英文字典中文字典


英文字典中文字典51ZiDian.com



中文字典辞典   英文字典 a   b   c   d   e   f   g   h   i   j   k   l   m   n   o   p   q   r   s   t   u   v   w   x   y   z       







请输入英文单字,中文词皆可:


请选择你想看的字典辞典:
单词字典翻译
exploits查看 exploits 在百度字典中的解释百度英翻中〔查看〕
exploits查看 exploits 在Google字典中的解释Google英翻中〔查看〕
exploits查看 exploits 在Yahoo字典中的解释Yahoo英翻中〔查看〕





安装中文字典英文字典查询工具!


中文字典英文字典工具:
选择颜色:
输入中英文单字

































































英文字典中文字典相关资料:


  • Exploit (computer security) - Wikipedia
    An exploit is a method or piece of code that takes advantage of vulnerabilities in software, applications, networks, operating systems, or hardware, typically for malicious purposes The term "exploit" derives from the English verb "to exploit," meaning "to use something to one’s own advantage "
  • EXPLOIT Definition Meaning - Merriam-Webster
    feat, exploit, achievement mean a remarkable deed feat implies strength or dexterity or daring exploit suggests an adventurous or heroic act achievement implies hard-won success in the face of difficulty or opposition
  • What is an exploit? - Cisco
    For exploits to be effective, many vulnerabilities require an attacker to initiate a series of suspicious operations to set up an exploit Typically, a majority of the vulnerabilities are result of a software or system architecture bug
  • EXPLOIT | English meaning - Cambridge Dictionary
    ˈek·splɔɪt Add to word list a brave, interesting, or unusual act: daredevil exploits
  • Exploit in Computer Security | Fortinet
    An exploit (in its noun form) is a segment of code or a program that maliciously takes advantage of vulnerabilities or security flaws in software or hardware to infiltrate and initiate a denial-of-service (DoS) attack or install malware, such as spyware, ransomware, Trojan horses, worms, or viruses
  • What Is an Exploit? Vulnerabilities and Threat Mitigation
    An exploit is a deliberate method, often a script, payload, or command sequence, used to exploit a vulnerability in software, hardware, or system configurations Exploits allow attackers to gain unauthorized access, escalate privileges, steal data, or disrupt operations
  • What is an Exploit in Cybersecurity? - SentinelOne
    Exploits are pieces of code or programs that take advantage of system flaws and weaknesses in either software or hardware to invade the system and initialize attacks such as denial-of-service (DoS), viruses, or malware like ransomware, spyware, and worms
  • What is an Exploit in Computer Security: Types How to Avoid
    Exploits are attacks that abuse software vulnerabilities in operating systems and common applications (such as browsers and office tools) to gain unauthorized access or run malicious actions without requiring users to install malware
  • Exploit-DB Exploits + Shellcode + GHDB · GitLab
    The Exploit Database is a repository for exploits and Proof-of-Concepts rather than advisories, making it a valuable resource for those who need actionable data right away You can learn more about the project here (Top Right -> About Exploit-DB) and here (History) This repository is updated daily with the most recently added submissions
  • Exploit - definition of exploit by The Free Dictionary
    To employ to the greatest possible advantage: exploit one's talents 2 To make use of selfishly or unethically: a corporation that exploited peasant labor [Middle English, from Old French esploit, from Latin explicitum, neuter past participle of explicāre, to unfold; see explicate ] ex·ploit′a·bil′i·ty n ex·ploit′er n





中文字典-英文字典  2005-2009