vulnerabilities是什么意思   vulnerabilities怎么读

英式:[vʌlnərə'bɪlɪtɪz]    美式:[vʌlnərə'bɪlɪtɪz]

vulnerabilities单词基本解析:

脆弱点

释义脆弱点;

vulnerabilities变化用词:



vulnerabilities英英释义:

名词 vulnerability:

the state of being vulnerable or exposed

同义词:vulnerability, exposure

susceptibility to injury or attack

同义词:vulnerability



vulnerabilityn.the state of being vulnerable or exposed

"his vulnerability to litigation"

同义词:exposure

susceptibility to injury or attack

vulnerabilities中文词源:

vulnerabilities用法和例句:

This board still has a few security vulnerabilities. Can you spot them?

这个公告板还有几个安全漏洞. 你能找出来 吗 ?

互联网

This information enables the attacker to target known vulnerabilities in these components.

这些信息允许攻击者了解在这些组件中的漏洞.

互联网

We are all fragile, he thought , and Emma has her vulnerabilities too.

我们都很脆弱, 艾玛也有她的弱点, 乔思量着.

互联网

A lack of clarity yields confusion, and this breeds vulnerabilities.

不清楚就会产生混乱, 也就会引起安全隐患.

互联网

Zero - day vulnerabilities are critical threats, and they genuinely require immediate attention.

零日缺陷是致命威胁, 并且它们确实需要立即注意.

互联网

But hackers may also discern vulnerabilities in computer systems and inflict damage.

但是黑客可能会寻找电脑系统的漏洞,从而造成危害.

互联网

These vulnerabilities, of course, have not been unique to Darfur.

当然, 这些脆弱的状况并非只出现在达佛.

互联网

But attackers searching for vulnerabilities in Microsoft products as active as ever, he said.

但是,攻击者在搜索微软产品的漏洞是以往一样活跃, 他说.

互联网

Combining dynamic analysis and static analysis, it makes further detection of buffer - overflow vulnerabilities.

结合动态与静态挖掘技术对二进制环境下的程序作进一步的漏洞查找.

互联网

A probing attack can use error messages generated by an application to search for security vulnerabilities.

探测攻击可使用由应用程序生成的错误消息来搜索安全漏洞.

互联网

However, Unix and Windows NT each has its share of security lapses and known vulnerabilities.

但是, Unix和WindowsNT各有自己安全上的疏漏和众所周知的脆弱性.

互联网

In computer security, a technique in which certain vulnerabilities are made attractive to a potential attacker.

在计算机安全学中, 一种以某些弱点来吸引潜在攻击者的技术.

互联网

So, dig deeply vulnerabilities and improve precision of scan becomes the soul of scanning the system.

因此, 挖掘深化漏洞,提高扫描精度成为扫描系统的灵魂.

互联网

You must have reviewed the package for known security vulnerabilities and must provide patches for them.

您需要重审源码包的已知安全隐患,并为它们提供补丁.

互联网

ISS specializes in software, appliances and services that help It'shops monitor and manage network vulnerabilities.

国际空间站的专门软件, 家用电器和服务,帮助它店监测和管理网络的脆弱性.

互联网

vulnerabilities


'''XMLRPC.''' Changes have been made to xmlrpc due to certain security vulnerabilities being brought to light. There ended up being a point release to resolve these problems.

'''因为暴露了一些安全隐患,xmlrpc发生了变化。最终,可能要发行新的版本解决这些问题。


'''Success: '''You identify a creature as well as its type, typical temperament, and keywords. Higher results give you information about the creature's powers, resistances, and vulnerabilities.

'''成功:'''你辨认出这只生物和它的类别,典型性情,和关键词。更高的检定结果可以让你知道这只生物的能力,抗力,和弱点。


CERT is a center of Internet security expertise, studying security vulnerabilities, publishing security alerts, and developing information and training to help you improve security at your site.

CERT是汇集Internet安全专业知识的中心,其工作是研究安全漏洞、发布安全警告以及发布信息和培训以帮助您提高站点的安全性。


By delivering simplified administration through central management, and providing critical visibility into threats and vulnerabilities, Client Security helps you protect your business efficiently.

