Глоссарий





Новости переводов

19 апреля, 2024

Translations in furniture production

07 февраля, 2024

Ghostwriting vs. Copywriting

30 января, 2024

Preparing a scientific article for publication in an electronic (online) journal

20 декабря, 2023

Translation and editing of drawings in CAD systems

10 декабря, 2023

About automatic speech recognition

30 ноября, 2023

Translation services for tunneling shields and tunnel construction technologies

22 ноября, 2023

Proofreading of English text



Глоссарии и словари бюро переводов Фларус

Поиск в глоссариях:  

Zero-day exploit

Глоссарий терминов по социальной инженерии и информационной безопасности
    An attack that exploits a zero-day vulnerability.




Exploit, английский
  1. Malicious code that takes advantage of vulnerabilities in other software in order to take unwanted and unexpected action on impacted systems. an exploit is often used to install other malicious or potentially unwanted software on a target computer without the knowledge or consent of the affected user.

  2. To use malicious code that takes advantage of vulnerabilities in other software in order to take unwanted and unexpected action on impacted systems. exploit


Exploit vulnerability, английский
    The vulnerability that makes a computer susceptible to an exploit.


Exploitability of resources, английский
    Возможность освоения ресурсов. техническая возможность, экономическая целесообразность практического использования ресурсов


Exploitable biomass, английский
    The biomass that is available to a unit of fishing effort. defined as the sum of the population biomass at age (calculated as the mean within the fishing year) multiplied by the age-specific availability to the fishery.


Exploitable patent, английский
    Промышленно применимый патент


Exploitable vulnerability, английский

Exploitant, французский

Exploitant de tunnel, французский
    "entité responsable de l’exploitation d`un tunnel.


Exploitation, французский

Exploitation, английский
    Эксплуатация [разработка] (месторождения). комплекс мероприятий по извлечению полезного ископаемого из недр на поверхность и подготовке его к транспортировке


Exploitation film, английский

Exploitation of a patent, английский
    Эксплуатация патента (пользование правами, вытекающими из патента, например правом на осуществление, использование или продажу)


Exploitation peculiarities, английский

Exploitation play, английский
    Объект разработки. один или несколько продуктивных горизонтов, объединяемых в целях их последующей совместной разработки одной серией скважин (горных выработок)


Exploitation stability magnetic suspension, английский

Exploitation stability of magnetic particles, exploitation resistance of magnetic particles, английский

Exploitation;marche, французский

Exploitative relationships, английский
    Mistreatment of person(s) in order to benefit from unmerited advantages.


Exploited, английский

Exploiter, французский

Exploiter;faire marcher, французский

Vulnerability, английский
  1. Уязвимость

  2. Чувствительность

  3. Any weakness, administrative process or act, or physical exposure that makes a computer susceptible to exploit by a threat. w


Zero-day vulnerability, английский
    A vulnerability in hardware or software of which is unknown to the manufacturer/ developer or general public. the name “zero day” references the number of days that the software or hardware vendor has known about a vulnerability. as zero-day vulnerabilities are unpatched and unknown, they are often used as the basis for more complex attacks. zero-days are often used sparingly by attackers, as they get “used up” once they are publicly exposed and patched by the vendor.


Whitelisting, английский
    As traditional anti-virus software only relies on signature-based definitions or heuristics, there is always the risk that a zero-day threat will infect a system. to mitigate against this risk, application whitelisting can be used. this method protects computing devices by allowing only trusted applications to run. however, the administration of whitelisting controls can be resource intensive when operating systems or applications are patched. whitelisting is also commonly used to prevent unauthorised storage devices from being used on end-point devices.