单词 | 入侵者 | ||||||||||||||||||||||||||||||||||||||||||||||||
释义 | 入侵者—intruder入侵者noun—invadern侵入者—intruder(often used)less common: invader Examples:侵入家宅者—burglar housebreaker See also:入侵n—invasionn intrusionn incursionn invasionspl 侵入n—intrusionn ingressn 侵入adj—invasiveadj intrusiveadj 侵入—invade trespass intrude into gain unauthorized access (computing) make (military) incursions
|
此外,入侵者布下的地雷、被摧毁或拆毁的工业设施,都极大地破坏了环境并造 成大量严重疾病。 daccess-ods.un.org | Moreover, the invaderslaid mines and [...] destroyed and dismantled industrial plants, causing huge damage to the environment [...]and a number of serious illnesses. daccess-ods.un.org |
在此情况 下,向前行进时请加倍小心,因为入侵者可能仍然在保护区域内。 scottsecurity.ca | In this instance, you should approach with [...] caution, as the intruder maystill be within [...]the building/premises. scottsecurity.ca |
然而WPS的漏洞可利用暴力攻击去攻破,当WPS的密码被入侵者破解,入侵者便可以控制无线存取点。 hkcert.org | However WPS is vulnerable by brute force attack, Once the WPS PIN was discovered by intruders, they can take control of the wireless AP. hkcert.org |
咨询教授Kipple的行星,陆军总Grawl(加里·奥德曼)(约翰·克里斯)“外来入侵者”。 zh-cn.seekcartoon.com | Planetary Army General Grawl (Gary Oldman) consults Professor Kipple (John [...] Cleese) about the “alien invader. seekcartoon.com |
藉由在交换 [...] 器层级建立弹性且可客制化的安全基础架构,Alcatel-Lucent 让安全功能广布於 网路的所有角落,亦让入侵者无隙可趁。 phitech.com.tw | By creating a flexible customizable security infrastructure at the [...] switch-level, Alcatel-Lucent distributes security functions to all corners of the [...] network leavingno backdoorfor intruders. phitech.com.tw |
无代表国家及民族组织称,叙利亚不是1951 年《关于难民地位的公约》的 [...] 缔约国,在该国的难民被当作贵宾、游客或非法入侵者。daccess-ods.un.org | According to UNPO, as Syria is not party to the 1951 [...] Convention relating to the Status of Refugees, refugees within the country are treated as guests, [...] tourists, or illegalintruders. daccess-ods.un.org |
在其 2010 年 4 月 22 [...] 日的判决中,欧洲人权法院达成了关于霍贾里镇大屠杀 的重要结论,即把入侵者的所作所为定性为“可能构成战争罪或危害人类罪的特 [...]别严重的行为”。 daccess-ods.un.org | In its judgement of 22 April 2010, the European Court of Human Rights arrived at an important conclusion with respect to the massacre in the town of [...] Khojaly, qualifying the behaviour of those [...] carrying out the incursionas“acts of particular [...]gravity which may amount to war [...]crimes or crimes against humanity”. daccess-ods.un.org |
方丈Cellach,建立一个强大的壁保持劫掠的维京入侵者破坏了早期基督教的凯尔斯修道院的痴迷,希望他的小侄子布伦丹跟随他的脚步。 zh-cn.seekcartoon.com | Abbot Cellach, obsessed with building a mighty wall to keep marauding Viking raiders from destroying [...] the early-Christian [...]Abbey of Kells, expects his young nephew Brendan to follow in his footsteps. seekcartoon.com |
Easy Series是一种操作简单、可有效防止入侵者的报警系统。 header.bosch.com.cn | The Easy Series alarm system is simple to use header.bosch.com.cn |
善用恶意骇客所使用的工具,熟练的认证道德骇客(CEH)能够探测到入侵者与系统中的弱点与漏洞。 systematic.edu.my | Utilizing the same tools as a malicious hacker, the [...] skilled Certified Ethical Hacker (CEH) is [...] able to detect intruders andthe weaknesses [...]and vulnerabilities in the system. systematic.edu.my |
通常,在小区的围墙四周设置红外多束对射探测器,一旦有非法入侵者闯入就会触发,并立即发出报警信号到周界控制器,通过网络传输线发送至管理中心,并在小区中心电子地图上显示报警点位置,以利于保安人员及时准确地处警,同时联动现场的声光报警器(白天使用)或强光灯(夜间使用) [...][...] ,及时威慑和阻吓不法之徒,提醒有关人员注意,做到群防群治,拒敌于小区之外,真正起到防范的作用。 ridanchina.com | Typically, the walls of the surrounding area in the district [...] multi-beam infrared detector on the radio, [...] once the illegal intruder broke intothe triggers, [...]and immediately send alarm signals [...]to the perimeter controller and sent to the transmission line through the network management center, and community centers Electronic alarm point location on the map, in order to facilitate timely and accurate response alarm security personnel, and linkage of sound and light alarm scene (daytime) or bright light (night use), deterrence and deter the unlawful timely to remind the officer Note that to do for prevention and treatment, keep the enemy in the area, the real play a defensive role. ridanchina.com |
又有一些公司并不禁制员工私自地建立自己的无线存取点在内部网络上,开启後门给入侵者,使安装了的防火墙和防毒闸道失效。 hkcert.org | Some companies do not control their staff [...] connecting APs to their internal network [...] which opens a backdoorto intruders andrendering [...]the perimeter firewall and internet antivirus gateway useless. hkcert.org |
