英文字典中文字典


英文字典中文字典51ZiDian.com



中文字典辞典   英文字典 a   b   c   d   e   f   g   h   i   j   k   l   m   n   o   p   q   r   s   t   u   v   w   x   y   z       







请输入英文单字,中文词皆可:


请选择你想看的字典辞典:
单词字典翻译
exploits查看 exploits 在百度字典中的解释百度英翻中〔查看〕
exploits查看 exploits 在Google字典中的解释Google英翻中〔查看〕
exploits查看 exploits 在Yahoo字典中的解释Yahoo英翻中〔查看〕





安装中文字典英文字典查询工具!


中文字典英文字典工具:
选择颜色:
输入中英文单字

































































英文字典中文字典相关资料:


  • Exploit (computer security) - Wikipedia
    An exploit is a method or piece of code that takes advantage of vulnerabilities in software, applications, networks, operating systems, or hardware, typically for malicious purposes The term "exploit" derives from the English verb "to exploit," meaning "to use something to one’s own advantage "
  • What is an exploit? - Cisco
    For exploits to be effective, many vulnerabilities require an attacker to initiate a series of suspicious operations to set up an exploit Typically, a majority of the vulnerabilities are result of a software or system architecture bug
  • Exploit in Computer Security | Fortinet
    An exploit (in its noun form) is a segment of code or a program that maliciously takes advantage of vulnerabilities or security flaws in software or hardware to infiltrate and initiate a denial-of-service (DoS) attack or install malware, such as spyware, ransomware, Trojan horses, worms, or viruses
  • Exploit Database - Exploits for Penetration Testers, Researchers, and . . .
    The Exploit Database - Exploits, Shellcode, 0days, Remote Exploits, Local Exploits, Web Apps, Vulnerability Reports, Security Articles, Tutorials and more
  • What is an Exploit in Cybersecurity? - SentinelOne
    Exploits are pieces of code or programs that take advantage of system flaws and weaknesses in either software or hardware to invade the system and initialize attacks such as denial-of-service (DoS), viruses, or malware like ransomware, spyware, and worms
  • What Is an Exploit? Vulnerabilities and Threat Mitigation
    An exploit is a deliberate method, often a script, payload, or command sequence, used to exploit avulnerability in software, hardware, or system configurations Exploits allow attackers to gain unauthorized access, escalate privileges, steal data, or disrupt operations
  • What Is an Exploit in Cyber Security? | Intruder
    Learn what an exploit is, how it works, and its relationship with vulnerabilities in cyber security Understand different types of exploits and how to protect your systems
  • What Is an Exploit? Definition, Types, and Prevention Measures
    Hackers write exploits in order to use a vulnerability for their malicious purposes, while researchers create them as a proof of concept (PoC) that will help patch the vulnerable software and thus bolster security
  • Exploits in cybersecurity: Types, examples, and prevention
    What is an exploit in cybersecurity? An exploit is a program, piece of code, or technique designed to find and take advantage of a security flaw or vulnerability in an application, operating system, or computer system
  • Exploits and exploit kits - Microsoft Defender for Endpoint
    Exploits take advantage of vulnerabilities in software A vulnerability is like a hole in your software that malware can use to get onto your device Malware exploits these vulnerabilities to bypass your computer's security safeguards to infect your device





中文字典-英文字典  2005-2009