网站首页  词典首页

请输入您要查询的英文单词:

 

单词 attacker
释义

attacker

美 [??tæk?r]
英 [??tæk?(r)]
  • n.攻击者;袭击者;进攻者
  • 网络攻击机;攻击手;强击机
复数:attackers  
n.
assailant,aggressor,invader,enemy,foe
attacker
n.
1.
攻击者;袭击者;进攻者a person who attacks sb
She didn't really see her attacker.
她没有看清楚袭击她的人。

例句

释义:
1.
An attacker could exploit this vulnerability, and run programs as if he or she were the user.
攻击者可利用此漏洞运行程序,就像他或她是用户一样。
www.microsoft.com
2.
The judge has asked at least two hospitals for a medical opinion on whether surgeons could render the attacker's spinal cord non-functional.
负责本案的法官已向至少两家医院询问,就技术手段而言是否能够损伤那名罪犯的脊髓,使他陷入瘫痪。
www.china.org.cn
3.
Ms. Finn said that her attacker's family was on the police force and that she "did not feel safe" reporting what had happened.
芬说,针对她的攻击者的家人供职于警察部门并且她若报告所发生的事情并“不会感到安全”。
dongxi.net
4.
He said he saw a middle-aged woman, who was a passer-by, telling the attacker: 'He's just a village kid!
他说他看见一名过路的中年妇女对打人男子说:他就是个农村小孩!
chinese.wsj.com
5.
Reports said the attacker walked into a restaurant during the busy lunch hour and detonated a belt packed with explosives .
报道称,袭击者在午餐繁忙时间走进一家餐馆,引爆绑在腰间的炸药。
dictsearch.appspot.com
6.
When the defender faces an attacker in the air, he focuses on trying to force a header from a bad (or even really bad) angle.
当后卫攻击者所面临的空气,他的重点是试图迫使标题从坏(或什至非常糟糕)的角度。
www.dsws.cn
7.
First, she swung a slap at her husband's attacker. She followed up by picking up the plate and trying to strike him with it.
她一开始就扇了攻击她先生的攻击者一个耳光,然后捡起盘子试图以牙还牙,接着走回到丈夫身边。
dongxi.net
8.
Further, depending on the classloader structure, an attacker may be able to invoke servlets outside of your Web application.
更进一步地,根据类加载器的结构,攻击者可能在您的Web应用程序外部调用Servlet。
www.ibm.com
9.
Essentially, if you allow an attacker to run code on such a machine through any means, the attacker can completely take over the machine.
从本质上说,如果您允许攻击者在这样的机器上以任何方式运行代码,则攻击者完全可以接管该机器。
www-128.ibm.com
10.
Another question I've had to ask myself is why, as a police officer, I am not doing everything I can to get my attacker off the streets.
还有一个问题我不得不问自己,作为一个警察,为什么我没有尽自己所能把这个侵犯者扫出大街?
www.bing.com
1.
That could have been a really big disadvantage against a really good attacker, such as Barcelona, had Romario in the front.
这在我们面对一个优秀的攻击型球员,比如巴塞罗那的前锋罗马里奥时,是一个很大的劣势。
www.bing.com
2.
Alipay has the technical preparations for, against an attacker to other means of attack to pay treasure to the bank system, system impact.
支付宝已经做好技术准备,防备攻击者以其他手段攻击支付宝系统,给银行系统造成影响。
news.bangkaow.com
3.
She has been trying to fend off an attacker who has come at her, slashing in a frenzied manner with a knife or possibly a sword.
她曾试图避开朝她飞来的矛,用一把小刀或是一只剑疯狂的猛砍。
www.bing.com
4.
How much effort and knowledge is needed by an attacker?
攻击者需要多少的努力与知识?
www.bing.com
5.
Most of the victims appear to be Afghan civilians and security guards. NATO officials said the attacker did not breach the airport defenses.
受害者多数是阿富汗平民和守卫人员。北约官员说,攻击者未能突破机场的防护设施。
www.bing.com
6.
She stabbed at her attacker with a pair of scissors that the was carrying in her bag.
她用随身带在包里的剪刀向袭击她的人刺去。
dictsearch.appspot.com
7.
If it said "the user name you entered has not been found" , an attacker could automatically compile a list of user names.
如果显示的错误信息是“用户名没有被找到”,那么攻击者就会自动编制一份用户名名单。
www.bing.com
8.
If it is a real fight, you are trying to hurt the attacker.
在真实格斗中,你应该试图伤害攻击者。
www.wubei.com
9.
Giving credence to the first report, the semi-official Fars new agency confirmed the incident and said the attacker had been arrested.
伊朗半官方的Fars通讯社证实了这起事件,并称袭击者已被逮捕,这让Khabaronline起初的报道有了几分可信度。
www.ftchinese.com
10.
But the concept of deterrence depends on the threat of certain retaliation that would cause a rational attacker to think twice.
但是,防御的概念是基于确定的报复行为威胁之上的,而发动报复行为时,理智的袭击者都会考虑再三。
www.bing.com
1.
His attacker made at him with a knife.
那人持刀袭击他。
dict.netat.net
2.
Experience told him that a woman's natural instinct was to defend herself rather than hurt the attacker.
经验告诉他,妇女的天性是保护自己而不是去伤害攻击者。
english.31931.cn
3.
This code basically passes the user ID and password information of any user logging into the Web site along to the Web site of the attacker.
该代码通常会将任何登录到此Web站点的用户的ID及密码信息传递到攻击者的Web站点。
www.ibm.com
4.
There was a police presence as they exchanged vows, thanks to the fact that her attacker has been released from prison.
他们互立誓言的时候,当年的一位警察也到场了,幸亏那个袭击她的人如今已经被释放了。
www.bing.com
5.
His attacker cut at him with a razor.
袭击者用剃刀去割他。
dict.ebigear.com
6.
However, Milan are now believed to be sitting in pole position to lure the attacker away from his current club.
但是现在,米兰被认为在索德尔的争夺战中处于领先位置。
www.bing.com
7.
You can see that the attacker will only have to send a few SYN packets every ten seconds or so to disable a specific port.
您会发现,攻击者只要每十秒钟左右发送几个SYN包就可以禁用特定端口。
www-128.ibm.com
8.
Attacker sends a TCP SYN packet to the target port from his own IP address (or one he controls) to request a connection.
攻击者从自己的的IP地址(或者他控制的)发送一个TCPSYN攻击或者自己包到目标端口请求连接。
www.cto360.com
9.
And you don't have -- as an attacker -- you don't have to deliver this payload by a USB stick, as we saw it in the case of Stuxnet.
