您要查找的是不是:
- To call this a security hole is to understate the point woefully. 不幸的是,将它称之为安全性漏洞是轻描淡写的说法。
- That would create a serious security hole in your architecture. 这会在您的体系结构中产生严重的安全漏洞。
- You must be careful that you do not create a security hole in this process. 您必须非常小心,不要在这一过程中制造安全漏洞。
- This would be appropriate to fix a security hole in a previously released assembly. 这适用于修复以前发布的程序集中的安全漏洞。
- Thus, missing blocks are filled with null bytes, eliminating the security hole - a much better approach. 因此,丢失块由空字节来填充,这消除了安全性漏洞这是一种好得多的方法。
- Any CGI script installed at your site may contain bugs, and every such bug is a potential security hole. 所有安装在网站上的cgi脚本程序都有可能包含漏洞,每个漏洞都是一个潜在的安全漏洞。
- There was no software for the security hole whatsoever the system did not exist. 能弥补一切系统的安全漏洞的软件是不存在的。
- This is done to avoid creating a gaping security hole and matches the most likely desired configuration. 它避免生成一个安全漏洞缺口并匹配到了可能很多人最渴望的配置。
- For security reasons,regular expression substitution of $1 etc. is disallowed,because that would open a security hole. 出于安全考虑,规则扩展的子项如%241等不被允许,因为他可能打开一个安全漏洞。
- Do provide sensible default values for all properties, ensuring that the defaults do not result in a security hole or an extremely inefficient design. 为所有属性提供适当的默认值,确保属性的默认值不会导致安全漏洞或设计效率非常低下。
- To exploit the security hole, hackers must trick users into visiting a Web site loaded with malicious code, Microsoft said. 微软说,为了利用这个安全漏洞,黑客必须欺骗用户访问一个装载了恶意代码的网站。
- Finally, the author stress analyzing the 3G authentication, key agreement protocol and its security, finding the security hole and putting forward new authentication and key agreement protocol based on ECC. 重点分析了3G认证与密钥分配协议及其安全性,找出了其中的安全漏洞,提出了新的基于椭圆曲线密码体制的认证与密钥分配协议。
- It's a maxim in system security circles that buggy software opens up security holes. 存在最多的系统安全隐患主要是由于很多带有漏洞的软件存在安全漏洞。
- A revelation of previously secret code almost always leads to the discovery of additional flaws and security holes. 公开先前保密的代码后几乎总会被发现额外的错误和安全性漏洞。
- Therefore you will need to keep up with cumulative fixes if you want all known security holes to be closed. 因此,如果您想要修复所有已知的安全漏洞,则需要保持累积修复最新。
- You can be certain that potential intruders learn of those security holes quickly. 可以肯定,潜在的入侵者会很快了解那些安全性漏洞。
- The main way rogue programs get into a system is by exploiting security holes in the operating system. 恶意的程序进入系统的主要方法是利用操作系统的安全性漏洞。
- Another area of concern is the potential for security holes exploited by race conditions. 另一个需要关注的方面是争用条件可能会利用安全漏洞。
- A piece of software not installed cannot be misconfigured, thereby closing down additional potential security holes. 没有安装的软件不可能被错误地配置,这样就封住了另外的潜在安全漏洞。
- Hackers can automatically exploit security holes in your system using some not-very-complex, ready-made, free hacking programs. 黑客能自动地剥削安全孔在你的系统使用有些没有非常复杂,现成,自由乱砍的节目。