Examples of using Can be exploited in English and their translations into Japanese
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
-
Programming
This vulnerability can be exploited remotely.
Smart TVs,which connect to the internet to offer online apps and services, can be exploited by hackers….
Some of them can be exploited by ordinary users.
I agree that the good nature of people can be exploited.
These properties can be exploited to further analyze the structure of G.
We would never think: Europe can be exploited.
Thus, immune cells can be exploited as Trojan horses for drug delivery.
We then advise on the manners in which the IP rights can be exploited by the company.
The root of the strawberry plant can be exploited for its aperitif, depurative and diuretic properties.
The vulnerability is in Microsoft's Jet Database engine, which can be exploited through Word.
The strengths and opportunities that can be exploited by a company to boost its market share are identified.
If a script is more complicated,it can be broken down to several scripts and a hierarchical FSM can be exploited.
Weakness of an asset or control that can be exploited by one or more threats.
This bypass can be exploited only if the target system has BitLocker enabled without a PIN or USB key.
Vulnerability Weakness in an asset or control, which can be exploited by one or more threats.
Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets.
As previously discussed, the angular deviation between the M21 and M21′ can be exploited in a mode division multiplexing scheme.
This is because it decides not only how easy it is to use the camera's functionality,but also how well the camera's potential can be exploited.
Out of the 25 vulnerabilities fixed in Java, 23 can be exploited remotely without authentication.
Step 1: Static analysis: Using publicly available firmware, codes, and apps, they do a static analysis of devices and systems andsee what vulnerabilities can be exploited.
Interactions between cannabinoids and other drugs can be exploited to mitigate side effects while synergistically improving a patient's quality of life.
India will be sharing with Kenya expertise on space-based applications to address natural resources management and weather forecasting,expertise that can be exploited to improve food output in the country.
The heavy contrasts between Pyongyang and Washington can be exploited by Moscow in a wider overview involving also the implications of the Ukrainian issue.
CVE-2007-5400: The vulnerability is caused due to a design error within the handling of frames in Shockwave Flash(SWF)files and can be exploited to cause a heap-based buffer overflow.
For example, a weak password can be exploited by a brute force attack, or the use of a predictable TCP/IP ephemeral port may allow an attacker to mount a TCP reset attack.
As previously discussed,the differences in helical propagation between the M21 and M21′ can be exploited in a mode division multiplexing scheme.
About 95% of bowlers consider bowling as a sport that can be exploited as a recreation, a form of relaxation, a societal factor, and a competitive nature as far as sportsmanship is concerned.
This contract will allow us to provide the Guardia di Finanza with a new generation ofhelicopter equipped with the best on-board technologies that can be exploited to carry out increasingly complex and challenging missions.
In addition to risk factors that can be exploited to carry out a DDoS attack, Mejiro also targeted microsoft-ds(445/tcp) as a risk factor that can potentially be exploited in other attacks such as WannaCry.
Our investment philosophy is rooted in our strong belief that these market inefficiencies can be exploited through an inspired, responsible and disciplined investment process.