作为一名攻击者,你不需要--不需要用U盘把病毒传播出去,如我们在震网病毒这一案例中看到的那样。
www.ted.com
10.
That could allow an attacker to take control of a victim's computer or run malicious programs on it, the company said.
该瑕疵使攻击者能操纵受袭者的电脑或者在该电脑上运行有毒程序,微软公司称。
mysearch.100e.com
1.
Grappling, we fell to the ground, where we wrestled for a few minutes until the attacker jumped up and escaped.
一番打斗,我们跌倒在地,又扭打了几分钟,后来那个坏蛋跳起来跑掉了。
kfbck.blog.163.com
2.
If your Web application does not guard against XSS attacks, the only limit to the harm done is the imagination of the attacker.
如果您的Web应用程序不针对XSS攻击进行保护,则会造成严重的破坏。
www.ibm.com
3.
The attacker killed himself after stabbing the children, Wu Xiaoyan, a Hanzhong city official told Xinhua news agency.
新华社援引汉中市官员吴小燕(音)的话报导,凶手在行凶后自杀身亡。
chinese.wsj.com
4.
The woman managed to break loose from her attacker and run for help.
那个女子想方设法摆脱了袭击者之后跑去求救。
www.nmet168.com
5.
Israeli police spokesman Mickey Rosenfeld says the attacker was armed with a Kalashnikov rifle and was killed on the scene.
以色列警方发言人罗森费尔德说,袭击者使用的武器是一支卡拉什尼科夫步枪,枪手被当场打死。
hxen.com
6.
XML has no built-in limits on names of elements, entity depths, and the like, so an attacker could provide long values for these constructs.
XML对元素名称、实体深度和类似的东西没有内建限制,所以攻击者可以为这些构造体提供很长的值。
www.ibm.com
7.
She was unable to come to grips with her attacker.
她无力与袭击她的人扭打。
www.tcbuu.com
8.
If an attacker can tamper with the authentication hardware, it might be possible to inject falsified digital data directly into the device.
如果攻击者可以篡改认证硬件,则可能将伪造的数字数据直接发射到设备中。
www-128.ibm.com
9.
Special Forces soldiers have been rescued by an attacker in the Taj Mahal hotel in the seizure of the hostages.
特种部队士兵已经救出了攻击者在泰姬陵酒店内扣押的人质。
dictsearch.appspot.com
10.
The attacker might give up in frustration long before figuring out that you lied.
在弄清您欺骗了他之前,攻击者很早就可能因受挫而放弃。
www-128.ibm.com
1.
As a midfielder I have more space to take the ball, whereas as an attacker I must wait that the ball arrives to my feet.
作为中场我有更多拿球的空间,而作为前锋,我只能等球传到我的脚下。
www.milanchina.com
2.
This efficiency is the property of an attacker. He would score without having a great number of chances.
这样的效率是属于射手的特质﹕没有多少机会,他还是能进球。
www.7777i.com
3.
The brave girl ran at her attacker with a pair of scissors.
那个勇敢的女孩拿起剪刀冲向袭击她的人。
www.hotdic.com
4.
About this download: An identified security vulnerability in Microsoft Windows 2000 could allow an attacker to take control of the computer.
MicrosoftWindows2000中一个已知的安全漏洞可使攻击者得以控制计算机。
www.microsoft.com
5.
A US military official told Reuters news agency the attacker seemed to be a "disgruntled employee" , not a militant.
一名美军官员告诉路透社,这名攻击者看上去像是一名“不满的职员”,而非军人。
bbs.ebigear.com
6.
In view of the diversity of means of attack from attacker, the formal security model was used to prove the security of the AKE protocol.
鉴于攻击者攻击手段的多样性,人们提出了形式化安全模型用来证明协议的安全性。
www.13191.com
7.
Do not display exception information: it provides any would-be attacker with valuable clues.
不要显示异常信息:它会给任何潜在的攻击者提供有价值的线索。
technet.microsoft.com
8.
Reports said the attacker, a local caretaker and receptionist, was not armed.
报道称袭击者是当地一名管理员和接待员,没有携带武器。
www.24en.com
9.
During a social conflict, for example, a harassed cat may be undecided about whether to run from its attacker or to stand and fight.
例如,猫在面临社会冲突时,可能无法决定究竟是从敌人面前逃开还是坚持战斗。
www.bing.com
10.
In this scenario, the user unknowingly executes scripts written by an attacker when they follow a malicious link in a mail message.
在本方案中,当用户执行邮件消息中的恶意链接时,就会不知不觉地执行攻击者编写的脚本。
www-128.ibm.com
1.
In particular, make sure you release any locks held and avoid crashing an entire application due to data sent by an attacker.
具体来说,就是需要确保释放所持有的锁,并且防止会由于攻击者所发送的数据而引起整个应用程序的崩溃。
www.ibm.com
2.
Rather, Chinese bodyguards are martial arts experts, trained to disarm or subdue an attacker with a few quick thrusts and hand chops.
准确地说,中国保镖是武术专家,接受的训练就是通过几记拳打掌劈就能让对方缴械投降。
www.neworiental.org
3.
This ensures that the request to Amazon SQS cannot simply be captured by an attacker and replayed, thus mimicking the valid user.
这确保了对AmazonSQS的请求无法被攻击者捕获并回放以模拟有效用户。
www.ibm.com
4.
The 31-year-old recently announced his retirement from international football, but Tabarez is not yet ready to discount the gifted attacker.
这位31岁的球员最近宣布自己将退出国家队比赛,不过Tabarez并没有作好失去这位天才攻击手的准备。
blog.sina.com.cn
5.
Try to run away - be prepared to flee as soon as you have hit your attacker.
设法跑开,必须做好准备逃跑,只要你打你的攻击。
www.tianxiawuji.cn
6.
In fact, the program they're measuring might be written by an attacker.
实际上,他们统计的程序可能是由攻击者编写的。
www.ibm.com
7.
The question to ask is can an attacker control the value of the variable filename?
要问的问题是攻击者可以控制变量filename的值吗?
www.ibm.com
8.
I'm playing higher up the field these days, almost like an attacker.
现在我踢的位置更靠前,大体上像一个攻击手。
bbs.arsenal.com.cn
9.
Police in Nangarhar province said the attacker targeted a meeting of tribal elders.
楠格哈尔省的警方说,这次炸弹袭击的目标是一个部落长老会议。
www.voa365.com
10.
is vulnerable to a session-fixation attack and could result in an attacker stealing the identity of an API end-user.
容易遭受会话完成攻击,并且可能造成让攻击者盗取API终端用户个人身份的结果。
www.infoq.com
1.
