vulnerabilities信息详情
n.缺陷(vulnerability的复数形式);脆弱点
invulnerable definition───无懈可击的定义
vulnerable───adj.易受攻击的,易受……的攻击;易受伤害的;有弱点的
invulnerable meaning───无懈可击的意思
be vulnerable to───易受……的伤害;易受…的伤害
vulnerary definition───漏洞定义
invulnerable ellison───无坚不摧的埃里森
vulnerary meaning───脆弱的含义
deferential vulnerability meaning───恭敬脆弱性含义
vulnerary def───脆弱防御
rhynchophorus vulneratus───秃钩虫
Every system has vulnerabilities that a knowledgeable thief could theoretically exploit.───每个系统都有漏洞,理论上,具备相关知识的小偷就可以对其加以利用。
Several massive leakages of customer and employee data this year have left managers hurriedly peering into their intricate IT systems and business processes in search of potential vulnerabilities.───今年几起严重的客户和雇员资料泄漏事件使得管理者们匆忙仔细检查他们复杂的信息系统和业务流程,以寻找可能存在的安全隐患。
We see our own vulnerabilities in them.───我们从他们身上看到了自己的弱点。
The company also pointed out that hackers have been using some of these vulnerabilities to launch attacks to the user's machine.───该公司还指出,已经有黑客在利用上述部分安全漏洞向用户机器发起攻击。
There would be no possibility of any vulnerabilities affecting the referring page (which may be administered by someone else).───其中并没有任何缺点可以影响到所引用的页面(这台服务器是由其他人进行管理的)。
But it was his embrace of the American-style bonus culture that became one of his main vulnerabilities.───然而,对美式红利文化的信奉,成了他的一个主要弱点。
This will help to reduce the likelihood of a full-fledged attack or to progressively weaken the attack against exploited vulnerabilities.───这将帮助减少受到全面攻击的可能性,或者主动减少对暴露的漏洞的攻击。
ON THE surface, China seems to understand the flaws and potential vulnerabilities of its growth model.───从表面上看,中国似乎也明白自身经济增长模式的缺陷和暗藏的危险。
The Mtb genome is not the only new source of data able to provide insight into the TB bacterium's potential vulnerabilities.───结核分枝杆菌基因组不是唯一能提供细菌潜在弱点的新来源。
These vulnerabilities, of course, have not been unique to Darfur.
Staying on top of emerging vulnerabilities and threats related to all continu process program information assets on your network can be a big job.
Each of these domestic vulnerabilities translates into a fragile, retrospective foreign policy that, in turn, fuels local frailties.
Yet, despite all these vulnerabilities, the Miro has inexplicably done quite well for itself.
Relevant vulnerabilities include metering and bill-ing data manipulation and billing evasion.
Out of your vulnerabilities will come your strength. Sigmund Freud
Heredity provides susceptibilities, capabilities, tendencies, and vulnerabilities.
Many don't want men to have vulnerabilities, hence the scorn poured by women on the idea of the New Man.
Gwyn examines several types of coding vulnerabilities and examines how you can mitigate the risk of exploit within your code.