Examples of using Exploiting in English and their translations into Korean
{-}
-
Colloquial
-
Ecclesiastic
-
Ecclesiastic
-
Programming
-
Computer
Exploiting an escape clause, the government of Sweden has picked not to join ERM II, a precondition to receiving the Euro.
By identifying and actually exploiting the weaknesses found in networks, hosts, and devices, penetration testing goes beyond simple vulnerability assessment.
But the first exploiting societies based on a broader co-operation, often in the interests of irrigation, were still basically agricultural in character.
The open-source Samba on Linux, similarly, is capable of exploiting vulnerabilities in the SMB protocol.
Marx meant that workers should create their own state to defeat the old exploiting classes.
Finally, instead of exploiting maniacs' willingness to pay, MMC should focus on rewarding their loyalty.
PLO 11- Illustrate effective roles as a team member and a manager in exploiting the organization's resources to realize business and strategic objectives.
Although it might seem essentially harmless, this cyber-attack is capable of exploiting companies.
Exploiting naivete, inexperience, uncertainty, and confusion is their game.
PLO 11- Play effectively role as a team member and manager, exploiting organization's resources to realize business and strategic objectives.
Adobe is not aware of any attacks exploiting these vulnerabilities against Adobe Photoshop.
Exploiting naiveté, inexperience, uncertainty, and confusion is their game.
Adobe is not aware of any attacks exploiting these vulnerabilities against Adobe Photoshop Elements to date.
This must be without exploiting the poor, but rather bringing such out of poverty to impact on the country's economy generally.
The role of a conductor exploiting a herd, or the role of a child who lives off his symbolic parents, seems immoral and disgraceful to me.
Root access gained via exploiting a kernel bug or security hole can bypass this protection.
This means it is not possible for a malicious program exploiting this vulnerability to be installed on the device.
Clearly then, humanity can't long sustain an economic system that benefits just a few of us by exploiting the capacities of the many.
Instead of exploiting all values, data clusters are identified and correlated.
Capitalism cannot live without exploiting the proletariat, and consequently the proletariat will always be forced to struggle.