Brazilian attacker Cleo is set to leave Partizan Belgrade for Chinese side Guangzhou.
巴西前锋克莱奥即将离开贝尔格莱德游击队加盟中国球队广州(恒大)。
tieba.baidu.com
2.
In one case, the attacker made comments to at least 24 friends and classmates about his interest in killing other pupils and building bombs.
在一个案例中,袭击者在行凶之前向至少24个朋友和同学谈论了他对于杀死其他同学和实施爆炸的兴趣。
www.bing.com
3.
Knowing which ports are open on a host is an important first step for an attacker to deduce possible vulnerabilities to the target host.
知道主机上哪些端口是打开的,对于攻击者推断目标主机上可能存在的弱点是重要的第一步。
www.ibm.com
4.
The attacker may be able to override a login 5 and obtain administrator privileges for a program.
黑客可能能够越过登录5,获得程序的管理员特权。
www.ibm.com
5.
An attacker can discover vulnerabilities much faster than you think!
攻击者找到漏洞的速度比你想想的快多了。
www.bing.com
6.
The testimony of the surviving attacker, the fact that the band arrived by sea, and American intelligence all point that way (see article).
从幸存袭击者的证词、这班人马从海上登陆的事实,以及来自美国情报系统的信息都针对这个判断。
www.ecocn.org
7.
Murdoch's wife, Wendi Deng, who was seated behind him, leapt to her feet and smashed the attacker's hand with her own.
坐在默多克身后的妻子邓文迪迅速跃起,第一时间抬手阻止了袭击者。
www.putclub.com
8.
Exploit 3: To fashion a web page and a media file to allow deletion of a file in a path known to the attacker.
漏洞3:改变网页和媒体文件,使攻击者利用其已知的路径删除文件。
service.real.com
9.
Once in, though, the skilled attacker has no difficulty covering tracks.
一旦进入公司,虽然,熟练的攻击者却可以覆盖轨道。
blog.chinaunix.net
10.
It was not immediately clear whether the attacker knew Stevenson was a police detective.
目前尚不清楚是否攻击者知道史蒂文森是一名警探。
www.aitrans.net
1.
A company manager and "pillar of the community" has been exposed after 20 years as a serial sex attacker known as the Shoe Rapist.
一位公司经理和“社区栋梁”20年后被曝光是名为“恋鞋癖”色魔的连环性侵犯者。
bbs.translators.com.cn
2.
The schoolgirl was targeted a year ago by a mystery attacker after a dance class.
这位女中学生是在一年前舞蹈班放课后遭遇的不明袭击。
www.bing.com
3.
An attacker could host a Web site containing the malicious code to exploit the flaw, he said.
他说,攻击者可以在某个网站上嵌入恶意代码,一旦用户访问了有关网页,电脑就可能被渗透。
mirror.dream4ever.org
4.
You don't think he managed to get a picture of his attacker? said Professor McGonagall eagerly.
他会不会拍下了攻击者的照片?麦格教授急切地问。
www.kekenet.com
5.
For a second time, I retreated a step while my attacker relented in his attack.
我再一次后退了一步,同时,我的袭击者的攻击也减缓了。
www.ebigear.com
6.
After tussling with my attacker for a few minutes, I succeeded in breaking free, and ran for help.
我同袭击我的人扭打几分钟后,挣脱了对手,然后跑去求救兵。
www.chinadaily.com.cn
7.
Mr. Murdoch's wife, seated behind, leaped to her feet and defended her husband with an open-palmed slap at the attacker.
坐在他身后的妻子猛地站起来,打了袭击者一巴掌,保护了默多克。
cn.wsj.com
8.
As he charges inside the attacker's defenses and positions himself too close to be kicked, he can easily disrupt the other man's balance.
当他冲入进攻者的防御圈子,位置极近,无法被踢,他能够轻易地破坏对手的平衡。
apps.hi.baidu.com
9.
He wrestled with his attacker until he kicked his feet under him and he fell to the ground.
他与袭击者搏斗,直至从他身下踢他的脚把他踢倒在地。
sdb.ustsd.edu.cn
10.
Social Engineering is the tricking of an unsuspecting administrator into giving the account ID and passwords over to an attacker.
社交工程是哄骗一个毫无疑虑的管理员向攻击者说出帐户标识和密码的欺骗方法。
www-128.ibm.com
1.
Ten minutes later, he said, when police entered the house, the attacker had committed suicide.
他说,10分钟后,当警察进入这幢房子时,行凶者已经自杀了。
c.wsj.com
2.
my attacker threatened me with a gun.
攻击我的人用枪威胁我。
beike.dangzhi.com
3.
Otherwise , an attacker with the key will be able to completely masquerade as the principal .
否则,得到密钥的攻击者完全可以伪装成主体。
www.bing.com
4.
He finally managed to break free from his attacker.
他终于设法摆脱了袭击他的人。
5.
Accounting logs alone solve many password cracking problems by forcing an attacker to be held accountable, authenticated and authorized.
单独计算登录数通过强制攻击者保持可计帐的、被认证及被授权,从而解决了许多密码破解问题。
www.ibm.com
6.
Talk to your attacker and try to make a connection with your attacker.
跟你的攻击,并试图提出一个与你的攻击。
www.tianxiawuji.cn
7.
Caton said the attacker boarded the bus in Brandon, Manitoba, about 80 miles west of Portage La Prairie.
卡顿称凶犯是在距波提普雷里大概80英里以西马尼巴托省的布兰登上车的。
www.bing.com
8.
In case it this information is intercepted by an attacker, it can be used to reveal vulnerabilities in the computer's security system.
在这种情况下,被攻击者截获的信息,它可以用来显示在计算机的安全系统漏洞。
bbs.kafan.cn
9.
Even if your servlet URLs are secured, an attacker may be able to bypass the normal URL-based security.
即使您的ServletURL是受保护的,攻击者也可能绕过正常的基于URL的安全性。
www.ibm.com
10.
Moreover, an attacker cannot be sure what effect an assault will have on another country, making their deployment highly risky.
此外,袭击者无法肯定攻击对其他国家会产生什么影响,因此使用它们极其危险。
www.ecocn.org
1.
This guard will only be taken in cases of emergency. It is always preferable to circle and receive the attacker on the right or right front.
这个防卫姿势只在紧急情况下使用,应尽可能转圈使敌人处在右边或者右前方。
www.knifriend.sh.cn
2.
The Attacker tries to undermine you and block the efforts of the group or department from achieving its goals.
“攻击者”总是暗中反对你,并阻止团队或部门达成目标。
www.bing.com
3.
