also introduce a new exploit method : exploit based on software signal

    最後就如何編寫通用的緩沖區溢出代碼進行了分析和舉例,還介紹了一種新的攻擊手段,基於信號量的攻擊。
  10. Mitigate the risk of exposing web services vulnerabilities in a heterogeneous service - oriented architecture and reduce the chances of adversely impacting the service - level agreement guarantee for uptime availability

    降低在異構的面向服務體系結構( service - oriented architecture , soa )中公開web服務漏洞的風險,以及減少對利用服務品質協議保證正常運行時間可用性產生不利影響的可能。
  11. According to goolam ballim, an economist at south africa ' s standard bank, the build - up of foreign - exchange reserves is the result of better economic policies and an effort to reduce external vulnerabilities

    南非標旗銀行的經濟分析師谷蘭姆?巴利姆稱,外匯儲備的出現,得益於較好的經濟政策,也是為了減少外來攻擊的一種努力。
  12. Conduct any experiments on the network or systems that demonstrate network or system vulnerabilities without the prior permission of the csb

    未經電腦部同意,在網路上組織任何為顯示網路漏洞或系統漏洞的實驗及活動;
  13. It ' s been almost 5 years since the attacks on 9 / 11, and president bush says enormous strides have been made in correcting us security vulnerabilities brought to light that day

    911襲擊事件已經過去五年,布希總統稱那天在發現美國安全脆弱點后,現在他們已經在修整美國安全方面取得了巨大的進展。
  14. Because of the tremendous growth of the internet, network and computer security is now recognized as essential, but with changes in technology, inevitably come new threats, vulnerabilities, and increased risk

    由於網際網路的巨大發展,網路和計算機安全現在被公認為是一個要素。然而,科技的改革,帶來了不可避免的新威脅,脆弱點,和增強的風險。
  15. Netradar system is an important research subject in the area of internet security. it ' s aim is to detect the foundational terminals of and the route to a certain aimed intranet ; to scan the softwares that run on the terminals ; to find the services which are provided by the terminals ; to determine the vulnerabilities of the services and the distribution of the vulnerabilities. ater all the above have fmished, the netrada system attacks the vital terminals or the vulnerable terminals and controls them automatically

    網路雷達系統( netradar )是網路安全領域的一個研究課題,該課題的研究目標包括三個方面:探測接入internet的特定目標網路的基礎設施、到達該目標網路的路徑;掃描支撐目標網路運行的軟體實體的類型、提供的服務、探測出其軟體實體的漏洞和脆弱點分佈等信息;根據目標網路的基礎設施構架、拓撲信息、漏洞和脆弱點分佈等信息,有針性對的選取關鍵設備或者防護較弱的設備進行攻擊與控制。
  16. In this paper the design of network security architecture for the state monitor and management information system of housing private foundation is presented, including the comprehensive consideration of physical security, network security, operation system security, application and supporting platform security, and information security, etc ; it is carried on to analyze possible security threats, vulnerabilities and their risks, and a design scheme of network security architecture, especially the network regulations which have been adopted in the system implement, is proposed

    本文對全國住房公積金監督管理信息系統網路安全體系進行設計,包括對物理安全、網路安全、操作系統安全、應用系統及應用系統支撐平臺安全、信息安全等各個層面進行綜合考慮,並對其中的用戶認證與訪問控制和網路隔離技術等關鍵技術進行了詳細分析。對網路中可能存在的安全威脅、安全脆弱點、以及由此產生的安全風險進行了分析,提出了相應的網路安全體系設計方案,尤其是明確提出了網路規則。
  17. Upon completion of the course, participants will have an initial understanding of the increasing vulnerabilities and risks threatening today ' s network environments, state - of - the - art technologies that can help to protect the network against those threats, and cutting - edge techniques that can be used to secure network communications

    課程完成後,參加者將初步了解威脅今日網路環境的漸增的脆弱點和風險,能幫助您保護網路于那些威脅的科技,以及能防護網路通訊的頂尖技術。
  18. Assessment of threats to, impacts on and vulnerabilities of information and information processing facilities and the likelihood of their occurrence

    對信息和信息處理設施的危害、影響和薄弱點及三者發生的可能性的評估。
  19. The article first analyses the major vulnerabilities of sip : plain text transmission of sip messages and the lack of effective mechanisms for identification, then do research on the security threats caused by the vulnerabilities of sip, including registration hijacking, impersonating a server, tampering with message bodies, tearing down sessions and denial of service. after setting up a sip communication platform in the laboratory environment, the article confirms the existence of security risks by using simulation attacking experiments

    本文首先分析sip協議主要的脆弱性: sip消息明文傳送和缺乏有力的身份鑒定機制,以及由於這些脆弱性而引發的包括注冊劫持、服務器偽裝、消息篡改、拆卸會話和拒絕服務等的安全威脅,並通過在實驗室環境下搭建的sip通信平臺,進行模擬攻擊實驗來證實問題的存在性。
  20. The program teaches students about data protection, computer network protocols and vulnerabilities, security, firewalls and forensics, data hiding, and infrastructure and wireless security

    據美聯社3月12日報道,根據這項計劃,教師向學生講授數據保護計算機協議弱點和辯論學偽裝網路基礎和無線安全等。
分享友人