| 1. | It only updates vulnerable files 它只更新易受攻击的文件。 |
| 2. | Also protects against vulnerable parameters passed into a function 还可以防止向函数传入易受攻击的参数。 |
| 3. | A vulnerable parameter is allocated before the cookie and local variables 易受攻击的参数在cookie和局部变量之前分配。 |
| 4. | Sql check also identifies vulnerable sql server 2000 clusters , but does not disable them Sql检查程序也能识别易受攻击的sql server群集,但不会禁用他们。 |
| 5. | Describes how to minimize the vulnerable surface area of an installation of sql server 2005 介绍了如何最大程度地减小sql server 2005安装的易受攻击的外围应用。 |
| 6. | All wireless communication is vulnerable to dos as someone can deliberately jam the frequency 所有无线通信对于dos都是易受攻击的,因为有人可以故意干扰该频率。 |
| 7. | The compiler does not provide security protection for vulnerable parameters in the following situations 在以下情况中,编译器不会对易受攻击的参数提供安全保护: |
| 8. | But vulnerability doesn ' t suit the yankees , and as a team , they look shockingly fragile 但这易受攻击的弱点不适合洋基,而且以一个球队而言,他们看起来是令人震惊的脆弱。 |
| 9. | Sql scan identifies vulnerable sql server instances on clustered machines , but does not disable them Sql扫描程序可以识别出群集计算机上的易受攻击的sql server实例,但是不会禁用这些实例。 |
| 10. | Parts easy to attack in the system are lan and communication link , which need to take link encrypting and point - to - point encrypting 系统易受攻击的环节是局域网与通信链路,需采取链路加密和端到端加密措施。 |