您要查找的是不是:
- security vulnerability testing 安全漏洞测试
- The second way to test is the use of online vulnerability testing sites. 第二种测试方法是使用在线缺陷测试网站。
- While it does not represent a security vulnerability, it is a security risk. 虽然这个选项并不意味就着是安全漏洞,不过它确实是一个安全隐患。
- NetClarity would be offering a free vulnerability testing program for VoIP equipment providers. 为VoIP设备提供商免费进行网络安全测试。
- This update resolves the "NetBIOS Name Server Protocol Spoofing" security vulnerability in some Windows-based networks. 此更新消除了某些基于Windows的网络中的“NetBIOS名称服务器协议欺骗”安全漏洞。
- Microsoft has released a patch that eliminates a security vulnerability in Microsoft Windows NT 4.0. Microsoft公布了一份消除Microsoft Windows NT 4.;0上一项安全性缺失的修补档案。
- Computer hackers exploited on internet security vulnerability to destroy some companies' databases. 计算机黑客利用互联网的疏漏破坏了一些公司的数据库.
- A security vulnerability exists in Microsoft Excel that could allow arbitrary code to run when opening a maliciously modified spreadsheet. Microsoft Excel存在一个安全漏洞,在打开被恶意修改过的电子表格时,任意代码可以利用该漏洞在计算机上运行。
- A security vulnerability exists in Microsoft Word 2000 that could allow arbitrary code to run when a maliciously modified file is opened. 在Microsoft Word 2000中开启遭到恶意窜改的档案时,可能会出现允许执行任意程式码的安全性弱点。
- A security vulnerability has been identified that could allow an attacker to compromise a Windows-based computer and gain complete control over it. 发现了一个安全漏洞,该漏洞使攻击者能够危害基于Windows的计算机并对其进行控制。
- About this download: An identified security vulnerability in Microsoft Windows 2000 could allow an attacker to take control of the computer. Microsoft Windows 2000中一个已知的安全漏洞可使攻击者得以控制计算机。
- This paper based on a concrete CA, introduces the security vulnerability, intrusion from inside and outside, and the measures to protect the system. 本文根据一个实际的CA系统,介绍了CA系统存在的总体脆弱性和可能存在的内外部攻击方式及防范措施。
- This paper introduces the working principle of ARP, and analyzes the security vulnerability of the existing ARP and related countermeasures. 该文介绍ARP协议工作机制、协议安全漏洞和当前已经提出的针对ARP欺骗的对策,并指出这些方法的不足之处。
- If a malicious user finds security vulnerability and injects code into your process, the malicious code will run with the same privileges as the host process. 如果恶意用户发现安全漏洞,并且在您的进程中注入代码,则恶意代码将使用与宿主进程相同的特权运行。
- The targets of vulnerability finding tool is to find security vulnerabilities in hosts or networks, test their defense ability and give some possible remedy methods. 漏洞探测工具的目的是探测特定主机或网络中存在的安全漏洞,以测试系统的防御能力,给出可能的修补方法。
- Whitelist mechanism based on priority to prevent the loss of any function of circumstances, to prevent the use of known or unknown security vulnerability attacks. 白名单基于优先阻止机制,在不损失任何功能的情况下,阻止利用已知或未知安全漏洞的攻击。
- A security vulnerability “JBIG2 Symbol Dictionary Processing” in one of the critical add-ons of Foxit Reader 2.3 and 3.0 - JPEG2000/JBIG Decoder 2.0.2008.715 has been fixed. 一本安全漏洞“JBIG2标志字典Processing”在其中一重要添加物中Foxit读者2.;3和3
- A security vulnerability has been identified that could allow an attacker to disrupt a facility by which security settings are applied to Windows-based computers in a corporate network. 发现了一个安全漏洞,此漏洞可使攻击者中断某个工具,而安全设置正是通过这个工具被应用到企业网中的基于Windows的计算机中。
- Download this patch to help protect your computer from an identified security vulnerability in Microsoft Windows NT 4.0 That could allow an attacker to take control of the computer. 下载此修补程序可使您的计算机免受Microsoft Windows NT 4.;0中一个已知安全漏洞的影响;该漏洞可使攻击者得以控制计算机。
- A malicious caller granted this SecurityPermission can view data such as hidden directory locations or granted permissions and use the data to exploit a security vulnerability on the computer. 被授予了此SecurityPermission的恶意调用方可以查看隐藏目录位置或授予的权限等数据,并使用这些数据攻击计算机的安全漏洞。
- 今日热词
-
- 深远海浮式风电平台 - deep-sea floating wind power platform
-
- 京雄高速公路 - Beijing-Xiongan expressway
-
- 农业及相关产业增加值 - the added value of agriculture and related industries