GLOSSARY ENTRY (DERIVED FROM QUESTION BELOW) | ||||||
---|---|---|---|---|---|---|
|
11:03 Jul 19, 2004 |
English to Chinese translations [PRO] Tech/Engineering - Computers: Software | |||||||
---|---|---|---|---|---|---|---|
|
| ||||||
| Selected response from: Shang China Local time: 08:32 | ||||||
Grading comment
|
Summary of answers provided | ||||
---|---|---|---|---|
3 +1 | 伺服器漏洞与系统漏洞 |
| ||
4 | 利用和弱点 |
| ||
4 | 漏洞数量和被攻击次数 |
| ||
4 | 可被利用的地方和易受攻击的缺陷 |
| ||
3 | 窗口的被恶意利用和其易受攻击性 |
|
Discussion entries: 2 | |
---|---|
伺服器漏洞与系统漏洞 Explanation: 伺服器漏洞与系统漏洞 -------------------------------------------------- Note added at 2004-07-19 11:15:22 (GMT) -------------------------------------------------- 首先鼠标双击\"Microsoft Baseline Security Analyzer\",在左边的目录按下\"Pick a Computer to Scan\",然后在\"Computer Name中\"输入你的机器名称,或者用下下拉表单选择,而且要勾选\"Check for windows vulnerabilities\"(检查WINDOWS的系统漏洞)、\"Check for weak passwords\"(检查密码)、\"Check for IIS vulnerabilities\"(检查IIS的系统漏洞)、\"Check for SQL vulnerabilities\"(检查SQL程序的系统漏洞)、\"Check for hotfixes\"(检查WINDOWS的更新补丁)。最后在\"Security report name\"保留预设值,并用鼠标点击\"Start Scan\"开始检查。 -------------------------------------------------- Note added at 2004-07-19 21:37:54 (GMT) -------------------------------------------------- 合二为一:“伺服器与系统漏洞”---言简意赅。 Reference: http://speed.cis.nctu.edu.tw/~ydlin/miscpub/sg_bench02.pdf Reference: http://article.pchome.net/2003/04/14/8770.htm |
| |
Login to enter a peer comment (or grade) |
利用和弱点 Explanation: Windows 2000 Server 的 TCP/IP 利用与对策 TCP/IP Exploits and Countermeasures for Windows 2000 Server 資訊是根據威脅、弱點、利用與反制措施等所收集的。请看下链接: Reference: http://www.microsoft.com/taiwan/technet/security/prodtech/wi... |
| |
Login to enter a peer comment (or grade) |
窗口的被恶意利用和其易受攻击性 Explanation: Just reflect my understanding from the given paragraphy! |
| |
Login to enter a peer comment (or grade) |
漏洞数量和被攻击次数 Explanation: exploits 利用/攻击 vulnerabilities 漏洞 术语 定义 漏洞 可以在攻击过程中利用的弱点,可以是软件、硬件、程序缺点、功能或配置。也称为暴露。 攻击 企图利用漏洞达到恶意目的的威胁代理。 对策 减少计算机环境中的风险的软件配置、硬件或程序。也称为保护或缓解。 威胁 危险源。 威胁代理 用违反安全策略的方式,通过漏洞攻击系统的人或程序。 http://www.microsoft.com/china/technet/security/guidance/sec... |
| |
Login to enter a peer comment (or grade) |
可被利用的地方和易受攻击的缺陷 Explanation: 可被利用的地方和易受攻击的缺陷 -------------------------------------------------- Note added at 4 hrs 22 mins (2004-07-19 15:26:02 GMT) -------------------------------------------------- bug是现成的,无须攻击即可被人利用,而有的薄弱环节却需要强力攻击。 |
| |
Grading comment
| ||
Login to enter a peer comment (or grade) |
Login or register (free and only takes a few minutes) to participate in this question.
You will also have access to many other tools and opportunities designed for those who have language-related jobs (or are passionate about them). Participation is free and the site has a strict confidentiality policy.