Another is to find ways to ensure that software developers produce code with fewer flaws in it so that hackers have fewer security holes to exploit.
另一种是找到确保软件开发人员编写的代码中有更少的缺陷的方法,这样黑客就有更少的安全漏洞可以利用。
By definition, a worm is a self-contained software component that automatically performs probe actions designed to identify and exploit vulnerabilities on a targeted system.
蠕虫的定义如下,蠕虫是一个自包含软件组件,可以自动执行可识别和攻击目标系统漏洞的探测操作。
Recently, software development is seen as something that generates revenue that can help to exploit economic options.
近期以来,软件开发渐渐被视为产生能帮助利用经济选择性的效益的活动。
If the jointly developed software cannot be used in separate parts, the co-developers may exploit the copyright by consensus.
合作开发的软件不能分割使用的,由合作开发者协商一致行使。
IBM is also getting greater margins from creating offerings that exploit the blurring of software and services, such as cloud computing and SOA.
IBM正在从新型软件服务业务(如云计算,SOA应用等)中获取更多利润。
Web software is buggy, attackers find and exploit these bugs.
Web软件是错漏不断的,为攻击者发现和利用。
Because Web services are software components, the development of Web services must exploit the advantages of MDA.
由于Web服务是软件组件,Web服务的开发必须利用MDA的优点。
Antivirus software specialists Trend Micro believe as many as 10, 000 sites have been hacked to exploit the flaw.
反病毒软件专业机构趋势科技认为,已经有一万多个网站受到感染,这些网站会利用IE漏洞攻击用户。
The sophisticated attacker finds a weakness in a similar type of software, and tries to use that to exploit the system.
富有经验的攻击者可以发现同类软件的缺点,并且尝试利用这些弱点来进入系统。
The emergence of social software presents an opportunity for savvy it leaders to exploit the groundswell of interest in informal collaboration.
社会性软件的出现为精明的IT负责人提供了一种机遇,可充分利用用户对非正式协同的强烈兴趣。
The MADES tools will provide developers the ability to more easily reuse existing software components, ensure consistency of complex systems, and exploit advanced multicore hardware platforms.
这些开发技术也使实时系统开发人员实现更高的性能水平和可靠性,并可扩展到先进多核平台。
Depending on how advanced the scanner is, the software may attempt to exploit vulnerabilities (if this feature is supported).
这个扫描器可能试图研究漏洞(如果支持该特性),但这取决于扫描器的先进程度。
Experts at Reliable Software Technologies examined the potentially vulnerable code and were unable to learn of a way to exploit any of the conditions.
ReliableSoft wareTechnologies的专家侦测了潜在的易受攻击的程序码,并且未能掌握利用任何情况的方法。
Mr Rios has already found tens of thousands of corporate heating, air-conditioning and ventilation systems online, many with vulnerabilities in their software that a hacker could exploit.
里奥斯先生已经发现在数以万计联机的企业供暖,空调和通风系统中,很多控制软件都存在黑客可以利用的漏洞。
The essence of software vulnerability is to exploit and affect system security.
软件脆弱性的本质是利用该脆弱性可以影响系统的安全。
Debugger is an important tool to exploit software and useful to decrease the time of exploiting software.
调试器是软件开发的重要工具,它有利于减少应用软件的开发时间。
The using of this software increased the development ability of our company, we have curtailed the time of exploit, and offer our customer the direct covering simulated pictures at the shortest time.
此软件的应用,大大提高了整个公司的开发设计能力,我们将缩短了开发时间,以最快的速度提供给客户直观的覆盖面模拟效果图。
System to fully exploit the computing power of single-chip software instead of hardware circuits, so that greatly simplify the hardware circuit.
系统充分发掘了单片机的运算能力,以软件代替硬件电路,使硬件电路大大简化。
When exploit software which is related with rapid prototyping, it is absolutely necessarily to read the datum savde as STL format.
在开发与快速成形相关的软件时,对STL格式的数据文件的读取是必不可少的。
This paper is on the basis of the characteristics of the packing machine courses, to research and exploit the software of the packaging machine CAI.
本文结合包装机械学课程的特点,对其CAI课件进行了研究和开发。
This paper discuss the realization of the software module checking the completeness of data, that is to exploit the check software, which has real application prospect.
介绍了数据完备性检查模块的一个具体实现,即开发有实际应用前景的残缺数据检查软件。
Malvertising, as this practice is known, can exploit software vulnerabilities or dispatch deceptive pop-up messages.
恶意广告,其做法早已为人们熟知,就是发现软件漏洞或者发出欺诈的弹出式信息。
Microsoft and mobile developers to establish a number of tools and frameworks, so that software developers can fully exploit the capabilities of these smart devices.
微软和手机开发商建立了许多工具和框架,使软件开发人员可以充分发掘这些智能设备的能力。
Last, i give some examples on how to write exploit programs after finding vulnerabilities. i also introduce a new exploit method : exploit based on software signal.
最后就如何编写通用的缓冲区溢出代码进行了分析和举例,还介绍了一种新的攻击手段,基于信号量的攻击。
Enter computer filch data to prevent other to exploit software loophole, the client should update relevant software in time, download patch program.
为防止他人利用软件漏洞进入计算机窃取资料,客户应及时更新相关软件,下载补丁程序。
In practice, the software on the chip must be rewritten to exploit multiple cores, but such software is becoming increasingly common.
实践中,为了利用多心芯片,软件必须重写,这种软件正在变得更加普遍。
Trojans exploit vulnerabilities of banking software used by clients to carry out transactions over the Internet.
利用木马客户端用于通过互联网进行交易的银行软件的漏洞。
Trojans exploit vulnerabilities of banking software used by clients to carry out transactions over the Internet.
利用木马客户端用于通过互联网进行交易的银行软件的漏洞。
应用推荐