您要查找的是不是:
- You can use this information to fix a security breach. 您可以使用這些信息來修復違反安全性的情況。
- Setting certain environment variables may be a potential security breach. 設置某些環境變數可能是潛在的安全缺口。
- If there is a security breach in a small area, it can permeate the entire system. 如果在小範圍內有一安全漏洞,它將擴散到整個系統。
- If there is a security breach in a small area,it can permeate the entire system. 如果在小範圍內有一安全漏洞,它將擴散到整個系統。
- A dutch biotech firm reported that they may have had a security breach involving anthrax last week. 荷蘭的生物公司報告稱 上個星期公司的炭疽可能被盜
- How did a terror cell get its hands on anthrax without a single lab reporting a security breach? 怎麼會在一個恐怖組織有炭疽病毒的情況下 連一個安全警報都沒有?
- Determine the potential for damage from a successful attack that results in a security breach. 確定攻擊成功而導致安全性被破壞的可能性。
- This exposes the data to security breaches. 這就使數據暴露於安全的薄弱環節。
- XSS is a security breach that takes advantage of dynamically generated Web pages. XSS是一種破壞安全的方法,它利用了動態生成的網頁。
- Use this tool to take a report server instance offline to investigate a security breach or if you think the report server is being attacked. 若要調查安全違規問題或者您認為報表伺服器受到攻擊,可以使用此工具將報表伺服器實例離線。
- So hot in fact the rumors swirled the Acura and Honda threatened to pull out of the show in protest for the security breach! 這麼熱,事實上,巴拉德周圍的謳歌和本田的威脅要退出該節目以示抗議的安全漏洞!
- The committee says incidents such as the security breach on the MTAS website, and the loss of 25m child benefit records last year, must be taken more seriously. 該委員會表示,例如MTAS網站安全侵害與去年2500萬兒童利益記錄丟失的事件必須得到更加嚴肅的對待。
- We consider this security breach to be a horrendous and inexcusable offense," Norton's statement emphasises, without identifying the consultant concerned or his/her company. 我們認為這是違反保安是一個可怕的和不可饒恕的罪行,在"諾頓的聲明強調了,沒有查明有關顧問或他/她的公司。
- These accounts have not been accessed through any security breach at Google, but most likely via phishing scams or malware placed on the users' computers. 這些帳戶還沒有被訪問的谷歌通過任何安全漏洞,但大多數通過網路釣魚詐騙或惡意軟體在用戶的電腦上的可能。
- System monitoring that alerts the enterprise to security breaches. 安全入侵的系統監視。
- Because of that,security has been one of those topics that everyone agreed was important,but no one seemed willing to do much about,except in those rare situations in which a security breach could cause huge amounts of damage. 正因為這些,安全已成為人人都認為很重要的問題之一,但是看來好像還沒有什麼人願意對此做很多工作,例外的只是那些安全一旦遭到破壞就會引起重大損失的少見的情況。
- The usual collection mechanism is simple elicitation. The visitor may be asked to give a talk to his colleagues in China,who then pepper him with questions that might induce at least a small security breach on his part. 在中國,外出訪問者也許會被同事叫去一塊聊天,同事會提出一些尖銳的問題,引誘他說出一些有用的情報。(《形形色色的間諜活動》保爾D-摩爾《華盛頓郵報》1999.;5
- Security breach in Sector 7G. 7G區出現安全裂口。
- Because of that, security has been one of those topics that everyone agreed was important, but no one seemed willing to do much about, except in those rare situations in which a security breach could cause huge amounts of damage. 正因為這些,安全已成為人人都認為很重要的問題之一,但是看來好像還沒有什麼人願意對此做很多工作,例外的只是那些安全一旦遭到破壞就會引起重大損失的少見的情況。
- The usual collection mechanism is simple elicitation. The visitor may be asked to give a talk to his colleagues in China, who then pepper him with questions that might induce at least a small security breach on his part. 在中國,外出訪問者也許會被同事叫去一塊聊天,同事會提出一些尖銳的問題,引誘他說出一些有用的情報。(《形形色色的間諜活動》保爾d-摩爾《華盛頓郵報》1999.;5