But once an attacker can run code on such a machine, the attacker instantly attains complete control.
但是,一旦攻击者可以在这样的机器上运行代码,就可以立即获取完全控制。
www-128.ibm.com
4.
The attacker may obtain such a list by performing a simple ping sweep using any number of freeware tools, such as Angry IP scanner or Nmap.
攻击者可能使用多种免费软件工具(如AngryIPscanner或Nmap)执行一个简单的ping扫描,以获得一个列表。
www.ibm.com
5.
The attacker rammed a pickup into a police station in Lakki Marwat town, in Khyber Pakhtunkhwa province.
在KhyberPakhtunkhwa省,袭击者加速冲进LakkiMarwat镇的警察局。
bbs.ebigear.com
6.
This protects the key from being accessed by an attacker and rendering your encryption useless.
这一方面可以防止密钥遭到攻击者的访问,另一方面也可以避免使您的加密变得无用。
msdn2.microsoft.com
7.
Now the attacker can enter into the system as the administrator and not even have to give a legitimate password.
现在黑客可以以管理员的身份进入系统并且不用不得不给出合法的密码。
www.ibm.com
8.
The sophisticated attacker finds a weakness in a similar type of software, and tries to use that to exploit the system.
富有经验的攻击者可以发现同类软件的缺点,并且尝试利用这些弱点来进入系统。
www.ibm.com
9.
The use of these tools will not solve systemic problems, but will eliminate the "paths of least resistance" that an attacker could exploit.
这些工具的使用不会解决体制问题,但至少会消除的“路径抵抗”,攻击者可以利用。
blog.sina.com.cn
10.
The program allows an attacker to include characters that change the meaning of that SQL command.
这个程序允许攻击者包括可以修改SQL命令意义的字符。
www.ibm.com
1.
Users can unknowingly execute malicious scripts when viewing dynamically generated pages based on content provided by an attacker.
当用户查看基于攻击者提供的内容而动态生成的页面时,他们会不知不觉地执行恶意脚本。
www.ibm.com
2.
The woman frightened off the attacker by calling out to the policeman .
那个女人大声朝警察喊,,把袭击者给吓跑了。
www.qeto.com
3.
The attacker was described by the police as a heavy-set black man in his 20s, about 5 feet 8 inches tall and weighing about 200 pounds.
据警方描述,嫌疑犯是一名20多岁的黑人男子,高约5英尺8英寸,重约200英镑,身材偏胖。
treasure.1x1y.com.cn
4.
The attacker ran at them, Mr Caton said, and they ran out of the bus, holding the door shut to prevent him getting out.
袭击者朝他们冲过来,Caton说。然后他们逃出大巴,关紧了门不让凶手跑出来。
www.bing.com
5.
Media reports often just note an attacker was said to be "suffering from mental illness, " with little detail or background information.
媒体报道这些事件时只是说行凶者患有精神类的疾病,却没有交代一些细节问题或者相关的背景。
dongxi.net
6.
Two packets encrypted with the same IV can be decrypted if the attacker knows the plain text of one of them.
如果攻击者知道两个用相同IV加密的信息包之一的明文,就可以对这两个信息包进行解密。
www-128.ibm.com
7.
Dreams increasingly become more violent and frequently involve episodes in which an attacker must be fought off.
梦变得越来越暴力,频繁地涉入某些与攻击者作战的情节。
www.bing.com
8.
Your safety should be your primary concern, and hitting an attacker in a sensitive spot should give you enough time to run away.
你的安全着想,应你的首要关注的问题,击中攻击者在一个敏感点应该给你足够的时间跑开。
www.tianxiawuji.cn
9.
preferring to close down the attacker and force them into a mistake.
而进入他们的攻击者和关闭力成一个错误。
bbs.winning11cn.com
10.
Like suicide notes, manifestos often portray the attacker's actions as the only logical -- and even heroic -- act that they could choose.
就象自杀遗言,这类声明通常描述袭击者的行动,称这是他们唯一能选择的逻辑行为,甚至为极端英勇的行为。
www.bing.com
1.
Cyber attack behavior analysis techniques can be roughly classified as network-oriented analysis and attacker-oriented analysis.
现有攻击行为分析技术大致可以分为“面向网络”和“面向攻击者”两类。
www.ceaj.org
2.
When an attacker introduces a malicious script to a dynamic form submitted by the user, a cross-site scripting (XSS) attack then occurs.
当攻击者向用户提交的动态表单引入恶意脚本时,就会产生跨站点脚本(XSS)攻击。
www.ibm.com
3.
This method severely limits the ability of an attacker to compromise the integrity of a DNS server.
这将大大限制攻击者泄露DNS服务器完整性的机会。
yeebang.com
4.
If an attacker entered a Logon command with a particular deformity, it would cause the Telnet service to fail.
如果攻击者输入了某种变形的登录命令,它将导致Telnet服务失败。
www.microsoft.com
5.
She struggled to get away from her attacker.
她努力想摆脱那个侵犯她的人。
dict.hjenglish.com
6.
The product contains two unchecked buffers through which an attacker could cause code of their choice to run on another users machine .
该产品中包含两个未检查的缓冲区,攻击者可以通过它们在其他用户的计算机上运行他们选定的代码。
www.bing.com
7.
This introduces the possibility of those servers being used to serve an attacker's payload.
这样就存在这种可能:攻击者可能会利用这些服务器。
www.infoq.com
8.
After an application on a Web site is known to be vulnerable to cross-site scripting, an attacker can formulate an attack.
当攻击者知道某一网站上的应用程序易受跨站点脚本编制攻击后,他就可以规划攻击。
www.ibm.com
9.
When possible, make sure that the data you send won't be controlled by an attacker.
只要可能,请确保您发送的数据不会受到攻击者的控制。
www.ibm.com
10.
A vulnerability that could enable an attacker to make his or her Web site appear to be a different site.
一个漏洞,该漏洞使攻击者可以让他或她的Web站点看起来如同是另一个站点。
www.microsoft.com
1.
Your application might need a few more, but limit them -- don't accept data from a potential attacker unless it's critically needed.
您的应用程序可能还需要更多,但是要限制它们——除非是特别需要,否则不要接受潜在的攻击者的数据。
www.ibm.com
2.
Provided the host legally belonged to the attacker, we could obtain his identity from his ISP.
提供的主机法律上属于攻击者,我们可以从他的ISP获得他的标识。
www.showxiu.com
3.
In practice, each player chooses a corner from the attacker to the target; if either can determine that there is no cover, then none exists.
