1.
Research of Vulerability Detection and Usage under Win32 Plateform;
基于Win32平台的漏洞挖掘和漏洞利用技术研究
2.
An analysis of vulnerability exploitation with worms and homes
蠕虫化与家庭化的漏洞利用的分析与对策
3.
In reality, the loophole could not be practically exploited.
事实上,却难以实际利用这个漏洞。
4.
Researches on Techniques of Exploiting and Applying MS Office Vulnerabilities;
MS Office漏洞挖掘与利用技术研究
5.
On the Determination of Criminal Nature of Making Profit by Taking Advantage of Technological Holes of Telecom
利用电信“技术漏洞”获利行为刑法定性研究
6.
Example: "By exploiting loopholes in the system, the hacker was able to cause great damage."
黑客利用系统中的漏洞造成了严重的损失。
7.
Quantitative evaluation of vulnerability exploitability in network information systems
网络信息系统漏洞可利用性量化评估研究
8.
plug a leak in the barrel
用塞子堵住大桶的漏洞.
9.
Plug a leak in the barre
用塞子堵住大桶的漏洞
10.
Welfare Subsidy Leak of State-owned Company and Solving Measures;
国有企业福利补贴的漏洞和解决措施
11.
High. The Vulnerability is easy to be used to attack the target system.
高,利用该漏洞基本不需要攻击者掌握专业知识。需立刻对受影响的产品应用补丁。
12.
They stopped up120leaks with40000gunny sacks.
他们用4万只沙袋堵住了120个漏洞。
13.
Use this to plug the hole in your boat.
用这东西去堵住你船上的漏洞。
14.
We stop the leak In the gas pipe by means of lead
我们用铅堵塞了煤气管上的漏洞
15.
We to ed the leak i the ga ipe y mea of lead.
我们用铅堵塞了煤气管上的漏洞。
16.
He covered over the hole in the roof with a piece of asphalt felt.
他用一块沥青油毡盖住了房顶的漏洞。
17.
Use Sniffer Pro search System Vulnerabilities;
如何用Sniffer Pro查找系统漏洞
18.
Hijack Linux System Call Force Out Core Dump Hole Attack
劫持Linux系统调用封杀Core Dump漏洞攻击