請輸入想查詢的單字或片語
    Footer
    Download on the App StoreGet it on Google Play

    關於

    • 認識 VoiceTube
    • 學習服務介紹
    • 加入我們
    • 常見問題
    • 熱門搜尋主題
    • 企業英文培訓
    • 社群推廣分潤計畫

    服務總覽

    • 口說挑戰
    • 單字單句本
    • Hero 智能學習
    • Tutor 真人家教
    • Vclass 名師課程
    • Campus 教育版
    • 字典查詢
    • 匯入影片並生成字幕
    • 部落格

    精選頻道

    影片分級

    • A1 初級
    • A2 初級
    • B1 中級
    • B2 中高級
    • C1 高級
    • C2 高級

    隱私權˙條款˙
    ©2026 VoiceTube Corporation. All rights reserved

    vulnerabilities

    US

    ・

    UK

    B1 中級
    n. pl.名詞 (複數)漏洞 :脆弱點
    The body's vulnerabilities include the heart and the head

    影片字幕

    iPhone 用戶小心了!就算有密碼,iPhone 大盜還是可以入侵你的手機,竊取你的個資! (iPhone Thief Explains How He Breaks Into Your Phone | WSJ)

    09:47iPhone 用戶小心了!就算有密碼,iPhone 大盜還是可以入侵你的手機,竊取你的個資! (iPhone Thief Explains How He Breaks Into Your Phone | WSJ)
    • It was an extensive scheme of profiting off of Apple's vulnerabilities and products.

      這是一個利用蘋果的漏洞和產品謀利的廣泛計畫。

    A2 初級

    覺得公司規模小就不會被駭客盯上嗎?大錯特錯!小公司更容易成為駭客目標的原因(Why Small Businesses are Easy Targets for Hackers | Inc.)

    02:02覺得公司規模小就不會被駭客盯上嗎?大錯特錯!小公司更容易成為駭客目標的原因(Why Small Businesses are Easy Targets for Hackers | Inc.)
    • After scanning for vulnerabilities in more than 20,000 randomly selected U.S. small businesses, CyberCatch found that around 1/3 suffered from spoofing while 28 succumb to clickjacking.

      在掃瞄了隨機選取的超過二萬家美國小型企業的系統弱點後之後,CyberCatch 發現其中有 1/3 遭到了欺騙攻擊,而有 28% 受到了點擊劫持。

    • to locate any and all security vulnerabilities and patch them before cyber attacker finds them.

      藉此來找出所有的安全漏洞,並在網路攻擊者發現他們之前及時補救。

    B1 中級

    美國汽車如何變得如此糟糕 (How American Cars Got So Bad)

    17:49美國汽車如何變得如此糟糕 (How American Cars Got So Bad)
    • Sometimes I'm on public wifi and need to log into my bank account but don't want to risk security issues due to the vulnerabilities of a shared wifi network.

      有時,我在使用公共 Wifi 時需要登錄銀行賬戶,但又不想冒共享 Wifi 網絡存在漏洞的安全風險。

    B1 中級

    想讓對方敞開心扉聊得更深入嗎?那你必須學會這 5 個深度對話開場白! (5 Deep Conversation Starters To Get Someone To Open Up)

    04:34想讓對方敞開心扉聊得更深入嗎?那你必須學會這 5 個深度對話開場白! (5 Deep Conversation Starters To Get Someone To Open Up)
    • Asking "What challenge made you grow?" sparks meaningful conversations by inviting people to share their experiences and vulnerabilities, which can deepen connections.

      問「是什麼挑戰讓你成長?」透過邀請人們分享自己的經歷和弱點,引發有意義的對話,從而加深聯繫。

    • Sparks meaningful conversations by inviting people to share their experiences and vulnerabilities, which can deepen connections.

