| 1. | Systems management server 2003 service pack 1 scan tools 系统管理工具移动设备 |
| 2. | St data scan tool data 诊断工具数据 |
| 3. | Using tools like these and other scanning tools should not be the only thing you do to ensure security 使用这些工具和其他一些扫描工具并不是你唯一可以保证安全性的办法。 |
| 4. | And the function of gathering vulnerability information is often provided by network vulnerability scanning tools 而对目标系统漏洞信息的获取,目前主要是通过网络漏洞扫描工具实现的。 |
| 5. | Network - based scanning tools send network traffic to various network hosts and devices with the goal of gathering information that will indicate whether those system have vulnerabilities that can be exploited 网络化扫描工具向很多网络主机发送网络流量,并且设置取得表示这些系统是否有可用的漏洞的信息的门。 |
| 6. | The scan tool mode of operation allows the prescribed transfer of data within the scope of the european on - board diagnosis ( e - obd ) from and to exhaust gas influencing control units from all vehicle manufacturers 扫描工具的运作模式,允许指定的数据转移内部的范畴欧洲对车载诊断(电子的obd ) ,并以尾气影响控制单元,从各汽车制造商。 |
| 7. | We ll cover vulnerability detection tools in more detail in later columns , but it is worth mentioning now that two kinds of scanning tools have proven effective in helping to find and remove buffer overflow problems 这个系统正在保护一个通用服务器场,该服务器场正在使用公认为不安全的cots作为其操作系统。 sitar用冗余和多样性实现容错。 |
| 8. | Host - based scanning tools are run on each host to scan for a wide range of system problems including : unauthorized software , unauthorized weak passwords , dormant viruses , and inappropriate access permissions 主机型扫描工具在没个主机上运行以便扫描一个很宽范围的系统问题,包括:未授权软件,未授权的弱密码,隐匿的病毒及不正当的存取许可。 |
| 9. | While better techniques exist , this is still a highly effective way to narrow a large program of tens or hundreds of thousands of lines into just a few hundred " potential problems . " in a later column , we ll show you a quick - and - dirty scanning tool based on this approach , and give you an idea of how it was built 服务策略指明应该将请求转发到哪个(哪些)服务器,以及如何裁决来自这个(这些)服务器的结果以做出最终响应。策略还定义了外部攻击触发器的标准,代理服务器生成这一标准并将其传递到自适应重配置模块( arm ) 。 |