Примери за използване на Could be exploited на Английски и техните преводи на Български
{-}
-
Official
-
Colloquial
-
Medicine
-
Ecclesiastic
-
Ecclesiastic
-
Computer
This could be exploited by criminal elements.
However, he knew that the faith of others could be exploited.
He then realized that it could be exploited for the purposes of profit.
But he did believe that the faith of others could be exploited.
That chaos could be exploited by ISIS which has already benefited from Turkey's actions in northern Syria.
To see if any of those powers could be exploited.
Consists of a review of vulnerabilities that could be exploited by external users without credentials or the appropriate rights to access a system.
I felt there had to be some anomalies in this data which could be exploited.”.
You might think that this system could be exploited by people over inflating product reviews in order to generate extra sales for them.
This now includes non-human operated computers(like IoT devices) that could be exploited as entry points to local networks.
However, the risk that the initiative could be exploited by certain non-governmental organisations(NGOs) or by a given sector of industry should not be ignored.
Why would we spend countless taxpayer dollars on a Death Star with a fundamental flaw that could be exploited by a one-man starship?".
These data reveal potential vulnerabilities that could be exploited to develop new drugs to defeat the HIV virus by targeting its capsid, Perilla said.
Security experts say blowing up a nuclear reactor is beyond the skills of militant groups, butthe nuclear industry has some vulnerabilities that could be exploited.
Corruption and organized crime as tools that could be exploited for hybrid war purposes.
As many as 89% of all vulnerabilities discovered could be exploited using malware, all without any need for physical access to the device- and potentially putting users at risk of having some very sensitive information hacked.
Developers still need to address the problem of malicious orvulnerable apps that could be exploited after being installed on a mobile device.
Gadgets could be exploited to harm your computer, access your computer's files, show you objectionable content, or change their behavior at any time.
They also believe that the law's vague wording could be exploited to limit church activities.
And they have also recently developed a more sensitive diagnostic test to determine whether any commercial wheat varieties possess even a small amount of resistance that could be exploited by plant breeders.
Mike Gualteri, another security researcher, has said that the vulnerability could be exploited in several other scenarios as well except social media platforms.
Biu Ji is not“deadly” because it contains secret, lethal techniques- its“danger” lies in the fact that it exposes situations orconditions whereby a Wing Chun fighter's potential weaknesses could be exploited during fights.
External penetration testing consists of a review of vulnerabilities that could be exploited by external users without credentials or the appropriate rights to access a system.
Such a concession could be exploited by promoters of rival sources of knowledge, such as philosophy and religion, who would be quick to point out that faith in naturalism is no more"scientific"(i.e. empirically based) than any other kind of faith.".
This could also help us discover novel parasite weaknesses that could be exploited in future interventions against this deadly disease.”.
They said that the vulnerable apps could be exploited, allowing an attacker to steal highly sensitive usernames and passwords for Facebook, WordPress, Twitter, Google, Yahoo and even online banking accounts.
This fragmented ecosystem, along with limited security,means there are multiple vulnerabilities that could be exploited, making it a hugely attractive target for attackers.”.
Whereas vulnerabilities in 5G networks could be exploited in order to compromise IT systems, potentially causing very serious damage to economies at both European and national levels;
The government hasn't yet reached a conclusion on how to deal with infrastructure that is potentially weak or indeed could be exploited by foreign states to spy on us, that is ongoing,” he told BBC Radio.
In this case, an unsafe expression uses functions or properties that could be exploited by malicious users to gain access to drives, files, or other resources for which they do not have authorization.