实际上,可由任意玩家来选择一个角落作为攻击者的起点连线至目标,如果无法决定是否有掩护存在,那麽掩护就不存在。
114.32.73.189
4.
That said, an attacker might prefer to go after unclassified military logistics supply systems, or even the civilian infrastructure.
尽管如此,攻击者可能还是更喜欢攻击这种非机密的军方后勤补给系统,甚至是民用基础设施。
www.ecocn.org
5.
Bravely, Linor went on to press charges against her attacker, an Israeli travel agent whom she had asked to book a flight to Rome.
林诺随即勇敢地对袭击她的人提出强烈控诉,凶手是以色列旅行社的一名工作人员,她曾向他预订去罗马的机票。
www.hotdic.com
6.
Whenever the in-house attacker appears to be making progress, the team responds by adding new distortions to the puzzles.
一旦这个内部攻击者有进展的迹象,该团队便对测验增加新的变形方式。
www.ecocn.org
7.
As the name suggests, the attacker opens the connection only halfway.
顾名思义,攻击者只是部分地打开连接。
www-128.ibm.com
8.
These servers are closely monitored, and any access by an attacker is detected.
这些服务器是被严密监控的,黑客的任何访问都会被探测。
www.ibm.com
9.
The attacker simply goes to a workstation and tries to attack the IIS server with an HTML editing tool.
攻击者只要转至工作站并尝试使用HTML编辑工具攻击IIS服务器。
www.ibm.com
10.
Rampaging monsters fear a knight above almost any other attacker.
一只狂暴怪物害怕一个骑士的程度甚至超过了其他人。
ellesime.anetcity.com
1.
Victims must also be protected if the accused attacker is still in school with them.
被害人也必须得到保护,如果被告攻击者仍然在与他们的学校。
www.maynet.cn
2.
The class was curious what technique she had used to take down her attacker.
同学们都想知道她用哪一招放倒了进攻者。
www.ibm.com
3.
Even if an attacker broke into a game program, all he could do would be to change the score files.
即使攻击者攻击并进入了一个游戏程序,所有他能做的事情将是修改分数文件。
www.ibm.com
4.
Kaka is an attacker like the other two who should play more forward.
卡卡是一名攻击型球员,和其它两名更为靠前的前锋一样。
www.milanchina.com
5.
The fewer characters you accept, the more difficult you make it for an attacker.
您接受的字符越少,您给攻击者制造的难度就越大。
www.ibm.com
6.
When attacked from the side, the crickets stridulated and tried to bite their attacker.
当从侧边进攻时,蟋蟀会发出鸣叫声,并且试图去咬进攻者。
www.bing.com
7.
Suppose an attacker makes a guess that the name of the first sub-node in the XML document is loginID and wants to confirm it.
假设攻击者猜测XML文档中第一个子节点的名称是loginID并且想要确认一下。
www.ibm.com
8.
only fifteen feet away , outside the sealed gate , the mountainous silhouette of his attacker stared through the iron bars.
在封闭的门外,仅十五英尺远的地方,侧影高大的攻击者正透过门上的铁栏杆盯着里面。
www.ichacha.net
9.
The attacker then has the malicious script run with the privileges of a legitimate script originating from the legitimate Web server.
然后攻击者就可以使用源自合法Web服务器的合法脚本的特权运行恶意脚本。
www-128.ibm.com
10.
If you use chatty error messages, then they could disclose secrets to any attacker who dares to misuse your software.
使用口语化的错误消息会给那些想滥用你的软件的攻击者泄露秘密。
blog.chinaunix.net
1.
The attacker then calls a customer service representative at the site, posing as the shopper and providing personal information.
攻击者接下来在网站上调用客户服务,作为购物者登录并且提供个人信息。
www.ibm.com
2.
If the victim was logged in to Google Mail, the attacker would change the filters to forward all e-mails to his e-mail address.
如果这个受害者登陆到GoogleMail,攻击者会改变过滤器设置将他的所有邮件转发到攻击者的邮箱里。
www.bing.com
3.
Others can originate with well-intentioned code that has been exploited by an attacker.
其他攻击可能源自被攻击者利用的善意代码。
technet.microsoft.com
4.
A common scenario is that the attacker calls the shopper, pretending to be a representative from a site visited, and extracts information.
一个常见的场景是攻击者打电话给购物者,假装是购物者所访问站点的代表,并且提取信息。
www.ibm.com
5.
c. The attacker's primary focus is to summon all of his mental and physical power to suddenly explode onto the target.
角攻击者的首要重点是召唤他的精神和体力上突然爆炸的目标的。
club.pchome.net
6.
The attacker has been arrested, but has not been identified. He is of Norwegian origin, Andersen said.
袭击者已被逮捕,但还没有确认身份,但可以肯定的是他是一名挪威人。
www.bing.com
7.
The attacker cannot access all the packets of a request and cannot decipher what message was sent.
攻击者不能访问一个请求中所有的包,也就不能破译发送的消息。
www.ibm.com
8.
The only requirement is that the attacker must have authentication and authorization privileges over Bluetooth.
唯一需要的就是攻击者必须介由蓝牙系统拥有授权和验证权限。
www.bing.com
9.
The user may be prompted to click on the link and log on to the Web site, whereby the attacker can seize the user's log on information.
用户可能会被提示单击此链接并登录到该站点,攻击者会借此获得用户的登录信息。
www.ibm.com
10.
So, the script sends the user's cookies to the attacker's site where the attacker gain all the information needed to wreak havoc.
总之,此脚本将用户的cookie发送给攻击者的网站,在该网站攻击者可以获得进行破坏和攻击所需的全部信息。
www.ibm.com
1.
Her husband Elwy Okaz, 32, was also repeatedly stabbed before being shot by a police officer who mistook him for el-Sherbini's attacker.
她的丈夫ElwyOkaz,32岁,亦身中数刀,后又被警察疑为攻击者惨遭射伤。
www.bing.com
2.
If the attacker sits in the middle of the network, then within the scope of the Internet, this attack becomes impractical.
如果攻击者在网络的中间,在Internet范围内,这种攻击是不可行的。
www.ibm.com
3.
The attacker then asks for the password to be reset to a specific value.
攻击者接下来将密码重新设置为特定的值。
www.ibm.com
4.
An attacker could replace the contents of the hidden cell with a different computer name and get the SA password.
攻击者可使用不同的计算机名称替换隐藏单元格的内容,并获取SA密码。
msdn2.microsoft.com
5.
She was able to identify her attacker.
她能够认出袭击她的人。
www.tingroom.com
6.
That will let the attacker control internal data and possibly take over the program.
这样可以让攻击者控制内部数据,甚至控制整个程序。
www.ibm.com
7.
