armorize

armorize
/ahr"meuh ruyz'/, v.t., armorized, armorizing.
to equip with armor or other protective devices: to armorize a car with bulletproof glass.
[‡1975-80; ARMOR + -IZE]

* * *


Universalium. 2010.

Игры ⚽ Нужно сделать НИР?

Look at other dictionaries:

  • armorize — /ahr meuh ruyz /, v.t., armorized, armorizing. to equip with armor or other protective devices: to armorize a car with bulletproof glass. [‡1975 80; ARMOR + IZE] …   Useful english dictionary

  • Directory traversal — A directory traversal (or path traversal) is to exploit insufficient security validation / sanitization of user supplied input file names, so that characters representing traverse to parent directory are passed through to the file APIs.The goal… …   Wikipedia

  • HTTP response splitting — is a form of web application vulnerability, resulting from the failure of the application or its environment to properly sanitize input values. It can be used to perform cross site scripting attacks, cross user defacement, Web cache poisoning,… …   Wikipedia

  • Application security — encompasses measures taken throughout the life cycle to prevent exceptions in the security policy of an application or the underlying system (vulnerabilities) through flaws in the design, development, deployment, upgradation,or maintenance of the …   Wikipedia

  • List of tools for static code analysis — This is a list of significant tools for static code analysis.Historical products* Lint the original static code analyzer of C code.Open source or Noncommercial products .NET (C#, VB.NET and all .NET compatible languages) *… …   Wikipedia

  • HTTP-Response-Splitting — (dt.: Aufteilung der HTTP Antwort) ist eine Sicherheitslücke, welche zur Durchführung von Cross Site Scripting Attacken, (Cross User) Defacements, Web cache poisoning und ähnlichen Exploits verwendet werden kann. Inhaltsverzeichnis 1… …   Deutsch Wikipedia

  • Directory traversal — Saltar a navegación, búsqueda Un directory traversal (o path traversal) consiste en explotar una vulnerabilidad informática que ocurre cuando no existe suficiente seguridad en cuanto a la validación de un usuario, permitiéndole acceder a… …   Wikipedia Español

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”