Examples of using Security vulnerabilities in English and their translations into Hungarian
{-}
-
Colloquial
-
Official
-
Medicine
-
Ecclesiastic
-
Financial
-
Programming
-
Official/political
-
Computer
Security vulnerabilities in VoIP.
Disclosing security vulnerabilities.
Security vulnerabilities and problems.
Automatically identify security vulnerabilities.
Security vulnerabilities can also be addressed quickly by the security team.
We identify your security vulnerabilities and risks.
Why does this update address several reported security vulnerabilities?
Detect security vulnerabilities.
Allows you to identify errors and security vulnerabilities.
If you detect any security vulnerabilities please go to this page.
Developers are constantly fixing security vulnerabilities.
Identify known security vulnerabilities before attackers find and exploit them.
The refugee crisis revealed EU security vulnerabilities;
These security vulnerabilities could allow malicious, untrusted code to compromise a user's computer.
Creating security rewards to uncover security vulnerabilities.
To detect security vulnerabilities.
We recommend steering away from PPTP because it contains known security vulnerabilities.
IEKiller was created to combat the security vulnerabilities that are inside of Internet Explorer.
If handled properly,it provides a very good protection against computer security vulnerabilities.
This update eliminates security vulnerabilities affecting Internet Explorer 5.
Disabling unused and unneeded services helps reduce exposure to security vulnerabilities.
This patch eliminates four security vulnerabilities in Microsoft Internet Explorer 5.
Item updates to ensure ongoing compatibility and to resolve security vulnerabilities.
We encourage users who find security vulnerabilities to report them to us as soon as possible.
Simple and resilient architecture,which reduces complexity and corresponding bugs and security vulnerabilities.
Pepperl+Fuchs investigates all reports of security vulnerabilities affecting Pepperl+Fuchs products and services.
Configure Endpoint Protection to detect and remediate malware and security vulnerabilities.
Unauthorized modification of iOS can cause security vulnerabilities, instability, shortened battery life, and other issues.
No need to jailbreak the smart phone and no security vulnerabilities you would suffer.
These changes were introduced to reduce security vulnerabilities in HTML Help.