Client Security提供通过中心管理实现的简化管理,并提供对威胁和漏洞的重要探查能力,有效帮助您保护您的业务。


Common Vulnerabilities and Exposures (CVE)

CVE


The Study on DNS Security Vulnerabilities and Defending Policies

DNS安全漏洞以及防范策略研究


This update for Microsoft Internet Information Services version 5.1 Can help protect your Web server from several new security vulnerabilities.

Microsoft Internet信息服务5.1版的这一更新可帮助您的Web服务器弥补几个新的安全漏洞。


The NCAS is managed by US-CERT for the purpose of identifying, analyzing, and prioritizing new threats and vulnerabilities.

NCAS是US-CERT管理,对新威胁和漏洞进行鉴定,分析和分级。


Qualys maintains a hit list of the most popular vulnerabilities to help firms work out which ones they should patch first.

Qualys公司提供了一个最常见的漏洞列表来帮助企业用户决定需要优先为系统打哪些补丁。


RealNetworks, Inc. Releases Update to Address Security Vulnerabilities.

RealNetworks,Inc.发布更新以弥补安全性漏洞。


RealNetworks has received no reports of machines compromised as a result of the now-remedied vulnerabilities.

RealNetworks尚未收到因现在修补的这些安全性漏洞而导致机器受到损坏的报告。


S.) is an award-winning solution that allows you to scan, detect, assess and remediate any security vulnerabilities on your network.

S.) 是一项屡获殊荣的解决方案,能够扫描、检测、评估和修复网络中的任何安全漏洞。


SCAP can be used to quickly find known vulnerabilities and to automate activities such as ongoing security monitoring, vulnerability management and security policy compliance evaluation reporting.

SCAP可以用来快速查找已知的漏洞,以及持续的安全监测、脆弱性管理和安全政策的承诺评价报告等自动操作。


SQL injection vulnerabilities are yet another class of input validation flaws.

SQL注入攻击是另一种输入验证上的漏洞。


The Analysis of Security Vulnerabilities of SSL Protocol

SSL协议安全缺陷分析


Security Vulnerabilities and Improvements of the SSL Protocol

SSL协议的安全缺陷与改进


Visual Studio automation developers must understand and accept the responsibility of creating secure applications by understanding security vulnerabilities.

Visual Studio自动化开发人员必须对安全漏洞有所了解,才能明白并担当起创建安全的应用程序的责任。


A Web application requires protection for vulnerabilities on page static data; for example form action, links, buttons, and hidden fields.

Web应用程序要求保护页面静态数据中的漏洞,如操作、链接、按钮和隐藏字段。


Vulnerabilities in Windows kernel could allow elevation of privilege and denial of service

Windows内核中的漏洞可能允许特权提升和导致拒绝服务


The "August 2002, Cumulative Patch for Internet Explorer (Q323759)" eliminates all previously addressed security vulnerabilities affecting Internet Explorer, as well as additional newly discovered vulnerabilities.

“2002年8月发布的用于Internet Explorer的累积修补程序”不但消除以前已解决的、影响Internet Explorer的所有安全漏洞,而且还消除了其他一些新发现的漏洞。


"We have also reduced people's vulnerabilities by increasing civil service pay, by settling arrears, all of which have contributed to corruption.

“我们还已通过增长公务员薪水,解决工资拖欠这些导致腐败的诱因来降低人们腐败的风险。


“Haiti is a mosaic of vulnerabilities,” said Toussaint.

“海地像马赛克一样容易破碎”杜桑说。


“There are a lot of vulnerabilities,” admits an American general, “There are backups, but our space architecture is very fragile.

“还存在着许多弱点,”一名美国将军承认,“我们虽然有备用品,但我们的太空建筑还很脆弱。”


"Zero-day" threats are always unknown and undisclosed or newly discovered software vulnerabilities.

“零天”威胁总是未知的秘密或新发现的软件漏洞。


Some vulnerabilities have been reported in RealPlayer, which potentially can be exploited by malicious people to disclose certain information or compromise a user's system.

