「exploit」の共起表現一覧(1語右で並び替え)
該当件数 : 394件
To fully | exploit a deadzone, players must remain as close to t |
Santy is a computer worm created in Perl to | exploit a vulnerability in phpBB software which used |
Their ability to | exploit a wide range of agricultural and semi-urban h |
The engine was designed to | exploit a perceived "loophole" that existed in USAC's |
woman, who was not a DC employee was able to | exploit a security loophole in DC's financial systems |
arance likely came to allow the Blackhawks to | exploit a loophole in the NHL's rules for the 1992 NH |
To the same end, designers | exploit a property of air cavities known as Helmholtz |
In the closing scene, Boris attempts to | exploit a previous liaison with Vava by making love t |
increase the rigidity of a TPO blend, fillers | exploit a surface tension phenomena. |
aimed that French's corps moved too slowly to | exploit a potential advantage over Gen. Robert E. Lee |
XSS worms | exploit a security vulnerability known as cross site |
ugh they sometimes gather in larger flocks to | exploit a major food supply such as an ant or termite |
tly upon Ras Taffari, the Italians planned to | exploit a railway and the British hoped to construct |
The worm was designed to | exploit a security hole in the indexing software incl |
ical warfare" which "[appear] to deliberately | exploit a biological theory of sexual imprinting at t |
those such as tits and Common Firecrests that | exploit abundant, ubiquitous resources are distribute |
XST scripts | exploit ActiveX, Flash, or any other controls that al |
Adel's friends try to | exploit Adel for his fortunes and convince him to sel |
E-2005-2072, Privilege escalation (local root | exploit) affecting Sun Solaris versions 8,9,10 and Op |
This | exploit also has a nasty side effect of causing the g |
The PS2 Independence | Exploit also used a buffer overflow to achieve the sa |
PotashCorp has rights to | exploit an area of 8,900 hectares (22,000 acres) of p |
Incensed by the idea that she would | exploit an innocent, Deborah decides to take her reve |
ings inflicted upon the organisms they build, | exploit and discard. |
in both countries and is given full rights to | exploit and develop non-living natural resources in t |
ay governments, corporations, and individuals | exploit and consume primary energy resources, especia |
hey intended to reopen a mine in Abernant and | exploit anthracite reserves. |
ld by Logan's Army of the Tennessee corps, to | exploit any weakness or possible withdrawal. |
when one of the base's "visitors" attempts to | exploit Area 51's new guests in an attempt to liberat |
business-like dealings that tend to hurt and | exploit bands. |
s of espionage, he had already carried out an | exploit, because he was a German who had managed to g |
Some works are planned to | exploit being on two sides of the same piece of paper |
with Marubeni and Linc Energy of Australia to | exploit bituminous coal reserves in the Song Hong Del |
d to maximise the fighter's fire-power and to | exploit both the B-17E and F model Flying Fortresses' |
World War, fearing that Germany would simply | exploit Bulgarian resources for her own war effort. |
herefore came away without his prize, but his | exploit came to the attention of the First Lord of th |
The | exploit can be triggered without any user interaction |
enhancements compared to systems that do not | exploit channel knowledge at the transmitter. |
A small number of autotrophs | exploit chemical energy sources in a process called c |
ramework, a tool for developing and executing | exploit code against a remote target machine. |
st, publicly announced 44 of them with sample | exploit code. |
f00f, the term for an | exploit common to early Intel microprocessors |
lished Overseas Containers Limited ('OCL') to | exploit containerisation. |
ain of vulnerability identification, zero-day | exploit creation and penetration testing methods. |
s the physical safeguards in place and so the | exploit demonstrates an important new vulnerability. |
niques and tools are now used by attackers to | exploit deployed software. |
ticore in 1977), which led to the decision to | exploit Di Giacomo's remarkably vocal gifts with more |
f the same species geographically coexist but | exploit different niches in the same patchy or hetero |
ng Betty Zane as the heroine of the gunpowder | exploit during the 1782 siege of Fort Henry sixty-sev |
Hulyanytsky's most noted | exploit during the Muscovite invasion was the defence |
