一个受攻击的页面曾经被部署。
割裂的流血效果受攻击强度的加成。
The bleed effect of "Lacerate" now increases in potency with greater attack power.
网站受攻击或者当机时如何快速恢复?
How to recover the website rapidly when it is attacked or crash?
他们做好准备以防受攻击。
格丽卿转移了目标,他也不再受攻击了。
Gretchen had switched targets and he no longer was under attack.
要塞在受攻击期间会损坏,因此需要进行修补。
Fortresses can take damage during attacks and will need to be repaired.
排在塞拉利昂之后的是尼日尔,它的受攻击率为1/442。
After Sierra Leone, Niger fared well with one in every 442 surfers likely to be attacked while online.
当把您的计算机连接到网络上时,就有了受攻击的可能性。
When connecting your computer to a network, it becomes vulnerable to attack.
国内服务器、网站安全威胁日益升级,受攻击次数连年跃升。
Domestic server, website security threats escalating, the number of attacks in recent years jumped.
尸体爆炸(第3层)现在造成暗影伤害,并且不再受攻击强度影响。
Corpse Explosion (Tier 3) now does shadow damage, and is no longer modified by attack power.
普通的混凝土可以用于一些区域,但它是受攻击支配由强的酸和碱。
Ordinary concrete can be used in some areas, but it is subject to attack by strong acids and alkalis .
可用性:系统将持续工作,即使在受攻击的时候也是如此(“工作的持续性”)。
Availability: the system will keep working even when being attacked (" works continuously ").
从计算机网络受攻击前后安全特性变化的角度,提出了网络熵的概念。
The paper put forward the concept of network entropy from the point of view of the security characteristic change of computer network after it was attacked.
赛珍珠在其1931年的小说《大地》中对农村家庭的描写,因其坦率而广受攻击。
Buck's account of a farming family in "The Good Earth" was widely attacked for its frankness when it came out in 1931.
如果系统或服务不可用,合法用户就无法使用受攻击系统上的网络服务(见图2)。
Once the system or service has been made unavailable, legitimate clients are blocked from using the network service hosted by the system under attack (See Figure 2).
它们会直接攻击活组织,这样的话人体就必须再生以便替换受攻击的组织。
They can directly attack live tissue, which the body must then strain to replace.
该准则强调的是受攻击目标功能的损伤,而不是受攻击目标物理的杀伤。
The criterion is laid special stress on functional damage of the attacked targets, not the physical killing of the attacked targets.
分析了这些方案的共性及受攻击原理,最后给出了一个安全的群签名方案。
Then, commonness of these schemes is analysed, an improved coalition resistant group signature scheme is put forward.
这个方案针对网格水印的两个难点:网格的频率分解和受攻击网格的拓扑恢复。
The algorithm focuses on the two challenges of mesh watermarking, i. e. , frequency decomposition of meshes and topology reconstruction of attacked meshes.
莫斯科电视为撤军做了广泛的报导,一则苏联电视报导说车队曾受攻击,但是并未提供细节。
Moscow television carried extensive coverage of the pullout. A Soviet television correspondence said the convoy had come under fire but did not provide details.
尽管印度女性受攻击更加频繁,但一些外国游客也逐渐成为攻击对象,并引发了广泛的国际关注。
Several foreign tourists also have been targeted in attacks that often get international attention, although Indian women are assaulted far more frequently.
大脑和神经无可替代,但植物无法移动,也常受攻击,在部分被吃掉或毁坏后它们还得能活下去。
Brains and neurons are irreplaceable, but plants are immobile and often attacked, so they must be able to survive after part of them is eaten or destroyed.
我们的网站常受攻击,刚刚又再次出问题导致无法登陆,另外大会会务也很繁重,请为我们代祷。
Our website has been frequently attacked and it collapsed again yesterday . Also, there's still much to be done before the conference so please pray for us.
成功的攻击会允许攻击者在受攻击的应用程序上执行任意代码。同时,失败的攻击会导致拒绝服务。
Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks may cause denial-of-service conditions.
当你使用引导法术时,前两次受攻击都会减少你法术的持续时间25%,之后的攻击将不再会影响。
When channeling a spell: The first and second hit reduces current duration by 25% of total duration each. All hits after the second will have no effect.
外壳型和入侵型病毒通常攻击可执行文件,即带有或扩展名的文件。当然数据文件也有受攻击的危险。
Shell and intrusive viruses most commonly attack executable program flies-those with a. com or. exe extension, although data flies are also at some risk.
外壳型和入侵型病毒通常攻击可执行文件,即带有或扩展名的文件。当然数据文件也有受攻击的危险。
Shell and intrusive viruses most commonly attack executable program flies-those with a. com or. exe extension, although data flies are also at some risk.
应用推荐