This flaw could allow arbitrary code to run when a user opened a specially crafted document from an attacker.
当用户打开由攻击者特殊制作的文档时,该缺陷可导致任意代码执行。
www.microsoft.com
8.
The attacker can, however, arbitrarily add delay by stalling each acknowledgment a little while before transmission.
可是,攻击者通过在传输之前使每个应答阻塞一小段时间就可任意增加延迟。
www.ibm.com
9.
Grabbing Weinstein by the jaw , the attacker told her he had a gun and forced her into the Camry .
这名歹徒抓着温斯坦的下巴,告诉他,他有枪,强迫她进入车里。
www.bing.com
10.
that do not reveal stack traces or database dumps can potentially aid an attacker.
甚至没有显示堆栈信息或者数据库的摘要错误信息会隐含的帮助攻击者。
www.51testing.com
1.
Police are investigating whether the drugs found in bath salts were in the alleged attacker's system.
警方正在调查,“浴盐”中含有的毒品是否出现在犯罪者的体内。
www.chinadaily.com.cn
2.
An attacker can use the vulnerability to gain control of a person's computer when the victim clicks on a simple Web link.
用户只需简单地点击某个网络连接,攻击者就能取得用户电脑的控制权。
dream4ever.org
3.
With this, an attacker could have access to phone numbers, photos, and other data, as well as upload malicious code to the handset.
通过这样,攻击者就能获知手机号码、照片以及其他数据信息,还可以向手机上传恶意代码。
www.bing.com
4.
Media reports from Germany claim that Juventus are lining up a bid for highly rated Borussia Dortmund attacker Mladen Petric.
德国媒体报道说,尤文图斯已经与这位排名积分榜前列的多特蒙德射手取得了联系。
www.bing.com
5.
Only a creature that threatens the defender can help an attacker get a flanking bonus.
攻击者对侧的队友,其威胁区域必须涵盖该敌人,才能形成夹击。
bbs.jlsd.net
6.
An identified security issue in Microsoft DirectX could allow an attacker to run programs on a computer running Microsoft Windows 2000.
MicrosoftDirectX中的一个已知的安全问题使攻击者得以在运行MicrosoftWindows2000的计算机上运行程序。
www.microsoft.com
7.
The vulnerability could allow enable an attacker, under very unusual conditions, to read fragments of files from a web server.
在某些相当特殊的情况下,该漏洞使攻击者能够从Web服务器上读取文件片段。
www.microsoft.com
8.
An attacker could simply pre-create likely files, or repeatedly create and uncreate them, and eventually take over the program.
攻击者可以简单地预创建类似的文件,或者反复创建和删除它们,最终接管程序。
www-128.ibm.com
9.
Think of a situation where an attacker has stolen a user's session cookie and thus may co-use the application.
想想这种情况,一个攻击者窃取了一个用户的sessioncookie,因此他们可以共用同一个应用。
www.bing.com
10.
Molten Armor will not deal damage to an attacker if the mage is protected by a damage absorption shield.
在身上有伤害吸收护甲的时候,法师的熔岩护甲不造成伤害。
bbs.ngacn.cc
1.
Now an attacker (external or internal) needs to compromise only a single system to get access to all master data.
现在,攻击者(外部或内部)仅需入侵一个系统就可以访问所有主数据。
www.ibm.com
2.
Keys can especially do a lot of damage: If an attacker comes at you, scratch his face or jab at his eyes with the keys.
钥匙也会造成很多的伤害:如果攻击者靠近你,你就可以用钥匙刺向他的脸部或眼睛。
www.bing.com
3.
In order for the forgery to be useful (in the most common sorts of attack), the attacker needs to receive those responses.
为使伪造的地址起作用(在最常见的攻击类型中),攻击者机器需要接收那些响应。
www.ibm.com
4.
The woman fought off the attacker with her pen.
被袭击的妇女用自己的钢笔反击才得以挣脱。
bbs.putclub.com
5.
The highly-rated attacker was close to joining Auxerre last summer, while Chelsea and Valencia are admirers of the 21-year-old.
这名备受瞩目的攻击手去年夏天一度与欧塞尔走的很近,与此同时,切尔西和瓦伦西亚也很欣赏这名21岁的小将。
bbs.arsenal.com.cn
6.
That's probably exactly how he wanted to be seen. Do your headlines, for instance, glorify the attacker?
那可能正是他希望人们看到的,比如,那些新闻提要是否让袭击者显得荣耀呢?
www.bing.com
7.
Although this example demonstrates an SQL injection in its simplest form, you can see just how easy it is for an attacker to use.
尽管本例以最简单的形式演示了一个SQL注入,但是您可以看出攻击者利用SQL注入有多么容易。
www.ibm.com
8.
While it doesn't guarantee that data has not been forged, it does require an attacker to guess the right kind of forging.
不过这不能保证变量未被伪造,这需要攻击者去猜测应该怎样去伪造。
us.php.net
9.
By forging these cookies, an attacker can impersonate a valid client, and thus gain information and perform actions on behalf of the victim.
通过打造这些cookie,一个黑客可以模拟一个有效的客户,因此获取详细信息并执行代表病毒的行为。
www.ibm.com
10.
CSKA Moscow attacker Milos Krasic will not be moving to Liverpool in the summer, according to his agent.
据他的经纪人透露,莫斯科CSKA进攻手米洛斯-卡拉西奇将不会夏天转会利物浦。
lfcbbs.fans1.com
1.
Banker. FJI cannot spread automatically using its own means and therefore, needs an attacker to distribute it.
FJI不能自动传播,因此攻击者得自己散播该木马。
cjw8082.blog.163.com
2.
By passing 154 characters into a 128 character buffer, an attacker can set a new password for sa without knowing the old password.
通过向128个字符的缓冲区传递154个字符,攻击者便可以在不知道旧密码的情况下为sa设置新密码。
msdn2.microsoft.com
3.
The boy was forced to tell the attacker his own address.
那男孩被迫把自己的地址告诉歹徒。
bbs.ebigear.com
4.
They make it easy for an attacker to determine the key.
因为这些函数让攻击者很容易就可以判断出密钥。
www.ibm.com
5.
An attacker could also set up a remote network share, and place the malicious components on this share.
攻击者还可以设置远程网络共享,并将其放置在该共享的恶意组件。
apps.hi.baidu.com
6.
The attacker must simultaneously make a Will save against the original mind blast DC and can use no defense modes.
攻击者必须按自己发动的“心灵爆破”的DC进行意志豁免,而且无法启用心灵防御模式。
www.showxiu.com
7.
