×

exploiting system meaning in Chinese

剥削制度

Examples

  1. Hackers who attack computer systems are becoming more nimble and are taking less time to exploit system vulnerabilities , a new report says
    一项新的报告说:攻击电脑系统的黑客变得越来越机敏,他们找到电脑系统漏洞所花的时间越来越少。
  2. Using this method to exploit system , the users can take part in the development process of the system utmost , and the system can be in corps with the needs of users preferably
    这种开发方法使用户最大限度参与到系统的开发过程中,使开发出的系统能更好地满足用户的需求。
  3. Then in term of the designed system frame , it uses the selected hardware and software environment of exploiting system to design ali kinds of the visible objects and the application
    然后确定系统环境的硬、软件支撑,按照设计好的系统结构,对系统菜单、窗口对象、各控件按钮、数据窗口对象等可视化界面和各功能模块的程序进行设计。
  4. Taking agricultural research and development ( r & d ) of ningxia university as an example , the status in quo and problem was analyzed in this paper , and several new measures was put forward , such as designing innovational manage system which is suitable to need of modern agriculture , boosting effective cooperation between decision - making of local government and r & d of university , reinforcing the innovational platform construction of agricultural science and technology , fostering the newly scientific domain , cultivating outstanding leader of scientific research , developing group spirit in order to build agrscience and technology exploiting system and new fashion popularizing and medi - service system adapted to market economy relied on the professional institute , life school and agriculture college
    摘要以宁夏大学农业科技研发为例,通过对农业科技现状的分析,针对发展中存在的问题,提出了一些新思路,如构建适应现代化农业发展需要的创新管理体系,促进政府决策与高等院校科研有效互动,加强农业科技创新平台建设,积极培育新的科研增长点,培养科技帅才,发扬团队精神,构建以专业研究机构和农学院、生命科学学院为依?的农业科技开发体系,及适应市场经济体制的新型农业推广和中介服务体系,建立和完善农业科技管理体制及运行机制等,以期推动宁夏大学的农业科技创新,为地方经济建设提供强有力的科技支撑。
  5. In the multitudinous intrusion event , the hacker often gain control of the target computer through exploiting essential system process , and leaves trojan horse or back door in the system after a successful intrusion , which provides a shortcut for next access . therefore the process detection for the exploited system process and the trojan horse is important topics in the intrusion detection field
    在众多的入侵事件中,黑客往往通过感染关键系统进程获得目标主机的系统权限,并在成功入侵后在目标主机留下木马、后门作为下次入侵的捷径,所以对这些受感染的系统进程以及木马、后门进程进行检测是入侵检测技术研究的重要课题之一。

Related Words

  1. exploit
  2. exploit her
  3. exploit markets
  4. feat exploit
  5. moderately exploited
  6. exploit potentialities
  7. the exploited
  8. exploiting class
  9. perform exploits
  10. sexually exploited
  11. exploiting outlook
  12. exploiting species
  13. exploiting their supremacy
  14. exploitive
PC Version

Copyright © 2018 WordTech Co.