security hole

美 [sɪˈkjʊrəti hoʊl]英 [sɪˈkjʊərəti həʊl]
  • 网络安全漏洞
security holesecurity hole
  1. That would create a serious security hole in your architecture .

    这会在架构中造成严重的安全漏洞。

  2. As should be obvious , this is a potential security hole .

    非常明显,这是一个潜在的安全漏洞。

  3. There was no software for the security hole whatsoever the system did not exist .

    能弥补一切系统的安全漏洞的软件是不存在的。

  4. Security Hole Analysis of Wireless LAN

    无线局域网的安全漏洞分析

  5. Via ports scanning , it can gained many useful information , also find out system security hole .

    通过端口扫描,可以得到许多有用的信息,从而发觉系统的安全漏洞。

  6. The network hole scanner is a program used to checking for security hole in local or remote host .

    网络漏洞扫描器是一个用来自动检查本地或远程主机的安全漏洞的程序。

  7. The system is discussed by experiment , to find vulnerability or security hole in source code of test and actual project .

    对测试项目和实际工程的源代码进行了实验。实验结果表明,本文提出的方法能够快速的对程序源代码进行检查,发现缓冲区溢出的脆弱点。

  8. To call this a security hole is to understate the point woefully .

    不幸的是,将它称之为安全性漏洞有些轻描淡写。

  9. Thus , missing blocks are filled with null bytes , eliminating the security hole & a much better approach .

    因此,丢失块由空字节来填充,这消除了安全性漏洞―这是一种好得多的方法。

  10. Any CGI script installed at your site may contain bugs , and every such bug is a potential security hole .

    所有安装在网站上的CGI脚本程序都有可能包含漏洞,每个漏洞都是一个潜在的安全漏洞。

  11. This is a security hole because an intruder could potentially pretend to be a messaging engine and compromise the bus traffic .

    这是一个安全性漏洞,因为入侵者可能可以伪装成消息传递引擎并截获总线通信流。

  12. The Firefox team fixed a security hole that allowed frames and iframes to inherit the parent document 's character set .

    Firefox小组修复了一个安全漏洞,该漏洞使得frame和iframe可以继承父文档(parentdocument)的字符集。

  13. Do provide sensible default values for all properties , ensuring that the defaults do not result in a security hole or an extremely inefficient design .

    为所有属性提供适当的默认值,确保属性的默认值不会导致安全漏洞或设计效率非常低下。

  14. The lawless elements try their best using e-government network security hole , and with that they have caused serious destruction at each aspect to e-government .

    不法分子利用电子政务网络的安全漏洞,尽其所能,对电子政务的各个方面都造成了严重的破坏。

  15. Superfish also contains a major security hole that hackers can potentially exploit to eavesdrop on a user 's web-browsing behaviour .

    Superfish软件中还含有一个重大安全漏洞,黑客有可能利用该漏洞,监听用户的网络浏览行为。

  16. And there was a hotfix / service pack / automatic update that appeared a few days or weeks later to fix some glaring functional omission or security hole .

    随后的几天或者几个礼拜会出现补丁、自动升级来修补一些明显的功能缺失或者安全漏洞。

  17. The text introduce the inborn feature of 2nd layer in OSI 7 layer model , analyse the most security hole in layer 2 switch , and recommend the corresponding solution accordingly .

    本文通过OSI模型的第二层的特点,分析了二层交换机存在的安全隐患,提出了相应的解决办法。

  18. Now widely used in the enterprise network is TCP / IP protocol suite , which have problems such as security hole and imperfect security . Hacker can swoop in through these on the internet .

    目前企业网普遍采用的TCP/IP协议族潜在着安全漏洞以及安全机制不健全的问题,互联网上的黑客可趁虚而入。

  19. First , the paper points out that the buffer overflow is most dangerous security hole of software , expounds background and studies of this field , and shows the advantages and disadvantages of original static and dynamic buffer overflow analysis method .

    本文首先阐述了课题的研究背景、意义以及国内外研究现状,分析了国内外缓冲区溢出漏洞分析的典型技术和系统,研究分析了溢出漏洞静态分析和动态分析技术的优缺点。

  20. This might not seem to be the biggest security hole you need to worry about , but what gives this exploit its teeth is the fact that it 's not as well-known and there isn 't an easy patch for it .

    这可能不是您需要担心的最大安全漏洞,但令其危险的是,这种利用不太知名,并且没有简单的补救办法。

  21. This paper analyzed the security hole of a quantum key distribution and quantum authentication protocol through once quantum communication , which can withstand interception / resend attack strategy and entanglement attack strategy but can not resist the entanglement / interception attack strategy .

    分析了一次量子通信量子密钥分发(QKD)和认证(QA)协议存在的安全性漏洞,协议能抵抗截取/重发攻击策略和纠缠攻击策略,但不能抵抗纠缠/截取攻击策略。

  22. Providing safe and credible data information transmitted networks for reconnoitering , exploitation , production and management , through the research of network low layer program technique , network application consult , network security and hole survey .

    确保网络核心设备和重要应用服务的正常、安全、可靠运行,为勘探开发生产和管理提供安全、可靠的数据信息传输网络。

  23. Finally , the author stress analyzing the 3G authentication , key agreement protocol and its security , finding the security hole and putting forward new authentication and key agreement protocol based on ECC .

    重点分析了3G认证与密钥分配协议及其安全性,找出了其中的安全漏洞,提出了新的基于椭圆曲线密码体制的认证与密钥分配协议。

  24. Recently , network security technologies include : firewall technology , access control technology , network anti-virus technology , network security hole scan technology , intrusion detection technology , information encryption technology , information confirmation technology and so on .

    网络安全的基本技术目前有:防火墙技术、访问控制技术、网络反病毒技术、网络安全漏洞扫描技术、入侵检测技术、信息加密技术、信息确认技术等。