Report this crime to the police right away and give your best description of the attacker.
事后立即向警察报告,并尽可能详细地描述劫犯的特征。
www.defedu.com
8.
An attacker advances against you, Nineveh. Guard the fortress, watch the road, brace yourselves, marshal all your strength!
尼尼微啊,那打碎邦国的上来攻击你。你要看守保障,谨防道路,使腰强壮,大大勉力。
new.fuyinchina.com
9.
The dossier includes the interrogation of the one surviving attacker, intercepted communications, and the evidence of their weaponry.
这份档案包括一名生俘的袭击者的口供、截获的往来通信和袭击所用的武器实物。
www.bing.com
10.
So if the attacker can't be found, then the certainty of retaliation dissolves, and deterrence might not be possible.
所以说,如果不能找到袭击者,那么报复行为的肯定性就不复存在,于是,防御就毫无用处。
www.bing.com
1.
A Chinese Internet security center is accusing the United States of being the biggest attacker of China's Internet.
中国互联网安全中心指责称,美国是中国互联网的主要攻击源。
www.kekenet.com
2.
Acceding to pressure from China, the Security Council managed to condemn the attack without identifying the attacker.
屈从于中国的压力,安理会将设法对这一攻击行为进行谴责,但不对具体攻击者进行确认。
www.ecocn.org
3.
The attacker was later subdued by the police, and no one died.
这次攻击后来被警察所制服,没有人死亡。
www.bing.com
4.
Highly rated attacker Cleo is on the verge of leaving Serbian powerhouse Partizan Belgrade for an adventure with Chinese outfit Guangzhou.
评价颇高的前锋克莱奥即将离开塞尔维亚豪门——贝尔格莱德游击队,即将开始在中国球队广州恒大的冒险。
tieba.baidu.com
5.
If a user's Kerberos password is stolen by an attacker, then the attacker can impersonate that user.
如果一个用户的Kerberos密码被攻击者窃取,攻击者就能够模拟该用户。
www.ibm.com
6.
If it is easy to change the password, the attacker will hijack the account with a few clicks.
如果这个应用可以很容易就修改了密码,那么攻击者只需要几个鼠标点击就劫持了这个用户的帐号。
www.bing.com
7.
Since the user may be an attacker, we need to validate the locale value.
由于用户可能是一个攻击者,我们需要对本地化参数值进行验证。
www-128.ibm.com
8.
In Malpas's film Gulnaz says she would never forgive her attacker but adds that she would consider marrying him.
在美佩斯的纪录片里,Gulnaz说她绝对无法原谅那个强奸犯,但她也补充道,她会考虑嫁给他。
www.bing.com
9.
This attacker will not be expecting to be attacked.
这种攻击不会受到预期的攻击。
www.tianxiawuji.cn
10.
Police have issued an artist's impression of her attacker.
警方公布了袭击她的人的模拟像。
1.
An attacker can potentially exploit this extended processing attribute by looking for relatively short processing times.
攻击者通过查找相对简短的处理时间,有可能会利用这个延长的处理属性。
www.ibm.com
2.
Intrusion may be come from unauthorized system attacker, may be from authorized user to overstep his authority.
入侵可能是来自互联网的攻击者对系统的非法访问,也可能是系统的授权用户对未授权的内容进行非法访问。
www.jukuu.com
3.
Do not fight back as this might provoke your attacker to cause you harm.
不要跟劫犯打斗,因为这样会激怒他反而给你造成伤害。
www.defedu.com
4.
As the attacker prepares to deliver a kick to the head, Tony Blauer positions his arms to intercept the leg (left photo).
当攻击者准备出脚踢头时,托尼。布莱尔用双臂准备阻截对手的腿(左侧图片)。
www.wubei.com
5.
Regardless of the method of error handling, the ability to probe a system for errors leads to providing an attacker with more information.
不管错误处理机制如何,可以探测系统错误的能力会给攻击者提供更多信息。
sg.php.net
6.
An attacker won't be able to take over your PC, but could knock it offline.
攻击者没可能控制你的电脑,但可以让你的电脑瘫痪。
dream4ever.org
7.
Of course, a real attack would consist of sending these cookies to the attacker.
当然,真正的恶意攻击包含了将这些cookies发送给黑客的操作。
www.ibm.com
8.
Basically, if an attacker can overflow the bounds of a buffer, you're probably in trouble.
基本上,如果攻击者能够溢出缓冲区的边界,麻烦或许就会找上你了。
www.ibm.com
9.
open to the objection common to all forms of attack with the raised arm , in that they leave the attacker wide open.
手臂轮起时,对所有形式的攻击都露出破绽,使得攻击者门户大开。
www.ichacha.net
10.
The attacker should consider and combine multiple various attacking skills and do stepwise attacking to approach the objective.
攻击方需要组合多种不同的网路攻击手法、阶段性的攻击,逐步完成攻击目标。
dictsearch.appspot.com
1.
The attacker can besiege the players and their resources with various damaging or benign schemes that result in system exploitation.
攻击者可以通过各种破坏和围攻手段来围攻参与者和他们的资源,达到破坏系统的目的。
www.ibm.com
2.
Starfish know oneself always aimed at the attacker, unexpectedly is relative, filled with remorse.
海星知道自己一直针对攻击的人,竟是至亲,后悔不已。
www.yc55.cn
3.
Alternatively, the attacker sends emails spoofed to look like they came from legitimate sites.
同时,攻击者发送看起来好像来自合法站点的邮件。
www.ibm.com
4.
A vulnerability exists in Microsoft Office 2000 that could allow an attacker to run arbitrary code on a users system.
MicrosoftOffice2000中存在一个漏洞,该漏洞可能允许攻击者在用户系统上运行任意代码。
www.microsoft.com
5.
This will logically result in a query that always returns true and will always allow the attacker to gain access.
这个字符串会在逻辑上使查询一直返回true并将一直允许攻击者访问系统。
www.ibm.com
6.
He's the prototype of the perfect attacker: He has speed, strength and a good shot.
他有着完美射手的标准,有速度,有技术,射门技术也很好。
www.milanchina.com
7.
Any attacks done to you or your party will cause the attacker to be afflicted by sleep for 20 sec.
任何对你和你小队的攻击都将使攻击者陷入睡眠,持续20秒。
k88.net
8.
However, unless you use a Java obfuscator, an attacker might reverse-engineer the application, thereby discovering the keys.
不过,除非您使用Java模糊处理(obfuscator),否则攻击者可能对应用程序实施反向工程,从而发现密匙。
www.ibm.com
9.
Alternatively, the attacker can simply modify the data in the worksheet such that, when sent to the victim, it behaves unexpectedly.
