ADJ-GRADED 脆弱的;易受伤害的 Someone who is vulnerable is weak and without protection, with the result that they are easily hurt physically or emotionally.
Old people are particularly vulnerable members of our society. 老年人是社会中尤为明显的弱势群体。
ADJ-GRADED 易感染(某种疾病)的;易患病的 If a person, animal, or plant is vulnerable to a disease, they are more likely to get it than other people, animals, or plants.
People with high blood pressure are especially vulnerable to diabetes... 有高血压的人尤其易患糖尿病。
Plants that are growing vigorously are less likely to be vulnerable to disease. 生命力强的植物不容易得病。
ADJ-GRADED 易受伤害的;易受影响的 Something that is vulnerable can be easily harmed or affected by something bad.
Their tanks would be vulnerable to attack from the air... 他们的坦克易受到空袭。
...a table showing which cars are most vulnerable to theft... 易被盗车辆一览表
Goodyear could be vulnerable in a prolonged economic slump. 经济长期疲软可能会对固特异公司造成影响。
Consider establishing a newsfeed for new threats and vulnerabilities. 可以考虑通过新闻feed了解新的威胁和漏洞。
You can use this option to minimize the risk of security vulnerabilities in the AIX operating system. 可以使用这个选项尽可能降低AIX操作系统中的安全风险。
Buffer overflow vulnerabilities can be prevented in C and C++ with knowledge, caution, and tools. 借助知识、谨慎和工具,C和C++中的缓冲区溢出缺陷是可以防止的。
A risk is the likelihood of a threat agent taking advantage of one or more vulnerabilities. 风险是构成威胁的个体利用一个或多个漏洞的可能性。
You can also use it to test for vulnerabilities on a site. 也可以使用它来测试站点上的漏洞。
A mashup application or page must address CSRF, Ajax vulnerabilities, XSS, and other potential security weaknesses. mashup应用程序或页面必须解决CSRF、Ajax漏洞、XSS和其他潜在的安全漏洞。
With this information in hand, you can then check these vulnerabilities and defend against them. 有了这些信息,就可以检查这些漏洞并进行防御。
To mitigate these vulnerabilities, you need to conduct a vulnerability assessment. 要缓解这种漏洞,您需要执行漏洞评估。
They are SQL, XML, and Ajax injection vulnerabilities. 它们是SQL、XML和Ajax注入漏洞。
It performs risk and threat analyses on collected use cases and produces guidelines for mitigating vulnerabilities. 它对收集到的用例执行风险与威胁分析,并为减轻漏洞带来的影响制订了指导准则。
For this article, I'll highlight those exploitable vulnerabilities that would impact the uptime availability in the SLA. 在本文中,我将重点介绍这些可利用来影响SLA中正常运行时间有效性的漏洞。
Many intrusion vulnerabilities such as SQL injection, CSRF, and XSS are preventable using a comprehensive input-validation framework. 如果使用一个综合的输入验证框架,许多输入漏洞,如SQL注入、CSRF和XSS,都是可以避免的。
This openness, however, presents a plethora of new security vulnerabilities. 然而,这种开放性导致了很多新的安全漏洞。
All vulnerabilities and countermeasures are demonstrated using a sample application built with jQuery Mobile, PHP, and MySQL. 使用通过jQueryMobile、PHP和MySQL构建的示例应用程序展示所有漏洞和对策。
Businesses and industries rely on popular vulnerability scanners ( free and commercial) to identify web application vulnerabilities. 各个企业和行业都依靠各种流行的漏洞扫描工具(包括免费和商用的)来识别Web应用程序漏洞。
New vulnerabilities and new threats emerge. 出现了新漏洞和新威胁。
The resulting codes also used in many global markets have reduced vulnerabilities. 制定出的建筑规范也在全球许多市场中采用减少了各种安全漏洞。
Thus the supporting services and API functions share many vulnerabilities with the Web applications layer. 因此,配套服务和API函数也具有Web应用程序层的许多漏洞。
Internet protocol vulnerabilities-such as vulnerabilities that allow man-in-the-middle attacks-are therefore relevant for cloud computing. 这样一来,互联网协议漏洞也就和云计算发生了关系,像是导致中间人攻击的漏洞。
Smallness brings its own challenges and vulnerabilities. 其规模之小给自身带来了挑战和劣势。
Vulnerable virtual machine template images cause OS or application vulnerabilities to spread over many systems. 有漏洞的虚拟机模板镜像会导致许多操作系统或应用程序上的漏洞传播到更多系统。
Discuss vulnerabilities and security flaws on this public mailing list. 在这个公共邮件列表中讨论漏洞和安全隐患。
They also addressed vulnerabilities in chrome access by remote hosts and file uploading. 他们还解决了通过远程主机和文件上传进行访问时而产生攻击的弱点。
They study Internet security vulnerabilities and provide security incidents and publish responses. 他们研究因特网安全性弱点并提供安全性事件和发布响应。
These vulnerabilities have been fixed by both Amazon and Eucalyptus before they could be exploited. Amazon和Eucalyptus在这些漏洞被利用前对其进行了修复。
Your code and security reviews should carefully examine these extensibility points to identify security vulnerabilities. 在检查代码和安全性时,要仔细检查这些扩展点以确定是否存在安全漏洞。
This requires decisive action especially in countries where large imbalances and vulnerabilities have caused economic and financial problems. 这需要各国采取果断措施尤其是那些严重失衡和脆弱性已经导致了经济和财政问题的国家。
Technical cyber security alerts provide timely information about current security issues, vulnerabilities, and exploits. 技术网络安全警报及时提供当前安全问题,漏洞,和(漏洞)利用信息。
ISS specializes in software, appliances and services that help IT shops monitor and manage network vulnerabilities. 国际空间站的专门软件,家用电器和服务,帮助它店监测和管理网络的脆弱性。
Such vulnerabilities are also known as control challenges. 这种漏洞也被称为控制的挑战。