1. The method includes executing an
insecure routine and receiving a request from the
insecure routine.
该方法包括执行一不安全例程并接收来自该不安全例程的请求。
2. This is all very well, but it has serious implications for data security and personal privacy because computers are inherently
insecure.
这固然很好,但这却严重关系到资料的安全性和个人隐私,因为电脑本质上是不安全的。
3. The computer system (400A-B) also includes hardware coupled to perform a first evaluation of a request associated with the
insecure routine.
该计算机系统(400A-B)还包括连接以执行与该不安全例程相关的请求的第一次评估的硬件。