一些漏洞已经报道,在RealPlayer的,这可能可以利用这个漏洞的人披露某些资料或妥协,用户的电脑系统。


Once you identify the vulnerabilities, you rank them in order of severity and create a prioritized set of countermeasures to counter the threats.

一旦确定了漏洞,您就可以按安全性对其进行排列,并创建一组按优先顺序排列的措施以应对威胁。


A mass-mailing computer virus could also quickly begin using the vulnerabilities to spread.

一类垃圾邮件病毒也可能会马上利用这个漏洞,得以快速传播。


Hackers who attack computer systems are becoming more nimble and are taking less time to exploit system vulnerabilities, a new report says.

一项新的报告说:攻击电脑系统的黑客变得越来越机敏,他们找到电脑系统漏洞所花的时间越来越少。


Unfortunately, ascertaining whether a program has design-level vulnerabilities requires great expertise, which makes finding such flaws not only difficult, but particularly hard to automate.

不幸的是,确定是否计划设计级别的漏洞,需要伟大的专业知识,这使得寻找这种缺陷不仅难度,但特别努力实现自动化。


A lack of clarity yields confusion, and this breeds vulnerabilities.

不清楚就会产生混乱,也就会引起安全隐患。


Removes the requirement that all code in the call chain must be granted permission to access the specified resource, it can open up security vulnerabilities if used incorrectly or inappropriately.

不要求调用链中的所有代码必须被授予访问指定资源的权限,如果使用错误或使用不当,就会暴露安全漏洞。


Just as the good guys are looking for vulnerabilities, the same thing goes for the bad guys.

与好人在查找弱点一样,那些坏家伙也在做同样的事。


Two of the three vulnerabilities targeted by the exploit code lie within Music Jukebox.

两三个弱点有针对性的,由开发代码位于音乐点唱机。


Defense Intelligence Agency (1991). “Iraq Water Treatment Vulnerabilities,” http://www.gulflink.osd.mil/declassdocs/dia/19950901/950901_511rept_91.html .

中文说明:”伊拉克净水设施的弱点”,由美国国防情报局发布。


To avoid introducing security vulnerabilities into your code, be sure you understand the security implications of the optimization techniques before using them.

为了避免将安全脆弱性带入您的代码,在使用优化方法之前一定要确保您了解这些方法可能带来的安全问题。


In order to avoid such vulnerabilities,firewall administrators have to determine an appropriate position in the firewall rule set to be inserted,and identify all the rules conflicting with the new rule in advance.

为避免漏洞产生,管理员必须正确地确定新规则插入的位置,找出与新规则相冲突的所有规则.


Integrated quantitative assessment of mainstream operating systems'security vulnerabilities

主流操作系统安全弱点的综合量化评估


Learn about common Web application vulnerabilities.

了解常见的Web应用程序漏洞。


The truth is, hackers will always be able to locate vulnerabilities and issue new malicious code to exploit them.

事实是,黑客们永远都能够找出新的系统漏洞,并且编写新的恶意代码对其进行攻击。


They found that there are vulnerabilities in every version of every router manufacturer's software, allowing hackers to hijack a router, say.

他们发现在每一个路由器制造商的每一版路由软件中都有脆弱点,可以使黑客入侵路由器。


They study Internet security vulnerabilities, handle computer security incidents, and publish security alerts.

他们研究因特网的安全弱点,处理计算机安全事故并发布安全警告。


They can then abuse that permission, exploiting outbound communications vulnerabilities to open a backdoor or install a rogue application to communicate secretly with the attacker.

他们能然后滥用那许可, 开发出省的通讯弱点打开一扇后门或安装一个流氓应用程序与攻击者一起秘密地交流。


“The outbreak of thecrisis and its spillover to the entire world reflected the inherent vulnerabilities and systemic risks in the existing international monetary system,” Mr Zhou wrote.

他写道:“此次金融危机的爆发并在全球范围内迅速蔓延,反映出当前国际货币体系的内在缺陷和系统性风险。”


He needs to develop instincts about the concerns and vulnerabilities of his country,whether the threats be political,economic,social or technological.