      通過邀請人們分享自己的經歷和弱點,引發有意義的對話,從而加深聯繫。

    B1 中級

    直播:南非宣佈 G20 財金會議開幕 | REUTERS (LIVE: South Africa opens G20 finance meeting | REUTERS)

    19:06直播:南非宣佈 G20 財金會議開幕 | REUTERS (LIVE: South Africa opens G20 finance meeting | REUTERS)
    • Many developing countries, especially in Africa, remain burdened by high and rising debt vulnerabilities, constrained fiscal space, and high cost of capital that limits their ability to invest in their people and their futures.

      許多開發中國家,尤其是非洲國家,仍然揹負著沉重的債務負擔,而且債務脆弱性不斷上升,財政空間受限,資本成本高昂,限制了它們投資於本國人民和未來的能力。

    • Tomorrow, we will discuss the impediments to development and growth in Africa with a specific focus on macroeconomic vulnerabilities, weak institutions, poor infrastructure, and the high cost of capital.

      明天,我們將討論非洲發展和增長的障礙,重點是宏觀經濟脆弱性、機構薄弱、基礎設施落後和資本成本高昂。

    B2 中高級

    "ハッキングの歴史」について質問ある? (「ハッキングの歴史」について質問ある?| Tech Support | WIRED Japan)

    26:46"ハッキングの歴史」について質問ある? (「ハッキングの歴史」について質問ある?| Tech Support | WIRED Japan)
    • They report those vulnerabilities and they're trying to do something for the overall good.

      他們報告這些漏洞,是在為整體利益做貢獻。

    • A lot of these viruses and malware will exploit different vulnerabilities in software.

      很多病毒和惡意軟件都會利用軟件中的不同漏洞。

    B1 中級

    全球芯片短缺:微芯片如何成為世界上最珍貴的資源之一? (Global chip shortage: How microchips became one of the worlds most precious resources)

    13:13全球芯片短缺:微芯片如何成為世界上最珍貴的資源之一? (Global chip shortage: How microchips became one of the worlds most precious resources)
    • It has poured money into this, but really the past several years this drive has been accelerated as China's vulnerabilities in semiconductors has been made so clear by US sanctions.

      它已經投入了資金,但真正過去幾年,隨著中國在半導體領域的弱勢被美國製裁得如此明顯,這種驅動力已經加速了。

    B1 中級

    【MarieTV】劉易斯·霍斯:這個社會文化對男人的錯誤認知 (Lewis Howes: What Our Culture Gets Wrong About Masculinity)

    30:33【MarieTV】劉易斯·霍斯:這個社會文化對男人的錯誤認知 (Lewis Howes: What Our Culture Gets Wrong About Masculinity)
    • not what it means to be a man. You’re not allowed to show vulnerabilities, at least

      因為那不是男人該談論的話題。你不被允許展現脆弱的一面

    A2 初級

    閱讀障礙不僅僅是閱讀和拼寫困難" | BBC Ideas (‘Dyslexia isn’t just about having difficulty with reading and spelling’ | BBC Ideas)

    08:28閱讀障礙不僅僅是閱讀和拼寫困難" | BBC Ideas (‘Dyslexia isn’t just about having difficulty with reading and spelling’ | BBC Ideas)
    • I think I've passed that on, where we save our vulnerabilities, our sadness for places where we can't be seen.

      我想我已經把這一點傳承了下來,我們把自己的脆弱和悲傷藏在了不為人知的地方。

    A2 初級

    中國如何建立一支黑客大軍 (How China Is Building an Army of Hackers)

    15:57中國如何建立一支黑客大軍 (How China Is Building an Army of Hackers)
    • With a focus on real world devices, their goal is to find weaknesses or holes in software, known as vulnerabilities, and exploit them for a cash prize.

      他們以現實世界的設備為重點,目標是找到軟件中的弱點或漏洞(稱為漏洞),並利用這些弱點獲得現金獎勵。

    • Once escorted off stage, this hacking team must then share the vulnerabilities they found directly with the company.

      一旦被護送下臺,這個黑客團隊就必須直接與公司分享他們發現的漏洞。

    B1 中級