This | exploit earned him the governorship of Thanet. |
ting to Eanfrith's evident ability to quickly | exploit Edwin's death, has speculated that "a wide-ra |
Chris agrees to | exploit Fabian's love for her to gather information f |
of this transform (discrete t), where it can | exploit fast Fourier transform algorithms. |
Scott became the first person to | exploit Florida's vast phosphate deposits and in 1887 |
as settled since prehistorical times, and was | exploit for its commercial position by Tartessos and |
iner brother, both of whom the SS intended to | exploit for their skill as mechanics, convinced them |
t on foreign investment, but at the same time | exploit foreign investment and high-tech," he said. |
ne of weakness which the ascending magma will | exploit, forming a sill or lopolith. |
ultrasn0w 1.2, uses the same AT+XAPP command | exploit found in the 05.13.04 baseband by updating th |
ith this in mind, Merkle tree hash structures | exploit full potential of such hardware while being a |
ion (CNTIC) and working with PT Bukit Asam to | exploit further reserves which as of 2003 totalled ro |
lion tonnes is complete, Midwest Corp plan to | exploit further haematite discoveries on their lease |
Ten years later, Ashworth identified a way to | exploit genetic weaknesses in cancer cells including |
and a mutual acquaintance, Peter, shamelessly | exploit George's advances to extract from him money a |
a British post-Second World War programme to | exploit German aeronautics and deny German technical |
Company was formed by Peter Hambro in 1994 to | exploit gold reserves in Eastern Russia. |
ustaining a serious head wound in this daring | exploit, he refused medical attention and returned to |
nd silenced the Austrian batteries, for which | exploit he received a gold medal. |
For this | exploit he received the first George Cross for Valour |
, wants to use his friendship with Sharlee to | exploit her problems, including the cutting off of he |
n of the village to make a disastrous plan to | exploit her. |
ed on by Phil and Grant Mitchell, who hope to | exploit him in the ring by pitting him against a supe |
Although Matthew thought Bruce would try to | exploit him like Rupert had, Matthew found that Bruce |
s believed Liam to be a con-man attempting to | exploit his hopes in exchange for money to look after |
Rebel right flank where Sherman did not fully | exploit his advantage. |
inced Fluker to play on the offensive line to | exploit his full potential. |
t of publicity permits a person to commercial | exploit his or her likeness, name and image. |
Failing to | exploit his victory, he retreated hastily. |
a Minor and then marched on Constantinople to | exploit his triumph. |
ntly paroled from prison, he is determined to | exploit his family connections to launch his own real |
Montgomery's refusal to | exploit his victory allowed him to preserve his force |
be contrasted to bel canto, which intends to | exploit human speech organs on the highest level to a |
His main motivation is to fully | exploit human intellectual capabilities so that human |
This archetype could also | exploit hybrid forms of locomotion such as routing an |
For this | exploit, immortalized by the Russian poet Baratynsky, |
This is often a form of an | exploit in the geometry (terrain) of a game-however, |
Carrying out this | exploit in Japan, and equaling the performances of tw |
Fareham's most successful | exploit in the FA Trophy came in the 1986-87 season w |
CVE-2001-0414, Buffer overflow (remote root | exploit) in NTP server, affecting wide range of syste |
Sadly, their | exploit in saving the Brilliant was not to have a sto |
The GNAA crafted a JavaScript-based | exploit in order to flood IRC channels. |
is often an attempt at a privilege escalation | exploit in order to gain additional control. |
re aptly because the objective is to find and | exploit information, the network itself is only one o |
They | exploit information-rich external bits of language an |
own and prosecute the twisted individuals who | exploit innocent children." |
Company was formed in 1992 by Robert Adair to | exploit international oil opportunities. |
Then, tuProlog applications can | exploit Internet infrastructures providing tuple-base |
ates does not intend to 'destroy, conquer, or | exploit Iraq' |
ilt in the crater, was established in 1886 to | exploit iron and coal deposits , although the town's |
