exploiting system meaning in Chinese
剥削制度
Examples
- Hackers who attack computer systems are becoming more nimble and are taking less time to exploit system vulnerabilities , a new report says
一项新的报告说:攻击电脑系统的黑客变得越来越机敏,他们找到电脑系统漏洞所花的时间越来越少。 - Using this method to exploit system , the users can take part in the development process of the system utmost , and the system can be in corps with the needs of users preferably
这种开发方法使用户最大限度参与到系统的开发过程中,使开发出的系统能更好地满足用户的需求。 - Then in term of the designed system frame , it uses the selected hardware and software environment of exploiting system to design ali kinds of the visible objects and the application
然后确定系统环境的硬、软件支撑,按照设计好的系统结构,对系统菜单、窗口对象、各控件按钮、数据窗口对象等可视化界面和各功能模块的程序进行设计。 - Taking agricultural research and development ( r & d ) of ningxia university as an example , the status in quo and problem was analyzed in this paper , and several new measures was put forward , such as designing innovational manage system which is suitable to need of modern agriculture , boosting effective cooperation between decision - making of local government and r & d of university , reinforcing the innovational platform construction of agricultural science and technology , fostering the newly scientific domain , cultivating outstanding leader of scientific research , developing group spirit in order to build agrscience and technology exploiting system and new fashion popularizing and medi - service system adapted to market economy relied on the professional institute , life school and agriculture college
摘要以宁夏大学农业科技研发为例,通过对农业科技现状的分析,针对发展中存在的问题,提出了一些新思路,如构建适应现代化农业发展需要的创新管理体系,促进政府决策与高等院校科研有效互动,加强农业科技创新平台建设,积极培育新的科研增长点,培养科技帅才,发扬团队精神,构建以专业研究机构和农学院、生命科学学院为依?的农业科技开发体系,及适应市场经济体制的新型农业推广和中介服务体系,建立和完善农业科技管理体制及运行机制等,以期推动宁夏大学的农业科技创新,为地方经济建设提供强有力的科技支撑。 - In the multitudinous intrusion event , the hacker often gain control of the target computer through exploiting essential system process , and leaves trojan horse or back door in the system after a successful intrusion , which provides a shortcut for next access . therefore the process detection for the exploited system process and the trojan horse is important topics in the intrusion detection field
在众多的入侵事件中,黑客往往通过感染关键系统进程获得目标主机的系统权限,并在成功入侵后在目标主机留下木马、后门作为下次入侵的捷径,所以对这些受感染的系统进程以及木马、后门进程进行检测是入侵检测技术研究的重要课题之一。