或者,攻击者可以简单地在工作表中修改数据,这样,当文档发送给受害者时,将发生异常行为。
msdn2.microsoft.com
10.
Port scanning usually happens for TCP ports, which are connection-oriented and therefore give good feedback to the attacker.
端口扫描通常是TCP端口,这是面向连接的,因此把好反馈给攻击者的情况。
wenku.baidu.com
1.
That approach simply won't produce secure code, because you can't create enough tests to represent all the odd things an attacker can do.
这种方法根本不会产生安全的代码,因为您无法创建足够多的测试来涵盖攻击者能做到的所有稀奇古怪的事情。
www.ibm.com
2.
The attacker ran away after firing bullets at the garrison guard and robbing his submachine gun, according to the police.
警察说,袭击者在向部队守卫射击几发子弹后掳走哨兵的冲锋枪,并迅速逃离。
www.bing.com
3.
The vulnerability could, under certain conditions, allow an attacker to gain complete control over an affected machine.
该漏洞会在某些情况下使攻击者对受影响的计算机进行控制。
www.microsoft.com
4.
Another possible password cracking attack is when an attacker tries to obtain passwords via Social Engineering.
另一个可能的密码破解攻击是攻击者尝试通过社交工程(SocialEngineering)获取密码。
www.ibm.com
5.
Use these spots and hit your attacker as hard as you can.
利用这些景点,并击中攻击你的努力,你可以这样做。
www.tianxiawuji.cn
6.
Keep in mind that a more advanced attacker will use port scanning to uncover information for a later effort.
注意,高级的攻击者将利用端口扫描挖掘信息。
www.ibm.com
7.
Typically, an attacker lures victims into clicking on the URL, as shown in Listing 2.
通常,攻击者会诱使受害者单击URL,如清单2所示。
www.ibm.com
8.
Shakti coolly sidestepped the thrust and jabbed her pitchfork forward , stabbing through her attacker's uplifted arm .
沙克提冷静的避开突击,三叉戟前刺,戳透攻击者高举的手臂。
www.bing.com
9.
This will always result in a match so that the attacker gains entry to the system.
这个条件会一直匹配,因此攻击者可以进入系统。
www.ibm.com
10.
No punishment had been given, but the attacker had been ignored and the victims rewarded.
没有做出处罚,但是攻击者被忽视而受害者得到了奖赏。
zhidao.baidu.com
1.
Would we be so shocked in James had batted away the pie-plate attacker?
而我们能否会对默多克儿子詹姆斯击退攻击者感到震惊呢?
www.bowwin.com
2.
The attacker then sends a packet full of SACK options designed to force the other host to scan that entire queue to process each option.
然后攻击者发送一个充满SACK选项的包,目的是使另一方主机扫描整个队列以处理每个选项。
www.ibm.com
3.
He frightened off his attacker by calling for the police.
他一喊警察就把袭击他的人吓跑了。
www.hotdic.com
4.
Schools have even been buying large steel pitchforks, specifically designed to keep an attacker at bay, from online auction sites.
有的学校甚至从在线拍卖网站上购买了专门阻止袭击者的大型钢叉。
dongxi.net
5.
Extending2 its tentacles, the attacker strips its enemy clean, leaving only a bone-white chunk of dead limestone.
攻方伸出触手,将敌人剥得精光,只留下一块白骨般的死石灰石。
edu.163.com
6.
Causes 10% of the damage absorbed by your power word : shield to reflect back at the attacker , this damage causes no threat .
将由你的真言术;盾所吸收伤害的10%反馈给攻击者,反射造成的伤害不制造仇恨。
www.bing.com
7.
I saw huge fireballs being cast from the attacker's ship, totally engulfing the Barracuda within minutes.
我看到巨大的火球从攻击的船中发射了出来,在几分钟内就完全吞噬了银色梭鱼号。
dictsearch.appspot.com
8.
Effect : Defense bonus , plus any melee attacker that hits you takes damage and is slowed .
作用:增强防御,使任何近身攻击的敌人受到伤害并减速。
www.bing.com
9.
The collected data is then surreptitiously sent to the remote attacker via a variety of electronic means.
所收集的数据,然后悄悄地发送到远程攻击者通过各种电子手段。
bbs.winzheng.com
10.
Gilardino knows the pivot art, he knows what to do with a short assist, there is no better attacker to play with his shoulders to the goal.
吉拉迪诺还知晓支点艺术,他知道怎么短传,没有哪个前锋比他会用肩膀进球。
www.milanchina.com
1.
An attacker can try to insert text that will be interpreted by the component to do something that you (the developer) didn't intend.
攻击者可能试图插入一些文本,组件会对这些文本进行解释,从而执行一些您(或开发人员)所不希望的操作。
www.ibm.com
2.
For instance, this issue could allow an attacker to view information about your Windows Media Player Media Library and modify it.
例如,此问题可能使攻击者查看有关您的WindowsMediaPlayer媒体库的信息并修改它。
www.microsoft.com
3.
Hasan Salihamidzic. Rumours suggest that they have also reached an agreement with Barcelona attacker Javier Saviola.
另外,据传闻,他们已经与巴塞罗那的攻击手。
www.11players.net
4.
With the exception of the Foshan attacker, who was in his 20s, the assailants have all been middle-aged men.
除了佛山的那名袭击者只有20多岁以外,其余的凶手清一色全是中年男子。
dongxi.net
5.
We played well with two attackers as well as with one attacker, so not much changes.
我们适用双前锋和圣诞树都很合适,因此不会有太大变化。
www.milanchina.com
6.
Even parameterized data can be manipulated by a skilled and determined attacker.
一个有经验的、坚定的攻击者甚至可以操作参数化数据。
msdn2.microsoft.com
7.
This information will help us build a picture of his attacker.
这条信息将有助于描画出袭击他的人的相貌。
8.
The first scenario looks at a situation in which a disgruntled employee is the attacker.
第一种方案研究的是攻击者是心怀不满的雇员的情况。
www.ibm.com
9.
The attacker can use tools such as Nessus or any number of utilities to perform such a scan.
攻击者可以使用Nessus和其他多种工具执行扫描。
www.ibm.com
10.
However, the attacker may also take over the account by changing the e-mail address.
然而,攻击者也可以通过修改email地址来接管帐户。
www.bing.com
随便看

 

英汉双解词典包含2704715条英汉词条,基本涵盖了全部常用单词的翻译及用法,是英语学习的有利工具。

 

Copyright © 2004-2022 Newdu.com All Rights Reserved
更新时间:2025/6/1 11:18:26