請輸入想查詢的單字或片語
    Footer
    Download on the App StoreGet it on Google Play

    關於

    • 認識 VoiceTube
    • 學習服務介紹
    • 加入我們
    • 常見問題
    • 熱門搜尋主題
    • 企業英文培訓
    • 社群推廣分潤計畫

    服務總覽

    • 口說挑戰
    • 單字單句本
    • Hero 智能學習
    • Tutor 真人家教
    • Vclass 名師課程
    • Campus 教育版
    • 字典查詢
    • 匯入影片並生成字幕
    • 部落格

    精選頻道

    影片分級

    • A1 初級
    • A2 初級
    • B1 中級
    • B2 中高級
    • C1 高級
    • C2 高級

    隱私權˙條款˙
    ©2026 VoiceTube Corporation. All rights reserved

    heuristic

    US /hjʊˈrɪstɪk/

    ・

    UK /hjuˈrɪstɪk/

    C1 高級
    adj.形容詞 啟發式教育法
    She had a heuristic approach to her studies

    影片字幕

    如何像《新世紀福爾摩斯》一樣思考! (How to Think Like Sherlock Holmes)

    10:55如何像《新世紀福爾摩斯》一樣思考! (How to Think Like Sherlock Holmes)
    • That's called the availability heuristic.

      一般人則是會沒看到。

    • that's called the availability heuristic.

      那是所謂的可得性啟發。

    B1 中級

    Joseph Pine - 顧客真正想要的到底是什麼? (中英雙字幕) (Joseph Pine - 什麼是顧客真正想要的? (中英雙字幕))

    14:23Joseph Pine - 顧客真正想要的到底是什麼? (中英雙字幕) (Joseph Pine - 什麼是顧客真正想要的? (中英雙字幕))
    • And using the same heuristic, what happens when you customize a service?

      有個對抗商品大眾化的辦法, Now, there's an antidote to commoditization,

    • and use, in that same heuristic, what happens when you customize a service?

      應用同樣的法則,當你客製服務後會產生什麼? and use, in that same heuristic, what happens when you customize a service?

    B1 中級

    45歲必看!如果你也40幾歲,千萬別錯過這支影片! (I'm 45. If you're in your 40s, watch this:)

    18:4645歲必看!如果你也40幾歲,千萬別錯過這支影片! (I'm 45. If you're in your 40s, watch this:)
    • A great heuristic in life is to always ask yourself if you will regret the decision that you are currently going to make.

      人生中一個很棒的判斷準則,就是隨時問自己,你會不會後悔現在即將做出的決定。

    A2 初級

    事實與虛構:什麼更有利於學習? (Facts vs Fiction: What is Better for Learning?)

    05:52事實與虛構:什麼更有利於學習? (Facts vs Fiction: What is Better for Learning?)
    • Nonfiction provides our mind a theory, a heuristic and a framework that allows us to make assumptions and generalize.

      非虛構作品為我們的頭腦提供了一種理論、啟發式方法和框架,使我們能夠做出假設和概括。

    B1 中級

    在職業倦怠日益嚴重的現在,該怎麼做才能做到 work-life balance? (The lost art of accomplishment without burnout | Cal Newport for Big Think +)

    06:14在職業倦怠日益嚴重的現在,該怎麼做才能做到 work-life balance? (The lost art of accomplishment without burnout | Cal Newport for Big Think +)
    • Our solution to this was to introduce a rough heuristic that I call "pseudo-productivity" that said we can use visible activity as a crude proxy for useful effort.

      我們的解決方案是引入一種粗略的啟發式方法,我稱之為「偽生產率」,即我們可以使用可見活動作為有用努力的粗略替代。

    B1 中級

    SANS Stormcast(4 月 18 日,星期五):Remnux 雲環境;Erlang/OTP SSH 漏洞;Brickstorm Ba... (SANS Stormcast Friday, April 18th: Remnux Cloud Environment; Erlang/OTP SSH Vuln; Brickstorm Ba…)

