6月份,巴基耶夫的重选被不法行为扰乱后,他的批评者的被攻击数量显著上升。
Since Mr Bakiyev’s re-election in July, which was marred by irregularities, the number of attacks against his critics has increased markedly.
但是即使增长的公开性,部分来源普通的失误被业余黑客抓到,职业的黑客攻击数量仍在增加。
But even if increased openness is in part to thank for the apparent hike in hacking, there has still been an exponential rise in the number of cyber threats.
中国网站平均每天遭受近400次大规模网络攻击,特别是源自境外的网络攻击数量持续快速攀升。
China's websites suffer from an average of nearly 400 large-scale cyber attacks on a daily basis, and the attacks from abroad continue to rise rapidly.
如果研究发现对更多的鲨种也适用的话,这也许可以用来帮助减少被渔民误捕到的珍稀鲨鱼数量,同样也可以防止鲨鱼攻击人类的事件。
If the discovery holds true for more shark species, it could be used to help reduce the Numbers of endangered sharks accidentally caught by fisheries, as well as prevent shark attacks on humans.
也就是说,它们只能很好的验证那些工具发行者已知的攻击类型和数量。
That is, the validation they perform is only as good as the number of attack vectors known to the publishers of the tool.
但攻击的数量有限而且多半可以根据性质定位。
However, the number of attacks are limited and most likely targeted in nature.
攻击可以远程进行,并且中等数量的请求就会导致内存和CPU占用率显著提高。
The attack can be done remotely and with a modest number of requests leads to very significant memory and CPU usage.
目前为止,被攻击的智能手机数量还很少。
尽管佛罗里达州的鲨鱼攻击事件数量在2010年有所下降,佛罗里达仍旧以13起鲨鱼攻击事件位居美国第一。
Although Florida's number of shark attacks declined in 2010, the state still led the U.S., with 13 reported attacks.
尽管佛罗里达州的鲨鱼攻击事件数量在2010年有所下降,佛罗里达仍旧以13起鲨鱼攻击事件位居美国第一。
Although Florida's number of shark attacks declined in 2010, the state still led the U. s., with 13 reported attacks.
现在微软已经发现一些不同的攻击文件被使用,但是他们仅被使用在特定目标的攻击,所以受影响的客户数量不大。
They all seem to be used only in targeted attacks and therefore the number of affected customers is very low. Here’s a diagram that demonstrates how such an attack happens
但是有可能通过rainbow表去攻击密码的hash值:预先计算出来的数量庞大的hash值,涵盖所有可能的字符组合。
But it is possible to attack the hashed value of your password using rainbow tables: enormous, pre-computed hash values for every possible combination of characters.
业务战术目标——在实施PCI遵从性方面,通过跟踪失败的登录尝试,识别正常数量和系统受到攻击时的非正常数量,确保企业尽到勤勉义务。
In enforcing PCI compliance - ensure that due diligence is ensured through tracking of failed login attempts and identifying what is the normal amount and what constitutes a system under attack.
这个研究需要受试者要玩一种电子游戏,游戏中他们需要保护自己不受攻击,而他们选择用来投掷的炸弹数量就是攻击性的表征。
In this study, participants played a video game in which they defended themselves from attackers, and the number of bombs they chose to drop was a measure of aggression.
这些激烈的时刻:公司为了争夺少见的顾客钞票,同时应付衰退,比较(或者攻击性)广告的数量正在增长。
These are heated times: the number of comparative (or "attack") advertisements is growing, as companies battle for scarce consumer dollars amid the recession.
在过去的两年中这类攻击事件的数量不断增加并且严重程度也加剧。
Such attacks have grown in number and seriousness over the past two years.
我们看到在墨西哥被缴获的攻击性武器的数量在显著增加。
We have seen a dramatic rise [in the number] of assault weapons being seized in Mexico.
即使鲨鱼攻击事件有所增长,每年被人类杀死的鲨鱼的数量也出奇的高,仅仅是渔业捕捞,每年就会杀死三千万至七千万只鲨鱼。
Even with the rise in shark attacks and fatalities, the number of sharks killed by humans each year is staggering, with 30 to 70 million sharks killed by fisheries alone.
尽管佛罗里达州的鲨鱼攻击事件数量在2010年有所下降,佛罗里达仍旧以13起鲨鱼攻击事件位居美国第一。
Although Florida's number of shark attacks declined in 2010, the state still led the U.S., with 13 reported attacks. Twenty-three other attacks happened in these other states.
但即使在Stuxnet蠕虫病毒爆发前,安全顾问就演示过大数量的智能电表会遭到如何的黑客攻击,并因此被关闭。
But even before Stuxnet struck, security consultants had shown how large Numbers of smart power meters could be hacked and shut down.
猎豹数量上基因上相同性让它们更容易受疾病攻击。
The genetic homogeneity of cheetah populations may make them more vulnerable to disease.
进一步,我们预计2016年跟踪更艰巨的数量,作为零天攻击加速和勒索引入方程利润动机。
Further, we expect 2016 to track an even more formidable number, as zero-day attacks accelerate and ransomware introduces a profit motive into the equation.
上尉骑马是很有利的,只因为牠是大型生物,战马可以延伸她的贴身数量,在敌人想要迅移的时攻击。
The Captain benefits from a Warhorse. Simply by being large, the Warhorse expands the number of potential adjacent enemies who could be attacked when they shift.
通过很少数量的请求,攻击者可以耗尽应用程序的线程池。
With a small number of requests, the attacker can deplete the application's thread pool.
通过很少数量的请求,攻击者可以耗尽应用程序的线程池。
With a small number of requests, the attacker can deplete the application's thread pool.
应用推荐