这是对“铁手套”部分的主要攻击手段。
This is the primary attack for most of the 'gauntlet' portion.
只是偶尔来替换北欧建造你可能会失去这个主要攻击中队。
Just build occasional Vikings to replace any you might lose from this main attack squadron.
我们计划把其中的一部分伤害转化到主要攻击中。
肉搏的主要攻击属性是灵巧,次要攻击属性是敏捷。
Brawling has dexterity as its primary attack talent, and agility as its secondary attack attribute.
该组织目前主要攻击目标为阿尔及利亚国家象征性地标和外籍工作者。
It has so far concentrated on attacking symbols of the Algerian state and foreign workers.
中国互联网安全中心指责称,美国是中国互联网的主要攻击源。
Chinese Internet security center is accusing the United States of being the biggest attacker of China's Internet.
对AH - 1双引擎版本保持与美国的海军陆战队服务作为服务的主要攻击直升机。
The AH-1 twin engine versions remain in service with United States Marine Corps as the services primary attack helicopter. Surplus AH-1 helicopters have been converted for fighting forest fires.
这说明一旦智能手机连到用户的个人电脑上之后,很容易成为僵尸网络的主要攻击对象。
It provide a clear example for how smartphones are prime targets to become botnets once connected to a user's personal computer.
某人接种了疫苗或受到病毒感染后,其免疫系统就会产生抗体,主要攻击病毒表面被称为红血球凝聚素的蛋白质。
When someone is vaccinated or infected, the immune system makes antibodies that mostly attack a protein on the surface of the virus called hemagglutinin.
此拳法独到之处在于它动作神速,出手狠毒,主要攻击对方的咽喉、关节等要害部位,是中国仿生拳法的经典套路。
This routine is original with its quick and valor. It mainly attacks other people's gorge, joint and other key parts of the body. It is a classical imitation routine in Chin-ese Wushu.
两个主要政党的成员仍然因意识形态上的分歧而互相攻击。
Members of the two major political parties still attacked each other for ideological differences.
每个地区都有不同的作战策略,在这里我们攻击主要道路,而省内的乡村地区都在我们控制之中。
Each area has a different strategy, here it's attacking the main road, but everywhere in this province the countryside is in our control.
这里有两种主要的超级用户进入类型:缓冲溢出攻击和在服务器上执行脚本。
There are two main types of root exploits: buffer overflow attacks and executing scripts against a server.
正如埃克斯所说,不能忽视对祭司们的主要生活来源-动物祭祀的直接攻击。
As Akers argues, the direct attack on the Priests' principal source of livelihood, the animal sacrifices, could not be ignored.
当防守球队排成四人一队的人墙,攻击球队的队长与他的两个主要任意球罚球球员讨论选择。
As the defending team lines up a four-man wall, the captain of the attacking team discusses the options with his two main free-kick takers.
在这四种主要分类中又有一些不同的攻击类型,稍后我们将对它们进行介绍。
There are several types of attacks within these four broad classifications, which we will look at in a minute.
在美国、英国、荷兰,警方已拘留20余人作为主要的网络攻击调查的一部分。
Police in the US, Britain and the Netherlands have detained more than 20 people as part of an investigation into major cyber attacks.
其主要原因在于,她们的大脑暗示自己,她们更乐于保卫自己的巢穴,而不是攻击别人的巢穴。
The main reason is that their brains tell them they're more inter- ested in defending their nests rather than attacking someone else's.
而且这种攻击达到了一个主要目的:将他定义为一个经验不足的黑人候选人。
It has also succeeded in its chief aim: defining him as a black candidate, and an inexperienced one at that.
真菌主要是在土壤环境中开始对昆虫的攻击,在花园,温室以及户外,人们经常采用真菌来控制农业害虫。
Fungi that attack insects are present in soils worldwide, and they are used in gardens, greenhouses, and open fields to control agricultural pests.
最主要的攻击就是他为了钱而留在曼联,而不是加盟一直低级别球队去打更多的比赛有机会每周都能上场。
The main claim is that he joined United for money when he might by now have signed for a lower-ranked club where he would play every week.
该攻击主要依赖于用户在浏览器中输入url却没有直接激活ssl会话,而大部分用户激活(SSL)会话都是通过点击提示的按钮。
The attack relies on users not directly calling up an SSL session by typing a URL into a browser. Most users initiate sessions by clicking on a button.
一些主要的日报撰文攻击隐私禁令是一项对议会主权的司法袭击。
Some grander dailies have attacked privacy injunctions as a judicial assault on parliamentary sovereignty.
下面列出了四种主要类别中的特定攻击类型。
Specific types of attacks within the four broad categories are listed below.
这类攻击的主要手段是短网址,它们常常出现在社交媒体的消息中。
Chief among these are shortened URLs, which are common in social media messaging.
然而,这种随处可用性也使插件成为浏览器安全攻击的主要目标。
However, that ubiquity alsomakes plug-ins prime targets for browser security attacks.
插件历来是网络恶意软件攻击的主要对象——尤其是Adobe的Flash和Acrobat插件,安全问题遭人诟病已久。
Plug-ins have historically been a major attack vector for Internet malware—particularly Adobe's Flash and Acrobat plug-ins, which are notoriously insecure.
Akamai还研究了僵尸网络和网络攻击的主要流量来源地。
Akamai also looked at where most of the traffic from botnets and other attack traffic originated from.
Akamai还研究了僵尸网络和网络攻击的主要流量来源地。
Akamai also looked at where most of the traffic from botnets and other attack traffic originated from.
应用推荐