1·Implementations commonly provide a built-in distribution system that can be implemented across the enterprise and networks.
实现一般地提供内建的分布式系统,它可以通过跨企业及网络来实现。
2·Commonly, attackers exploit buffer overflows to get an interactive session (shell) on the machine.
一般地,攻击者利用缓冲区溢位得到机器上的交谈式Session (shell)。