ne to Waltham on the Wolds which was built to | exploit ironstone deposits in the area. |
ross domain access flaws in web browsers, the | exploit is able to collect the cached credentials of |
Once this | exploit is found, a custom recovery image that does n |
The WMF | exploit is to be considered extremely dangerous. |
This particular | exploit is highly creditable to both these officers, |
n $50 and $150 US depending on how severe the | exploit is. |
ion; Jews say it shows how the nation's Arabs | exploit Israeli democracy to promote the Palestinian |
The Japanese, however, failed to | exploit it before the 2/16th Battalion were brought u |
the ability to such a degree as being able to | exploit it as entertainment. |
thriller, and we are going to bastardize and | exploit it, ramping up the body counts and killings," |
small breach on the south side but could not | exploit it. |
ding bananas without a license and decides to | exploit it. |
TWA, in particular was able to | exploit its network of US domestic routes to feed pas |
tioned in Chahar to invade Shanxi in order to | exploit its resources. |
ively, playing many small, university gigs to | exploit its popularity with students. |
The German forces were not able to | exploit its phenomenal effectiveness against tanks be |
they see more or less as a missionary work to | exploit journalists and failed to invest in them |
ublishing company formed in 1963 primarily to | exploit Lennon/McCartney compositions. |
s parking by-laws in detail, and knows how to | exploit loopholes. |
algorithms have been completely redesigned to | exploit massive parallelism of CUDA-enabled NVIDIA GP |
"Don't | Exploit Me" |
al graves, post-war commemorations and battle | exploit memorials |
He subsequently expanded his activities to | exploit minerals outside Fforest Fawr and to markets |
Molbank has been launched to preserve and | exploit molecular diversity of both chemical informat |
diverse attacks in parallel, the attacker can | exploit more entry points than with just a single att |
k's THAI and CAPRI technology can help Baytex | exploit more of the resource). |
The mixed threat attacks generally try to | exploit multiple vulnerabilities to get into a system |
any worm, a trojan horse and a computer virus | exploit multiple techniques to attack and propagate. |
It's not for me to | exploit my position to push a change." |
However, other methods | exploit natural forms of gene transfer, such as the a |
e software appears to be updated regularly to | exploit new flaws, such as the flaw discovered in Sep |
the 1970s when three new drifts were sunk to | exploit new reserves in the Keele area. |
ed by Trafalgar House as Hardy Oil and Gas to | exploit North Sea oil reserves in the 1970s. |
he Company was formed in 1994 by Tom Cross to | exploit North Sea oil opportunities. |
South Africa Company had not sought to fully | exploit Northern Rhodesia's mineral resources. |
ced sea-surf) or XSRF, is a type of malicious | exploit of a website whereby unauthorized commands ar |
has ever equaled or bettered Lyman Frimodig's | exploit of having earned a total of 10 varsity awards |
B1 | Exploit Of A Squarepusher (2:03) |
La gesta dels estels (The | Exploit of the Stars, 1922) |
on with J W Carmichael he painted "The Heroic | Exploit of Admiral Collingwood at Trafalgar". |
FTP bounce attack is an | exploit of the FTP protocol whereby an attacker is ab |
by a different author and each concerning an | exploit of Arthur Conan Doyle's Sherlock Holmes set a |
t of this action would be Mosby's most famous | exploit of the war, the Stoughton Raid. |
his way safely through the desert to Suez, an | exploit of singular boldness; and was highly successf |
Level 2/4 describes a situation where an | exploit of moderate concern is apparent and exposed s |
ng bug class of attacks, just after the first | exploit of the person using nickname tf8. |
ngs produced a very fine picture, 'The Heroic | Exploit of Admiral Collingwood at the Battle of Trafa |
n 1919, moving to "La gesta dels estels" (The | Exploit of the Stars) in 1922 and culminates with the |
and Y. Sharma in 1997 as Jehan Energy Ltd to | exploit oil and gas opportunities in India. |
mer, aka "weev," posted information about the | exploit on Encyclopedia Dramatica. |
ows and lighting contrasts that Clouzot would | exploit on the full-length features he would make yea |
The first | exploit on approaching the city was the taking of Cas |
uses of the hexafluorophosphate ion typically | exploit one or more of the following properties: that |
