• The schoolgirl was targeted a year ago by a mystery attacker after a dance class.

    这位女中学生是在年前舞蹈班放课后遭遇的不明袭击

    youdao

  • However this mode should not be used in live deployment as it could give an attacker a lot of information about the services that you export.

    但是模式导出服务许多信息都暴露攻击者,真正部署的时候应该避免使用这种模式。

    youdao

  • Once so compromised, a computer can surreptitiously download other code that can log a victim's key strokes, giving an attacker a path to potentially wide network access.

    一旦入侵成功,电脑能够暗中下载其它代码这些代码记录入侵电脑数据,这将给攻击者潜在宽广网络进入权

    youdao

  • We had only a vague description of the attacker.

    我们只有那个袭击者粗略描述

    《牛津词典》

  • The attacker knocked on their door and made a lunge for Wendy when she answered.

    袭击者他们温迪开门,向猛冲过去。

    《柯林斯英汉双解大词典》

  • This information will help us build a picture of his attacker.

    条信息有助于描画出袭击人的相貌。

    《牛津词典》

  • The attacker threatened them with a gun.

    袭击者威胁他们

    《牛津词典》

  • She was barely able to stammer out a description of her attacker.

    只能勉强结结巴巴说一说袭击人是什么模样。

    《牛津词典》

  • The drawing is said to be a good likeness of the girl's attacker.

    据说那幅画像袭击那个女孩的歹徒。

    《牛津词典》

  • If your program is a viewer or editor of datasuch as a word processor or an image displayer—that data might be from an attacker, so it's an untrusted input.

    如果程序数据浏览器或者编辑器——比如文字处理器或者图像显示器——那么那些数据有可能来自攻击者,所以可信的输入。

    youdao

  • Luckily, Zhang had just learned how to escape from an attacker, a person who plans to hurt someone.

    运的是,张刚学会了如何从计划伤害他人的袭击者手中逃脱。

    youdao

  • A creative attacker can take advantage of a buffer overflow vulnerability through stack-smashing and then run arbitrary code (anything at all).

    创造力的攻击者透过摧毁堆叠利用缓冲区溢位弱点然后执行任何程序码。

    youdao

  • The attacker then calls a customer service representative at the site, posing as the shopper and providing personal information.

    攻击者接下来网站调用客户服务作为购物者登录并且提供个人信息。

    youdao

  • The sophisticated attacker finds a weakness in a similar type of software, and tries to use that to exploit the system.

    富有经验的攻击者可以发现同类软件缺点并且尝试利用这些弱点进入系统

    youdao

  • The attacker then sends a packet full of SACK options designed to force the other host to scan that entire queue to process each option.

    然后攻击者发送充满SACK选项目的是使方主机扫描整个队列处理每个选项

    youdao

  • But missile attacks on ships are rare, so it is difficult to know just how safe a ship really is-especially if an attacker launches a dozen or so missiles at once.

    舰船受到导弹攻击的案例非常因此很难判断条战舰躲过导弹攻击的劫数多大,特别是在攻击者一次发射多枚导弹的情况下。

    youdao

  • To accomplish this, the attacker sends a TCP packet with the SYN flag set to the target host, just like when opening a regular TCP connection.

    实现一点,攻击者目标主机发送设置了SYN标志tcp打开常规tCP连接一样。

    youdao

  • Determining the identity of the attacker was a matter of narrowing down the line of potential suspects.

    确定攻击者身份需要逐渐缩小一连串嫌疑人的范围。

    youdao

  • Women were cooking dinner, men were praying and children were playing nearby when the attacker struck, a witness said.

    妇女烹饪晚餐男子祈祷孩子附近攻击者击中一位目击者说。

    youdao

  • Because the percent sign (%) itself can be URL encoded, an attacker can submit a carefully crafted request to a server that is basically double-encoded.

    由于百分号(%)本身可以URL编码的,所以攻击者可以服务器提交一个精心制作的、基本上双重编码请求

    youdao

  • Worst of all, the identity of the attacker may remain a mystery.

    最糟糕攻击者身份一个

    youdao

  • Another term for an attacker is a black hat.

    攻击者一个词汇帽(black hat)。

    youdao

  • To log into the Web site, the attacker first enters a test user ID (" test ") and password (" test ").

    要想登录这个站点攻击者首先要输入一个测试用户ID (“test ”)密码(“ test ”)。

    youdao

  • But once an attacker can run code on such a machine, the attacker instantly attains complete control.

    但是一旦攻击可以这样机器上运行代码,就可以立即获取完全控制

    youdao

  • Even if an attacker broke into a game program, all he could do would be to change the score files.

    即使攻击者攻击并进入一个游戏程序所有的事情修改分数文件。

    youdao

  • If this occurred, the sequence Numbers would definitely be different than what we expected. This also protects us from an attacker dropping a message.

    如果这么干,序列号一定我们所期待的不一样保护了我们不受攻击者们扔消息的攻击。

    youdao

  • If an attacker can cause a buffer to overflow, then the attacker can control other values in the program.

    如果攻击能够导致缓冲区溢出那么它就控制程序中的其他

    youdao

  • The problem is that if an attacker can control the underlying libraries used by a program, the attacker can completely control the program.

    问题如果攻击可以控制程序用到底层,那么攻击者就可以控制整个程序。

    youdao

  • By splitting systems apart like this, you avoid the probability (or at least lessen the risk) of an attacker breaching a server and getting access to data or even internal systems.

    通过以这种方式分开系统,就可以避免(至少降低风险)攻击进入服务器,然后访问数据内部系统。

    youdao

  • The attacker, a veteran systems administrator, has a problem with her job and takes it out on the systems she is trusted to administer, manage, and protect.

    攻击者名经验丰富系统管理员工作中遇到问题自己管理、保护系统发泄

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定