• Don't force me to impersonate a chicken. Please, don't make me fall that low.

    不要模仿只鸡了,不要落到这个地步

    article.yeeyan.org

  • Tie a scarlet cape around your neck if you want to impersonate Harry as a Quidditch player.

    如果模仿的是打地奇的哈利,那么别忘了哈利猩红色斗篷

    www.hjenglish.com

  • So long as, with reasonable success, I can impersonate "Joyce Carol Oates," it is not the case that I am dead and done for-yet.

    只要扮演好“乔伊斯·卡洛尔·欧”,取得一定的成绩需担心自己会死或者垮掉——至少目前如此

    article.yeeyan.org

  • The attack described above enables the attacker to impersonate a victim, provided that such victim was assigned a cookie between the two samples the attacker made of the site cookies.

    上面所描述攻击可以使攻击扮演一个受害者角色,假定这样受害者分配到两个站点cookie 构成样例攻击之间

    www.ibm.com

  • Retirees from Rainier climes irrigate green lawns that impersonate the grasslands they left behind.

    雷尼尔山退休人员退休模仿他们工作过草地在自家造了绿色草坪并直接用水灌溉草坪

    article.yeeyan.org

  • To test their procedures, they needed a man and a woman to impersonate a married couple for multiple sessions.

    为了测试他们流程他们在很多时候需要男人女人模仿已婚夫妇

    article.yeeyan.org

  • You login as the client manager and select the name of the user that you would like to impersonate.

    客户机管理人员身份登录选择希望模拟用户姓名

    www.weidanci.com

  • There are, of course, things we can do to ameliorate these security concerns to a degree, the fact remains that we are explicitly allowing someone to impersonate a user.

    当然我们可以一些事情这些安全问题减轻一定程度事实仍然我们正在显式地允许某个人模拟用户

    www.ibm.com

  • Sure, it can be harmless to impersonate a celeb online or create a fake profile for a movie character.

    当然网上冒充名人或是电影角色创建虚假资料无害的。

    article.yeeyan.org

  • It is not invariably the case that a teacher is also a writer, and that, as a teacher, she has been hired to impersonate the writer.

    实际情况并非单纯一个老师身兼作家之职,事实上,学校聘为老师,就是为了扮作那个作家

    article.yeeyan.org

  • And if the ca certificate (s) fall into the wrong hands, outsiders can create certificates that can impersonate a valid member of your organization.

    一旦ca证书落到不正当人手中外部人就可以创建证书伪装公司一个合法成员

    www.fq51.cn

  • Perhaps most menacingly, the Internet's openness allows well-organized groups to simulate support, to "capture and impersonate the public voice," as Mr. Fishkin wrote in an E-mail exchange.

    也许最大威胁是因特网公开性各种有组织的团体冒充支持获取冒充公众声音,”就像菲什金先生一封电子邮件回信中所说的那样。

    article.yeeyan.org

  • The idea was that no client would be able to impersonate another because each channel had a unique low-privileged MCAUSER which restricted inbound messages to specific queues.

    他们认为任何客户不能假扮另一个客户因为每个通道具有唯一的较低权限MCAUSER可以将入站消息限制于特定队列

    www.ibm.com

  • If an LTPA token is successfully captured, the thief can impersonate the user identified until it expires.

    如果ltpa令牌成功截获,则窃取者可以模拟用户身份直到到期为止

    www.ibm.com

  • It allows the attacker to impersonate the victim.

    将允许黑客冒充受害者

    www.ibm.com

  • Be natural - don't impersonate the writing style of successful bloggers.

    自然——不要冒充写作风格成功博客

    article.yeeyan.org

  • A. Robert Lee (Bruce's younger brother) told me: 'Don't impersonate' him.

    答:李振辉(李小龙弟弟)不要去“演”

    www.putclub.com

  • With the token of the legitimate user in hand, the attacker can proceed to act as the user in interaction with the site, thus to impersonate the user.

    手边合法用户标记黑客可以继续扮演用户站点交互从而冒充用户

    www.ibm.com

  • In some cases, paid stand-ins with good English skills are provided to impersonate the applicant and convince the university that the applicant's English language capabilities are up to standard.

    某些情况下还可以为申请人提供英语好的付费“枪手”,学校证明申请人英语能力合乎标准

    app.fortunechina.com

  • By forging these cookies, an attacker can impersonate a valid client, and thus gain information and perform actions on behalf of the victim.

    通过打造这些cookie黑客可以模拟有效客户因此获取详细信息执行代表病毒行为

    www.ibm.com

  • Began to impersonate his superiors while on assignment; he was fired after less than three years on the job. He soon lost his house and started sleeping on friends' sofas.

    完成任务时假冒上司工作不到解雇很快地失去了房子开始朋友沙发上过夜

    article.yeeyan.org

  • If a user's Kerberos password is stolen by an attacker, then the attacker can impersonate that user.

    如果一个用户Kerberos密码攻击窃取攻击者就能够模拟用户

    www.ibm.com

  • You can create a channel sink that USES the Windows SSPI credential and context management APIs to authenticate the caller and optionally impersonate the caller.

    可以创建使用WindowsSSPI凭据上下文管理API通道接收,对调用方进行身份验证有选择地模拟调用者。

    zxianf.blog.163.com

  • This is just like a site deploying an application with weak security tokens, whereby an attacker can guess the security token of a client and impersonate him or her.

    站点使用薄弱安全标志(securitytoken)部署应用程序借此黑客可以猜出客户安全标志冒充客户

    www.ibm.com

  • If you are deploying your application in an intranet environment, you will want to enable impersonation by adding to your application's web.config file.

    如果正在一个Intranet环境部署应用程序通过将 添加应用程序 web.config文件启用模拟

    blog.sina.com.cn

  • This approach requires that you impersonate within the ASP.NET Web application and configure the remote object proxy with DefaultCredentials obtained from the impersonated caller's security context.

    方式要求在ASP.NETWeb应用程序使用模拟,并用被模拟调用安全性上下文中获得DefaultCredentials配置远程对象代理

    zxianf.blog.163.com

  • The virus then USES the information to impersonate people online, with little or no external guidance from the thieves.

    病毒然后利用这些信息模拟上网很少根本没有外部指导窃贼

    danci.911cha.com

  • Because isolated storage is always segregated by user, the server must impersonate the user making the request.

    因为独立存储始终用户进行隔离,所以服务器必须模拟发出请求用户

    www.kuenglish.info

  • Because isolated storage is always segregated by user, the server must impersonate the user making the request.

    因为独立存储始终用户进行隔离,所以服务器必须模拟发出请求用户

    www.kuenglish.info

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定