• 安全绕过一个小岛

    The ship weathered an island.

    youdao

  • 安全绕过一个

    The ship wreathed an island.

    youdao

  • 豁免权用户绕过安全策略中的多个访问规则提供了一种方式

    Exemptions provide a way to allow users to bypass one or more access rules for a security policy.

    youdao

  • 如果绕过功能涉及系统安全,那么结果可能灾难性的。

    When the functionality bypassed is system security, the results can be disastrous.

    youdao

  • 这种类型攻击甚至用于绕过显式安全检查

    This kind of attack can even be used to bypass explicit security checks.

    youdao

  • 允许使用可编程US B开发AT 90us B微控制器绕过PS 3安全系统执行未签名代码

    This apparently allows a programmable USB development board with an AT90USB microcontroller to be used to circumvent the PS3's security systems and execute unsigned code.

    youdao

  • 使用ThreadLocal使我们可以绕过实现线程安全而对何时需要同步进行判断复杂过程而且因为需要任何同步,所以也改善了可伸缩性

    Using ThreadLocal allows us to bypass the complexity of determining when to synchronize in order to achieve thread-safety, and it improves scalability because it doesn't require any synchronization.

    youdao

  • 因此定义QALIAS权限允许用户绕过安全应该允许可信管理员定义更改QALIAS。

    Therefore the authority to define a QALIAS can allow a user to bypass security, and only the most trusted administrators should be permitted to define or alter a QALIAS.

    youdao

  • 这些小偷翻过围墙绕过警卫穿过一楼阳台安全网。

    They scaled the compound walls, skipped past the guards and broke through a security grill on a first-floor balcony.

    youdao

  • 员工能遭到绕过公司安全措施的法子。

    Employees Will Find Ways to Route Around Corporate security.

    youdao

  • 可能导致系统安全因为黑客可以编写代码直接调用EJB得以绕过web

    This can lead to an insecure system, as hackers may be able to write code to call the EJB directly and bypass the Web tier.

    youdao

  • XULRunner可以任何浏览器之外运行XUL文件因此可以绕过严格安全模型

    XULRunner can run XUL files outside of any browser, thus avoiding the stringent security model.

    youdao

  • 安全意思我们不能绕过

    And by secure I just mean that our hook can't be bypassed.

    youdao

  • 绕过传统网络安全防御很难发现

    It can bypass the traditional network security defense, it is difficult to be found.

    youdao

  • 例子文件共享软件绕过公司网络安全

    There have been examples of file sharing software bypassing a company's network security.

    youdao

  • 看上去这些行人撞击在一起一样,实际上他们像旋转芭蕾舞者,绕过彼此,最终安全到达对岸

    It looks like they must crash, this sea of people, but they swerve and swing around each other, like dancers pirouetting, and they all get to the other side safely.

    youdao

  • 这个项目接受最多是易受攻击的人,比如美军工作过的伊拉克难民但是不会允许他们绕过安全筛选

    He said the program accepts the most vulnerable cases, such as Iraqis fleeing after working for U. s. forces, but wouldn't allow any of them to bypass any security screenings.

    youdao

  • 联邦调查局也许另一措辞形容这个工具不要被误导:构建个采用这种方式绕过安全屏障iOS版本无疑创建了一个后门,”库克写道

    "The F. B. I. may use different words to describe this tool, but make no mistake: Building a version of iOS that bypasses security in this way would undeniably create a back door," Mr. Cook wrote.

    youdao

  • 联邦调查局他们专家无法获取法鲁克iPhone数据只有苹果才有办法绕过安全功能

    The F. B. I. said that its experts had been unable to access data on Mr. Farook's iPhone, and that only Apple could bypass its security features.

    youdao

  • 由于发生在主机服务器所有活动使用操作系统就是说,即使攻击者绕过其它某一种或几种安全防御系统,他们最终都必须使用操作系统。

    All activities on a host or server must use operation system, even if attackers of the future discover ways to circumvent other defenses, they must still use the operation system.

    youdao

  • 一个后门程序可以绕过电脑安全机制进入电脑。

    A backdoor can gain access to a computer by going around the computer access security mechanisms.

    youdao

  • 举例来说,如果命令没有受到保护队列就不可能安全,这是因为任何人可以定义QALIAS,然后使用QALIAS绕过队列安全

    As an example, if commands are left unprotected, then queues cannot be secure because if anyone can define a QALIAS, they can use the QALIAS to bypass queue security.

    youdao

  • 遇到危险的时候,比如我们路上遇到条蛇不要逞能英雄,绕过安全走开

    When you find danger, like this snake that we encountered on our way, don't try to play hero. Go around it and have a safe walk.

    youdao

  • 无线网络中,攻击可以修改自己无线网卡的MAC地址合法站点的地址,从而可以绕过访问控制列表窃取网络信息,给无线网络安全带来很大的危害。

    In wireless network, intruders can change their MAC addresses to legitimate ones. Thus their wireless facilities can't be found by access control list, and they can steal network information.

    youdao

  • 无线网络中,攻击可以修改自己无线网卡的MAC地址合法站点的地址,从而可以绕过访问控制列表窃取网络信息,给无线网络安全带来很大的危害。

    In wireless network, intruders can change their MAC addresses to legitimate ones. Thus their wireless facilities can't be found by access control list, and they can steal network information.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定