英文字典中文字典


英文字典中文字典51ZiDian.com



中文字典辞典   英文字典 a   b   c   d   e   f   g   h   i   j   k   l   m   n   o   p   q   r   s   t   u   v   w   x   y   z       







请输入英文单字,中文词皆可:


请选择你想看的字典辞典:
单词字典翻译
exploits查看 exploits 在百度字典中的解释百度英翻中〔查看〕
exploits查看 exploits 在Google字典中的解释Google英翻中〔查看〕
exploits查看 exploits 在Yahoo字典中的解释Yahoo英翻中〔查看〕





安装中文字典英文字典查询工具!


中文字典英文字典工具:
选择颜色:
输入中英文单字

































































英文字典中文字典相关资料:


  • EXPLOIT Definition Meaning - Merriam-Webster
    exploit suggests an adventurous or heroic act achievement implies hard-won success in the face of difficulty or opposition Noun the fanciful exploits of the giant lumberjack Paul Bunyan once famed as an actor, John Wilkes Booth is now remembered for a single exploit, his assassination of Lincoln Verb He has never fully exploited his talents
  • EXPLOIT | English meaning - Cambridge Dictionary
    ˈek·splɔɪt Add to word list a brave, interesting, or unusual act: daredevil exploits
  • Exploit (computer security) - Wikipedia
    An exploit is a method or piece of code that takes advantage of vulnerabilities in software, applications, networks, operating systems, or hardware, typically for malicious purposes The term "exploit" derives from the English verb "to exploit," meaning "to use something to one’s own advantage "
  • What is an Exploit in Cybersecurity? - SentinelOne
    Exploits in cybersecurity are chunks of code or software that leverage a flaw or a vulnerability in a computer system to get access to confidential data with the intent of performing malicious actions
  • What Is an Exploit? Definition, Types, and Prevention Measures
    Threat actors use exploits to install malware, Trojans, worms, and viruses, or to launch denial-of-service (DoS) or other types of cyber-attacks Both threat actors and security researchers actively look for exploits
  • What are Exploits: Types Examples in Cybersecurity - Vulners
    Exploits are classified according to the type of vulnerability used by the hacker: zero-day, DoS, spoofing or XXS But exploits generally occur in three ways: Remote exploits operate across a network to target a certain vulnerability without prior access to the host system
  • Exploit Definition | What is exploit?
    What are computer exploits? What kinds of exploit protection and anti-exploit software is available? Read on to learn about this dangerous brand of malicious code designed to take advantage of vulnerabilities in your computer software and applications
  • GitHub - offsoc exploitdb: The Exploit Database - Exploits, Shellcode . . .
    The Exploit Database is an archive of public exploits and corresponding vulnerable software, developed for use by penetration testers and vulnerability researchers
  • What is an Exploit? - UpGuard
    An exploit is a piece of software, data or sequence of commands that takes advantage of a vulnerability to cause unintended behavior or to gain unauthorized access to sensitive data Once vulnerabilities are identified, they are posted on Common Vulnerabilities and Exposures (CVE)
  • What is an Exploit? Definition, Types Reasons It Occurs - Techopedia
    An exploit is a program, piece of code, or set of instructions used to take advantage of a weakness in a computer system, software, or hardware It is not malware but a tool used to deliver it





中文字典-英文字典  2005-2009