他必须对国家所忧虑的事以及其种种弱点培养出本能的认识,不管隐患是来自政治、经济、社会或科技方面。


" he says, "that potentially had vulnerabilities," such as letting data pass unencrypted over a network.

他说, “可能有漏洞” ,如让数据通过加密的一个网络。


Any vulnerabilities present in URL interpretation (e.g. unicode, double-decode) can be exploited by tampering with the server and path of the URL.

任何漏洞在当前网址的解释(例如码、双解码)都可能篡改服务器和路径的网址并加以利用。


But he had that combustible mix of fears, insecurities, and psychological vulnerabilities that destroys the promise of so many addicts' lives.

但他身上也有一种由恐惧、缺乏安全感、心理脆弱等成分组成的易燃混合物。这种物质毁掉了多少瘾君子的生活希望。


However, Unix and Windows NT each has its share of security lapses and known vulnerabilities.

但是,Unix和Windows nt各有自己安全上的疏漏和众所周知的脆弱性。


Yet, it's a known fact that corrupted packets can expose hidden vulnerabilities in your network devices.

但是,有一个众所周知的结论就是,损坏的信息包能暴露你使用的网络设备中的一些隐藏的危险。


At first, this article introduces some common types of vulnerabilities, and then discusses transaction signatures, name servers security, and the DNS security extensions in detail.

作者在文中介绍了DNS经常遭受的攻击类型,讨论了事务签名、域名服务器自身安全、DNS安全扩展(DNSSEC)等防范策略。


Use the Security Configuration Wizard to reduce the susceptibility of Microsoft Windows environments to exploitation of security vulnerabilities.

使用安全配置向导可降低Microsoft Windows环境的安全漏洞被利用的可能性。


Rules of Causation Contributing factor and root cause statements must clearly address why something occurred with a focus on process and system vulnerabilities, not individuals.

促成原因和根本原因的陈述,必须清楚地指出为何事件的发生总是集中在流程和系统的弱点,而不在个人。


This update eliminates the "Spoofed Route Pointer" and "Fragmented IGMP Packet" vulnerabilities

修正,传输”路由资料”与”网络封包”时的一些安全性问题吧!?


The factors of IMS vulnerabilities are drawed by using CVSS and the evaluation mode of vulnerability degree is given based on gray-color theory.

借鉴了通用脆弱性评分系统(CVSS)的思想提取IMS脆弱性评估的指标,利用灰色理论建立了IMS脆弱性等级评价模型。


Software like operating systems and Web browsers can also have vulnerabilities that are intermittently discovered and patched by software vendors.

像操作系统、网络浏览器这样的软件也同样有弱点。这些弱点会不时地被销售方发现、打补丁。


cormnon vulnerabilities and exposures

公共漏洞列表


Fathi: I made a statement six or nine months ago that I would like to see half as many vulnerabilities as XP in the first year.Obviously I'd like less than that.I'd be happy with zero.

六或者九个月前我表示希望看到第一年的漏洞数量是xp的一半,显然我希望这个数字更小,如果是零我会很高兴。


Critical updates are provided to help resolve known issues and protect your computer from known security vulnerabilities.

关键更新帮助解决已知问题,并保护您的计算机免受已知的安全性攻击。


Analyzing the vulnerabilities of security bootstrapping procedures in existing trusted mobile platforms, an improved procedure is proposed and it is verified according to predicate logic.

分析了现有可信移动平台安全引导过程安全漏洞,提出了改进的安全引导过程,并通过谓词逻辑对改进的引导过程进行了正确性验证。


Are there any serious vulnerabilities on the list?

列表上有没有提到什么严重的安全性漏洞?


Taking advantage of modern processor XD/NX capabilities is a powerful way to fight back and prevent this most common class of Internet vulnerabilities.

利用现代处理器xd法/nx的能力是一个有力的反击的途径,并防止这种最常见的一类互联网的安全性问题。


Human immunodeficiency virus vulnerabilities and related health risk behaviors of out-of-school children of the floating population in Beijing

北京流动人口校外青少年感染人类免疫缺陷病毒的脆弱性及其影响因素


Security Vulnerabilities and Improvements of the Needham-Schroeder Protocol

协议的安全缺陷与改进


Last year, the IETF announced that NAT-PT causes too many deployment problems and security vulnerabilities.

