| 1. | In this position , our ships lie open to attack 在这个位置,我们的船易受攻击。 |
| 2. | He has a position vulnerable to criticism / attack 他的地位易受攻击批评。 |
| 3. | It only updates vulnerable files 它只更新易受攻击的文件。 |
| 4. | Also protects against vulnerable parameters passed into a function 还可以防止向函数传入易受攻击的参数。 |
| 5. | Where do you think we ? re the most vulnerable as a business 问:作为一家企业,你认为我们哪些领域最易受攻击? |
| 6. | Is software security a feature ? is security vulnerability a bug (软件安全是必不可少的?易受攻击是个缺陷? ) |
| 7. | A vulnerable parameter is allocated before the cookie and local variables 易受攻击的参数在cookie和局部变量之前分配。 |
| 8. | Keeping track of multiple machines can increase efficiency and reduce vulnerability 跟踪多台机器能提高效率并降低易受攻击 |
| 9. | We are vulnerable both by water and land , without either fleet or army 由于没有舰队和军队,我们在水路和陆路上都易受攻击 |
| 10. | Sql check also identifies vulnerable sql server 2000 clusters , but does not disable them Sql检查程序也能识别易受攻击的sql server群集,但不会禁用他们。 |