zero-day

美 [ˈzɪroʊ deɪ]英 [ˈzɪərəʊ deɪ]
  • 网络零日;零日漏洞;零时差;零日攻击;零时
zero-dayzero-day
  1. Some newly found network attacks such as zero-day vulnerability attack have made new demands of network vulnerability assessment .

    特别是零日漏洞攻击的出现,对网络漏洞评估提出了新的要求。

  2. Last year , a similar zero-day exploit in Apple 's iOS software was sold to Zerodium , a Washington buyer and seller of zero-days , for $ 1 million .

    去年,苹果iOS软件中一个类似的零日漏洞被以100万美元(约合670万元人民币)的价格,卖给了华盛顿零日漏洞中间商Zerodium公司。

  3. Zero-day vulnerabilities are critical threats , and they genuinely require immediate attention .

    零日缺陷是致命威胁,并且它们确实需要立即注意。

  4. More advanced web application firewalls can even provide protection against unknown , zero-day threats by identifying illicit traffic .

    更为先进的Web应用程序防火墙甚至能识别非法流量,针对未知的零日攻击提供保护。

  5. The technology is ideal at protecting against zero-day threats in the form of Viruses and Trojans .

    该技术是理想的,在保护儿童不受零日威胁形式的病毒和木马。

  6. Capturing the injected code allows Adaptive IPS to construct attacking signatures for zero-day exploits .

    捕获到的注入码也可以使自适应入侵防御系统为zero-day性质的exploits代码创建攻击特征。

  7. There will also be zero-day protection from capabilities such as behavior monitoring , dynamic translation and emulation ( aka host intrusion prevention ) .

    此外,我们亦将零时差,如行为监测,动态翻译和代码仿真(又名主机入侵防护)功能的保护。

  8. Signature : Finding so-called zero-day exploits -- ways to hack new software , selling them to governments and other deep-pocketed clients

    特征:找到所谓的“零天攻击”代码(zero-dayexploit)——即攻击新软件的方法,再把它们卖给政府和其他财大气粗的客户。

  9. Especially prized are so-called zero-day exploits , bits of disruption coding that spread immediately because there is no known defense .

    非常有价值的是所谓的零天开发,即一些不连续的解码,这些解码会立即散播出去,因为不知道如何防御。

  10. The exploit targets a previously undiscovered flaw - known in security circles as a ' zero-day ' vulnerability - in the software .

    该漏洞针对的是Word之前一个未发现的缺陷——在安全界被称为“零日”。

  11. Disclosing a so-called zero-day exploit before it has been repaired alerts other hackers to the flaw and can lead to more attacks on Windows PCs.

    在一个所谓的零日漏洞被修补前就披露它,会提醒其他黑客注意该漏洞,这可能会引发对Windows系统个人电脑的更多攻击。

  12. High-interaction honeypots which can respond to zero-day attacks will grasp the manner and process of network attack more clearly , the low-interaction honeypots which is convenient maintenance and easy deployment can easily capture independent propagation of malicious code .

    高交互蜜罐能够更加清晰的把握攻击方式与流程,并可应对零日攻击。低交互蜜罐可以方便的捕获自主传播的恶意代码,而且维护与部署方便。

  13. The two-day event , sponsored by Hewlett-Packard ( HPQ ) and organized by the HP-owned Zero-Day Initiative , paid out $ 850000 in prize money to eight teams of competitors , plus another $ 82500 in charitable donations .

    由惠普公司(Hewlett-Packard)赞助、惠普零日计划(Zero-DayInitiative)组织的Pwn2Own黑客大赛为期两天,共为八个参赛团队提供了85万美元的总奖金,并为慈善机构捐出了8.25万美元善款。