去年, IETF之前宣布的NAT - PT的原因太多,部署的问题和安全漏洞。


Antivirus has its role and, vital as it is, it cannot close the vulnerabilities that would prevent an attack.

反病毒软件是与其自身的规则密不可分的,而且面对黑客攻击,基本没有什么反抗能力。


Can limit the liability of the programmer or help prevent accidental security vulnerabilities because it helps prevent the method that calls

可限制程序员的责任或帮助防止出现意外的安全漏洞,因为它可以防止调用


Otherwise, malicious callers are able to derive from your permission, potentially causing security vulnerabilities.

否则,恶意调用方将能够从您的权限派生,有可能导致出现安全脆弱性。


So, dig deeply vulnerabilities and improve precision of scan becomes the soul of scanning the system.

因此,挖掘深化漏洞,提高扫描精度成为扫描系统的灵魂。


Therefore so long as all security vulnerabilities were found and patched, the system may resist most of attacks launched by the hacker.

因此只要找到并修补所有的安全漏洞,就可以抵御绝大部分的黑客攻击。


ISS specializes in software, appliances and services that help IT shops monitor and manage network vulnerabilities.

国际空间站的专门软件,家用电器和服务,帮助它店监测和管理网络的脆弱性。


The IMF, in collaboration with the expanded FSF and other bodies, should work to better identify vulnerabilities, anticipate potential stresses, and act swiftly to play a key role in crisis response.

国际货币基金组织、金融稳定论坛以及其他的机构应当通力合作更好地意识到自身的弱点,预见到潜在的压力并积极地在经济危机中发挥重要作用。


After analyzing the research situation and the shortcoming of vulnerabilities database system, the distributed computing technology, database technology and Web technology are used to implement NSVADS.

在分析国内外研究现状的基础上,针对现有的漏洞库系统在漏洞信息的组织、使用等方面存在的不足,采用分布计算技术、数据库技术、Web技术实现了网络安全脆弱性分析与处置系统。


Find vulnerabilities and opportunities in your industry. Rather than assuming things will stay the same, assume they will be different. In fact, assume they will be very different!

在您的行业中寻找着手点和机会。不要假定形势会一成不变,而要假定事情会不断变化。事实上,应该假定事情会发生很大变化!


Buffer overflow vulnerabilities account for about half Of all the software vulnerabilities.

在所有的软件安全漏洞中,缓冲区溢出漏洞大约占一半。


in computer security,a technique in which certain vulnerabilities are made attractive to a potential attacker

在计算机安全学中,一种以某些弱点来吸引潜在攻击者的技术


In computer security, a technique in which certain vulnerabilities are made attractive to a potential attacker.

在计算机安全学中,一种以某些弱点来吸引潜在攻击者的技术。


Discuss vulnerabilities and security flaws on this public mailing list.

在这个公共邮件列表中讨论漏洞和安全隐患。


Mr Evans oversees the Centre for the Protection of National Infrastructure, an interdepartmental agency devoted to reducing the vulnerabilities of these key sectors of the economy.

埃文斯还掌控着英国国家基础设施保护中心(Centre for the Protection of National Infrastructure),这是一个跨部门机构,致力于减少这些关键经济领域的弱点。


Mr Evans oversees the Centre for the Protection of National Infrastructure, an interdepartmental agency devoted to reducing the vulnerabilities of these key sectors of the economy.

埃文斯还掌控着英国国家基础设施保护中心,这是一个跨部门机构,致力于减少这些关键经济领域的弱点。


Vulnerabilities and Its Countermeasures of Inter-domain Routing System

域间路由系统脆弱性及其应对措施

用作名词(n.)

They found that there are vulnerabilities in every version of every router manufacturer's software, allowing hackers to hijack a router, say.
他们发现在每一个路由器制造商的每一版路由软件中都有脆弱点,可以使黑客入侵路由器。