    06:19SANS Stormcast(4 月 18 日,星期五):Remnux 雲環境;Erlang/OTP SSH 漏洞;Brickstorm Ba... (SANS Stormcast Friday, April 18th: Remnux Cloud Environment; Erlang/OTP SSH Vuln; Brickstorm Ba…)
    • hello and welcome to the friday april 18th 2025 edition of the sands internet storm centers stormcast my name is johannes ulrich and today i'm recording from orlando florida today we got another guest diary by one of our undergraduate interns jacob clay camp did write about how to get started in malibu analysis of course we have plenty of diaries always about malibu analysis didier and xavier most notably are heavily contributing to this this is more the beginners view of malibu analysis and sort of how to get started with malibu analysis using a cloud-based system a couple interesting parts here first of all jacob is using aws a free instance and then uses chasm workspaces in order to essentially get a remote desktop into a container which then runs remnux this is lenny seltzer's reverse analysis environment all of this is linux-based and since it is set up in a container it's also easy to reset and the cloud deployment of course makes it nice and isolated from anything that you may have going on in your home network overall interesting setup and then jacob is going over a quick analysis of a red tail sample and how to apply this particular environment to the analysis of this particular matter interesting a write-up and nice step-by-step guide to help you get started and then we have a critical vulnerability affecting the erlang otp ssh library this affects any ssh servers written in this language the vulnerability was found by researchers at the ruhr university city in bochum now the otp here in erlang otp does not stand for one term one-time password instead it does stand for the open telecom platform this particular version of erlang was created and maintained initially by ericsson and is often used in telecom related devices routers and the like so certainly there is quite a number of affected devices out there the cbss score of the vulnerability is a perfect 10.0 because it does allow for arbitrary code execution without authentication the problem is that some ssh messages some ssh protocol messages can be sent and executed before authentication finishes due to this bug and that then leads to execution now the user this this code executes at depends on the user the ssh server is running at at the time it receives these messages definitely upgrade but of course since this is a vulnerability in the library used to create the ssh server you may have to wait for respective vendors to actually release updates here in the meantime the only alternative you have is to disable or firewall the ssh server and belgium security company inviso did release a report with details regarding some of their recent findings of the brickstorm backdoor brickstorm has been used in linux in in sort of vmware environments but now they also found a version of this backdoor on windows there are a couple interesting things to note here unlike most backdoors this backdoor actually does not have a remote code execution capability they say that typically rdp and such is used instead by the attacker and that they specifically didn't include a remote code execution capability to evade some heuristic and behavioral detection that you often find that would flag any code execution behavior instead this particular backdoor is able to read write files from the file system it also has some network components that would allow an attacker to essentially use an affected system as a pivot to scan other systems in the network so certainly a capable piece of malware also interesting as a command control channel they're using cloud flare workers and similar systems that again are less likely going to trigger alerts interesting report and it also includes some good indicators of compromise and the ways and techniques how you can actually find if you are affected by this particular backdoor and openai released its latest greatest model gpt 4.1 but this didn't happen amid some controversy around the security aspects here first of all this model was released without the usual safety reports or system cards which typically outline how this particular model was created to be safe meaning not for example allowing to create malware and apparently some of these safeguards that you often find in these models are missing from gpt 4.1 making it trivial to create malware with this model interesting problem here and not even sure if this will be something that the openai will fix in short notice but definitely we have seen malicious models of course before but not from major vendors like openai well that is it for today so thanks again for listening and thanks everybody who i met here i mean all of you listeners at the event here in orlando and well i'll talk to you again on monday bye

      大家好,歡迎收聽2025年4月18日星期五的金沙互聯網風暴中心風暴播報,我是約翰尼斯-烏爾裡希,今天我在佛羅里達州奧蘭多錄製節目。當然,我們有很多關於Malibu分析的日記,其中Didier和Xavier的貢獻最大,這篇日記更像是Malibu分析初學者的觀點,以及如何使用雲系統開始Malibu分析。首先,Jacob 使用 aws 免費實例,然後使用 Chasm 工作區,以便將遠程桌面接入容器,然後運行 remnux,這是 Lenny Seltzer 的反向分析環境。當然,雲部署使其很好地與家庭網絡中發生的

    B1 中級

    覺得自己講話沒份量?學會「3S說話法則」,一秒提升專業度 (Stop Over-Explaining: The 3 S’s Rule For Projecting Authority)

    19:47覺得自己講話沒份量?學會「3S說話法則」,一秒提升專業度 (Stop Over-Explaining: The 3 S’s Rule For Projecting Authority)
    • So confidence is actually a heuristic.

      所以自信其實是一種捷徑。

    B1 中級

    來聊聊克羅內修女吧! (Let's Talk About Sister Krone)

    15:51來聊聊克羅內修女吧! (Let's Talk About Sister Krone)
    • Offensiveness as a heuristic is overly focused on the individual impact, rather than the societal one.

      冒犯性作為一種啟發式思考,過度關注個人影響,而非社會影響。

    • Offensiveness as a heuristic is overly focused on the individual impact rather than the societal
    B2 中高級

    課程 1 | MIT 9.00SC 心理學入門,2011年春季班 (Lec 1 | MIT 9.00SC Introduction to Psychology, Spring 2011)

    49:44課程 1 | MIT 9.00SC 心理學入門,2011年春季班 (Lec 1 | MIT 9.00SC Introduction to Psychology, Spring 2011)
    • But that's what we call a heuristic, a simple way to think about it, because your experience is kind of like that.

      但這就是我們所說的捷徑,一種思考它的簡單方法,因為你的經驗就是如此。

    • That's what we call a heuristic-- a simple way to
    A2 初級

    一起來讀尼采《善惡的彼岸》CC ASMR 第一篇文章! (Let's Read Nietzsche's Beyond Good and Evil CC ASMR First Article)

    58:31一起來讀尼采《善惡的彼岸》CC ASMR 第一篇文章! (Let's Read Nietzsche's Beyond Good and Evil CC ASMR First Article)
    • Thus we need sensualism at least as a regulative hypothesis if not as a heuristic principle.
    • Thus, we need sensualism at least as a regulative hypothesis, if not as a heuristic principle.

      是以,我們至少需要感官主義作為一種規律性假說,即使不是一種啟發性原則。

    B2 中高級