73, Format string bug in WU-FTPD (remote root | exploit), one of the first exploits for the format st |
Co-location allows the services to | exploit opportunities for common training in policing |
vice and usually requires the discovery of an | exploit or security weakness in the firmware shipped |
s were deepened to over 1000 yards (920 m) to | exploit other seams. |
In the 1929 election, the Tories were able to | exploit patronage scandals surrounding the Liberal go |
s Marshall) - Danny's colleague, who seeks to | exploit people for their money. |
e labels "unethical", stating that such games | exploit players by using a simple reward-for-sufferin |
argued that the Government was attempting to | exploit popular prejudices in order to boost its elec |
that sexually selected traits have evolved to | exploit previously existing biases in the sensory, or |
ander that establish, maintain, influence, or | exploit relations between military organizations, Gov |
This gallant and determined | exploit removed a serious obstacle from the line of a |
Subsea installations help to | exploit resources at progressively deeper waters, loc |
he swidden field as a base camp from which to | exploit resources in the forests, particularly when c |
ere undertaken by the Soviet central power to | exploit resources on Estonian territory of Oil shale, |
ms to refer to Polish music history and fully | exploit retro style (what would become the trademark |
AMISOM forces in Mogadishu have been able to | exploit rifts within the insurgent group and gain gro |
Dogs and crows frequently | exploit roadkill. |
st, and transform this code to simultaneously | exploit scalable parallelism and scalable locality. |
nhabited hillside, scarp and hilltop areas to | exploit scarce resources such as, woodland, and uplan |
ts, or (potentially) to anyone who is able to | exploit security vulnerabilities on that computer. |
cene or immoral material liable to arouse and | exploit sexual desire among the population", followed |
tain politicians want a power base, they will | exploit similar thoughts of local issues,” he says. |
ts [...] few contemporary authors know how to | exploit so radically the ambiguity of language in ord |
nveniently used, transported or stored, or to | exploit some property of the process itself. |
Therefore the radar must | exploit some intrinsic characteristics of the target |
The overall mission is control and | exploit space for global and theater operations, ther |
ction (the part that says the Soviets did not | exploit Sputnik for propaganda purposes within the So |
y has been sprayed to cover the area that the | exploit targets. |
JIT spraying is a class of computer security | exploit that circumvents the protection of address sp |
There were no French forces to | exploit that victory, and the decimated Polish unit f |
xample of a helpful worm - utilizing the same | exploit that caused the Blaster worm. |
ort back to a hacker who may use this info to | exploit that network glitch to gain entry to the netw |
to describe the part of the source code of an | exploit that implements this technique. |
heat (OC) phenotype to emerge, these bacteria | exploit the fruiting bodies of wild-type M. Xanthus t |
September 2006 he became the first player to | exploit the updated transfer regulations of FIFA, foo |
They | exploit the fact that the sun travels in a predictabl |
mounted to one and the same thing), wanted to | exploit the coal seams around northern Nottinghamshir |
His principal campaign strategy was to | exploit the LBJ issue, and he used the slogan 'Lyndon |
nd or other lapsed or angry liberal Catholics | exploit the tragedy of the Jewish people during the H |
ndustry by preventing companies who sought to | exploit the UK VAT threshold by establishing a Jersey |
their electoral successes to their ability to | exploit the race issue to win political dominance of |
ra Subprograms (BLAS) in order to effectively | exploit the caches on modern cache-based architecture |
s the kind of movie Hollywood used to make to | exploit the sheer charm of its great stars - performe |
n, allowing the rest of the Hungarian team to | exploit the space. |
The Romans were the first to | exploit the massive forests of the region, a process |
he subtilisin family showing that subtilisins | exploit the same catalytic triad as the chymotrypsins |
こんにちは ゲスト さん
ログイン |
Weblio会員(無料)になると
|
こんにちは ゲスト さん
ログイン |
Weblio会員(無料)になると
|