attackable


Also found in: Dictionary, Medical, Encyclopedia.
Graphic Thesaurus  🔍
Display ON
Animation ON
Legend
Synonym
Antonym
Related
  • adj

Synonyms for attackable

open to attack and capture because of a lack of protection

The American Heritage® Roget's Thesaurus. Copyright © 2013, 2014 by Houghton Mifflin Harcourt Publishing Company. Published by Houghton Mifflin Harcourt Publishing Company. All rights reserved.
References in periodicals archive ?
Merguez were any I've Strasbourg, with an gamey The kebabs we ordered as main courses arrived in a "stuff on a flatbread" format that required some audience participation in order to fold them into an attackable shape.
We tend to talk past each other, and discussion degenerates when one party senses that the other isn't really listening or is addressing a weaker, easily attackable version of one's position.
He worked to make things concrete, understandable, and therefore attackable' (p11).
It means that the vulnerability exists on servers but there should be certain conditions met to render the server remotely attackable. According to Qualys' report, they have found an email server software called Exim that is remotely exploitable.
If it is correct the (retail) contracts are unfair then they are attackable and we will deal with that in due course.
It is convenient to audaciously scapegoat an entire religion or an entire race and make the enemy visible and attackable. It saves a lot of time on thinking reasonably about the real underlying grievances, and the effort to intelligently and peacefully tackle them from the root.
Schedule-induced aggression: Access to an attackable taiga bird as a positive reinforcer.
Based on the following characteristics it should be noted that the most attackable are residential buildings which are located in the difficult geoclimatic conditions.
We will display that the proposed scheme is secure under the same assumption subject to which Kumar et al.'s scheme is attackable. The assumption is that an attacker [U.sub.a] can extract [24, 25] the information stored inside smart card.
Table I shows the run times for all 16 attackable bytes when mounting CPA and PAA attacks.
The objective of the present study was to convert sugarcane bagasse by using physical and chemical means, to an easily attackable substrate for the production of cellulytic enzymes by Trichoderma viride through submerged fermentation.