来赢利他的青睐或者是保护,但纵然是上帝,权力和能力也是有限的,事实上,他也许会被打败,或者攻击他的崇拜者。
To earn his favor and perhaps his protection, but even that god will have limited powers and abilities and may in fact be defeated or may turn on his devotees.
黑熊幼崽用树来防御,而经常生活在没有树的环境中的棕熊和北极熊则依靠攻击性来保护它们的幼崽。
Black bear cubs use trees for defense, whereas brown bears and polar bears, which regularly inhabit treeless environments, rely on aggression to protect their cubs.
穆萨维力劝他的支持者远离广场以“保护生命”,避免遭受支持内贾德的群众和民兵的攻击。
Mousavi urged his supporters to stay away from the square "to protect lives" and avoid being attacked by supporters and militias supporting Ahmadinejad.
应用的设计和开发人员必须负责提供这种保护,因为SOAP -DSIG未对这种攻击作出任何定义。
Application designers and developers must be responsible for this protection because SOAP-DSIG does not define anything to cover such attacks.
该协议用于提供安全信息(比如用户凭证和交易信息)的机密性,还提供了防止中间人攻击的保护。
This protocol is used to provide confidentiality of secure information, such as user credentials and transaction information, and protection from man-in-the-middle attacks.
在过去的几年里,那些保护电脑和网站免遭攻击的人员一直在追赶他们装备精良的黑客对手。
For the past several years, those defending their computers and networks against hackers have been playing catch up to their increasingly well-funded and organized adversaries.
这样可以通过禁用浏览器脚本和IE底安全等级的设置,保护浏览器免受通过已知漏洞发起的攻击。
This should protect against all known exploits of this vulnerability by disabling scripting and disabling less secure features in IE.
这项观察和很多自然资源保护学家有关,这些人很关心灰熊对北极熊的竞争甚至是攻击。
The observation has concerned many conservationists, who worry about the grizzlies competing with—or even attacking—polar bears.
针对一系列的攻击,ModSecurity为web应用提供了强大的保护,并对HTTP流量进行监测和实时分析,这些都只是很少或是根本没有影响系统的基础设施。
ModSecurity provides protection from a range of attacks against web applications and allows for HTTP traffic monitoring and real-time analysis with little or no changes to existing infrastructure.
我们来讨论一下要保护WebSphereApplicationServer基础设施和应用程序免受这四种形式的攻击应该采取的各种已知的步骤。
Let's identify the various known steps you should take to protect the WebSphere application Server infrastructure and applications from these four forms of attack.
能否详细谈谈核心规则集项目有哪些新特性,这些新特性是如何帮助开发者和Web管理员保护Web应用免受安全攻击的困扰。
Can you elaborate on the new features in Core Rule Set project and how they help developers and web admins protect web applications against security vulnerabilities.
对攻击你的和没能保护你的人生气。
数十亿年以来,某些细菌和真菌通过产生化学物质来保护自己,抵御来自其它微生物的攻击。
For billions of years, certain bacteria and fungi have produced chemical substances to protect them from attack from other microorganisms.
驻扎在阿富汗的北约直升机被调去保护喀布尔的洲际酒店,防止“肉弹”和武装人员攻击,这里有大量的西方人员居住。
In Afghanistan NATO helicopters were called on to help repel an attack by suicide-bombers and gunmen on the Inter-Continental Hotel in Kabul, where many Westerners stay.
这种来自微软研究的新策略完全去除了复杂密码的要求,同时也保护了词典攻击和统计学猜测。
The new scheme from Microsoft Research does away with complexity requirements entirely while protecting against both dictionary attacks and statistical guessing.
结果,免疫系统开始攻击自己的身体,而不是为了保护身体免遭细菌、病毒和寄生虫的侵袭。
As a result, the immune system starts attacking its own body instead of protecting it from bacteria, viruses and parasites.
能够保护程序抵御模糊攻击的最简单的方法是将一个检验和添加到数据中。
The simplest thing you can do to protect against fuzzing is add a checksum to your data.
你的时间和精力都要花费在保护自己免遭别人攻击的事情上。
Your energies and time will be spent trying to stop others, and defending yourself against their atacks.
保护免受更复杂的攻击(如SQL注入和字典攻击)需要更多自定义的配置,如用户自定义字典所允许的语法。
Protection against more elaborate attacks such as SQL injection and Dictionary attacks require more customized configuration, such as user-defined dictionaries containing allowable syntax.
所有的藏匿地点都有保护措施,任何军事行动均只能部分抑制伊朗防空体系,而且,利用所有导弹和海军力量来摧毁他们的攻击力量。
Many of the sites are protected, and any operation would have to suppress at least part of Iran's air defences, and all its missiles and naval power, to limit any retaliation.
该JATAS项目将提供下一代威胁预警系统,以保护美国海军和海军陆战队攻击机,增加在恶劣环境的生存能力。
The JATAS program will provide the next generation threat warning system to protect U.S.Navy and Marine Corps assault aircraft for increased survivability in hostile environments.
该JATAS项目将提供下一代威胁预警系统,以保护美国海军和海军陆战队攻击机,增加在恶劣环境的生存能力。
The JATAS program will provide the next generation threat warning system to protect U.S. Navy and Marine Corps assault aircraft for increased survivability in hostile environments.
此外,若遭遇人身攻击,唯一的办法就是立即寻求救助和保护。
Additionally, in the case of physical abuse, the only solution is to seek immediate help and shelter.
应在公司用于检测漏洞和保护s OA基础结构的业务策略中包含用于目标和攻击者之间的多个SOA的深度防御模型。
A defense in depth model with multiple SOAs between the target and the adversary should be part of a company's business strategy for detecting vulnerability and protecting SOA infrastructure.
被从保护名单中删去以后,灰狼也可在攻击家畜和宠物时由牧场主们猎杀。
The delisting also allows ranchers to shoot wolves that prey on their stock or threaten pets.
针对各种各样的攻击实施威胁保护是必须的,比如拒绝服务攻击(DoS)和XML威胁。
Threat protection against a bewildering variety of attacks may be required such as denial of service (DoS) and XML threats.
反向代理服务器可以保护服务器免受病毒攻击和大多数黑客攻击,因为反向代理服务器是惟一能够通过Internet访问的服务器。
A reverse proxy protects the server from virus attacks and most hacking attempts because the reverse proxy server is the only server accessible from the Internet.
反向代理服务器可以保护服务器免受病毒攻击和大多数黑客攻击,因为反向代理服务器是惟一能够通过Internet访问的服务器。
A reverse proxy protects the server from virus attacks and most hacking attempts because the reverse proxy server is the only server accessible from the Internet.
应用推荐