它将完全防止入侵者取款或者转移您的资金到他们的账户,即使他们知道了您所有密码(“真实账户、交易账户和邮箱). roboforex.cn | It will completely prevent an intruder fromwithdrawing [...] or transferring your money to their account, even if they know all [...]passwords for your “Live Account”, trading accounts and e-mail. roboforex.com |
只要有任何一个入侵者可以同时使用你的智能卡和密码,他就可以随时使用你的私人密码匙,取用你的私人 资料或冒认你。 hongkongpost.gov.hk | It is important that you take care of your card and keep it under your control at all times. Should an attacker manage to obtain both your smart card and the PIN that protects access to your private keys, the attacker could recover your data or impersonate you. hongkongpost.gov.hk |
丰特努瓦周围的边缘围墙未起到真正防御入侵者的作用;米奥利斯也存在同样的问题。 unesdoc.unesco.org | The perimeter fencing surrounding Fontenoy, afforded no real [...] protection against intruders; the same problem [...]arose at Miollis. unesdoc.unesco.org |
防止您的文件和电子邮件服务器受到攻击、阻止未经授权的入侵者并拦截讨厌的垃圾邮件。 avast.com | Protect your file and email servers from attacks, unauthorized intruders, and annoying spam. avast.com |
我认为(把以非root权限运行的服务进行)chroot可以作为一道安全防线的原因是, 如果入侵者得到了一个非root账户,但没有使他们得到root权限的文件的话,那么他们只能对所入侵的区域造成破坏。 bsdmap.com | The reason why I consider chroot (with a non-root service) to be a line of defense is, if someone breaks in under a non-root account, and there are no files which they can use to break into root, then they can only limit damage to the area they break in. bsdmap.com |
如果入侵者试图使用“硬算”方法猜出用户名和密码来访问摄像机,在一定的失败尝试次数后,摄像机将发送警报,并自动锁定攻击 [...] IP 地址(如果需要)。 stall.goip.de | Ifan intrudershould tryto access [...] the camera using "brute force" methods to guess user names and passwords, the camera [...]send an alert and can automatically lock out the offending IP address after a certain number of failed attempts, if required. stall.goip.de |
作为创立于2010年的法国公司,TEHTRI-Security以尖端科技为立足之本,她旗下的咨询师均深谙信息入侵者所使用的技术和方法(盗用、经济情报、信息战等), [...] 并能够有力对抗当今的各种攻击威胁。 tehtri-security.com | TEHTRI-Security is a French company founded in 2010, specialising in state-of-the-art technological expertise, with consultants who [...] know, understand and master the [...] techniques andmethods of attackers(hackers,business [...]intelligence, computer warfare etc.) [...]as well as the resources needed to counter the current threats. tehtri-security.com |
尽管任何密码的密码的哈希算法(hashing [...] mechanism)在充足的时间之下,都可以被破解;我们的应用程序使用 Bcrypt 算法,入侵者如果试图以被攻破的数据库副本检索密码,个此算法将强化其困难度至最大限度。 zh-cn.howareyou.com | Whilst given an unlimited amount of time, any password hashing mechanism can be defeated; the application makes use of [...] the Bcrypt algorithm to maximize the [...] difficultythat an attacker would have in [...]retrieving passwords from a compromised copy of the database. en-gb.howareyou.com |
已经有一些改善的切实迹象,见之于土着人民、暴力受害者和以往的侵权行为,以及从体制入手增进该国的权利等方面。 daccess-ods.un.org | Real signs of improvement had been seen in the conditionsof indigenous peoples, victimsof violence and past abuses, and the institutional promotion of human rights in the country. daccess-ods.un.org |
保护社会受害者慈善社说,以色列的空中袭击和地面入侵不只是破坏了 基础设 施,而 且还造 成了包括妇女、儿童和老人在内的无辜者的生命损失。 daccess-ods.un.org | The Charitable Institute for Protecting [...] Social Victims said the implications of Israeli air strikes andground invasionsgo beyondthe destruction [...]of infrastructure [...]to the loss of innocent people’s lives, including women, children and the elderly. daccess-ods.un.org |
但是,有委员指出,必须认识到,有时可以援引豁免来避免对一国内部事 务的严重侵入,何况是官员所属国本身希望调查,并在正当的情况下起诉本国官 员,或者国家想尽快援引豁免,以免其官员陷入过分的尴尬或者痛苦。 daccess-ods.un.org | It was noted, however, that it had to be recognized that there were times when immunity may be [...] invoked to avoid the [...] possibility of a serious intrusion intothe internal affairs of a State, not to mention that the State of the official might itself wish to investigate and, if warranted, prosecute its own official or a State may wish to invoke [...]immunity quickly, in order to avoid undue embarrassment orsuffering on the part of its official. daccess-ods.un.org |
美军的撤出有助于伊拉克在巴格达主办阿拉伯 首脑会议,原因是,萨达姆 1990 年入侵科威特后与 伊拉克断绝外交关系的一些阿拉伯国家由于伊拉克 境内有外国军队而在 2003 年之后拒绝恢复其与伊拉 克的外交关系,或者拒绝在巴格达设立使馆。 daccess-ods.un.org | The withdrawal of United States forces helped [...] Iraq to host the Arab [...] summit in Baghdad as some Arab countries that severed diplomatic relations with Iraq after Saddam’sinvasion of Kuwait in 1990 refused to restore diplomatic relations with Iraq after 2003 or to open their embassies [...]in Baghdad so long [...]as there were foreign forces in the country. daccess-ods.un.org |
英汉双解词典包含2273206条英汉词条,基本涵盖了全部常用单词的翻译及用法,是英语学习的有利工具。