"More than 70% of recorded great white attacks on humans result in just the shark biting and then leaving," she said.
“大白鲨袭击人类的记录中,有超过70%的结果是大白鲨咬了人,然后就离开,”她说。
If you've fuzzed your program for 24 hours and it's still standing, then it's unlikely that further attacks of the same sort will compromise it.
如果您用24小时对程序进行模糊测试而其依然无事,那么随后同种类型的攻击就不大可能再危及到它。
Since then it has launched numerous small-scale attacks against Yemeni security forces and has struck in Saudi Arabia too.
自那时起,他们向也门安全力量发起了无数次小型袭击,他们还袭击过沙特阿拉伯。
Cross-site scripting attacks allow hackers to embed a malicious script on your visitor's browser and then execute the script in order to gather data.
跨站点脚本攻击使黑客能够将恶意脚本嵌入到访问者的浏览器中,然后执行该脚本收集数据。
"If they want to participate, it's very easy for them to download a tool that hands over your computer to Anonymous" - and which then allows them to take part in DDoS attacks.
“如果他们想加入,是非常容易的下载黑客软件工具,并把自己的电脑加入到Anonymous”——然后运行,加入到集体ddos攻击中来。
During summers, when you spend long hours wearing shoes, then the dark humid condition that prevails inside the shoes promote growth of fungus which then attacks the feet and toenails.
炎炎夏日,如果你长时间穿着鞋,那么鞋里那种又黑又潮的环境就会刺激真菌的增长,进而损害脚部和脚趾甲的健康。
I'll first describe a couple of scenarios involving internal attacks (that is, attacks that originate within an organization), and then take a look at a couple of scenarios involving external attacks.
我将首先描述两种涉及内部攻击的方案(即,在组织内部发起的攻击),然后研究涉及外部攻击的两种方案。
Personal attacks make people feel defensive, and then they won't really listen to anything you have to say.
个人攻击将使人们会使人自我防御,然后他们将不会听进去你说的任何话。
And when somebody else then attacks them, say, "Look, I think that what John was saying was a good point and here's how I think he should have defended his position," or what have you.
并且当其他人攻击他们时,你说听着我觉得约翰说的是个好点子,和这是我认为他应该怎样维护自己的立场“,或者你有什么。”
Israel could conclude it has dealt a heavy enough blow to Hamas to unilaterally announce an end to attacks and then respond only if missile fire continues.
以色列可能断定已经给了哈马斯足够的教训,从而单方面宣布停火,只是当火箭弹袭击继续的时候才会做出反应。
They may also be exceptionally concerned about remote attacks that might compromise one application, and then be used to compromise other applications.
它们也可能十分关注远程工具,此类远程工具可能在破坏了一个应用程序后,然后利用其来破坏其他应用程序。
The Pope then offered a brief prayer for peace and healing for survivors and the families of victims of the attacks in New York, Washington and Pennsylvania.
接着,教皇作了一个简短的祷告,乞求上天让发生在纽约、华盛顿和宾州的恐怖袭击的幸存者和受难者家属获得平安,让他们的创伤得到愈合。
We've even had cases of attacks being staged, things being thrown at teachers, so their reaction can be filmed and then posted on Facebook or YouTube.
凯特说:“我们有些老师甚至受到袭击。 有些学生向教师投掷东西以将他们的反抗行为拍成短片上传到Facebook或Youtube。”
It worked. When they caused heart attacks in the rats and then injected the new heart muscle cells, every graft survived and integrated into the hearts of the rats.
它发挥作用了。当他们在大鼠中引发心脏病,然后注射新的心肌细胞,每个移植物都存活了,然后完整的进入了大鼠的心脏。
This paper first discusses the challenges and attacks in the design of embedded system security, and then studies approaches to bridging the security processing gap and resisting security attacks.
本文讨论了嵌入式系统安全设计面临的挑战以及受到的攻击方式,探讨了如何弥合安全处理的资源缺陷和抵抗攻击的方法。
Unless we repulse the enemy's attacks and defeat him, even places held by the guerrillas will come under enemy control, and then it will be impossible to establish base areas.
就是游击战争控制的地方,如果不粉碎敌人的进攻,不战胜敌人,自己控制的地方就要变成敌人控制的地方,也无从建立根据地。
Then we discussed principle and implement of statistical power attacks, presenting measurable analysis and experiment result.
讨论了统计功耗攻击的原理和实现,并给出了定量的分析和实验结果。
They then rush in and trample whatever foes they can before switching to claw, bite, and rend attacks.
它们接着会冲入敌阵并在改用爪抓、啮咬和撕扯攻击之前尽量践踏敌人。
And then proposes various countermeasures against various attacks.
然后提出了防止攻击的各种对策。
One day, the dragonet runs into a man to rescue a woman and the hoodlum attacks brutally, thought that on this person of body has the Buddha reason, then goes forward with its acquaintance.
一天,小龙遇到一男子为救一弱女子与流氓大打出手,认为这人身上有佛缘,便上前与其相识。
More than 70% of recorded great white attacks on humans result in just the shark biting and then leaving, "she said."
“大白鲨袭击人类的记录中,有超过70%的结果是大白鲨咬了人,然后就离开,”她说。
Then, rather than trying to steamroll them into submission, you respond to their attacks in simple and clear ways based on common sense.
接着不要尝试压制对方让他们屈服,而是以常识为基调,简洁而明确地回应这些攻击。
If hair loss is caused by inherited factors, then continued use of Polaris treatments becomes necessary to inhibit renewed DHT attacks on the hair follicles and to keep and maintain all regrown hair.
如果脱发是因为遗传因素,那么持续的使用“北极星”疗法,对于抑制再生的DHT攻击毛囊和保持再生的头发是非常有必要的。
If your opponent attacks one of your pieces, you can then back up the attacked piece with your supporting men and organize them for a larger counter-attack.
如果对手攻击了你的一个棋子,你可以把其它的棋子组织起来,进行一个更大规模的大反击。
Then in 2004, Merck withdrew its painkiller Vioxx after studies showed the pill increased the risk of heart attacks and strokes.
随后在2004年,在研究显示默克公司的止痛药万络增加了心脏病发作和中风的危险性后,该药撤出了市场。
Then in 2004, Merck withdrew its painkiller Vioxx after studies showed the pill increased the risk of heart attacks and strokes.
随后在2004年,在研究显示默克公司的止痛药万络增加了心脏病发作和中风的危险性后,该药撤出了市场。
应用推荐