警方至今未能追捕到攻击者。
他用膝盖猛撞攻击者的下身。
所有的攻击者都是男性,年龄在25到30岁之间。
攻击者被称是在报复一名14岁男孩,称他是学校一霸。
The attackers were said to be taking revenge on the 14-year-old, claiming he was a school bully.
海龟颈部和四肢的肌肉及骨骼的特殊设计使它能把暴露在外的部分缩回去,这样攻击者只能去咬坚硬的外壳。
The particular design of muscles and bones in the neck and limbs of the turtle allow that it can draw in its exposed parts such that an attacker can find nothing but hard shell to bite.
响亮的声音通常可以让攻击者冷静下来。
在这样的时候,可能隐藏着攻击者。
出于爱和尊重,他实际上想要接受打击。他应该走到里面去,因为现在攻击者都躲在里面。
Out of love and respect, he actually wants to take the blows. He should walk on the inside—because that's where attackers are all hiding these days.
有80名攻击者的一个小队在黎明前发起了一次全面进攻。
A group of 80 attackers launched an all-out assault just before dawn.
其他参加聚会的人从攻击者手中救出了这名受伤的男子。
Other partygoers rescued the injured man from his assailant.
蚂蚁储存食物,击退攻击者,并使用化学信号联系彼此以防被攻击。
Ants store food, repel attackers and use chemical signals to contact one another in case of attack.
如果您的程序是数据的浏览器或者编辑器——比如文字处理器或者图像显示器——那么那些数据有可能来自攻击者,所以那是不可信的输入。
If your program is a viewer or editor of data—such as a word processor or an image displayer—that data might be from an attacker, so it's an untrusted input.
这两兄弟并肩战斗,反对攻击者。
如果攻击者可以影响所返回的数据,就需要小心。
Be careful if an attacker could influence the data that's returned.
攻击者找到漏洞的速度比你想想的快多了。
An attacker can discover vulnerabilities much faster than you think!
不要让攻击者控制任何临时文件。
这类攻击可以将有效域名指向攻击者地址。
Such an attack can point valid domain names at attacker addresses.
同样,攻击者只需要很少的资源。
攻击者可以提供清单8所示的输入。
攻击者盗取了所有10个指纹时会怎样呢?
现在,攻击者需要找到某个地方来输入恶意脚本。
Now, an attacker would need to find somewhere to input a malicious script.
攻击者打裂搁板并把它们堆在跑道上.
The attacker cracked the racks and stacked them on the track.
这个信息不会给攻击者提供详细的内容。
这一设置确保攻击者不能修改JNDI命名空间。
This setting ensures that attackers cannot modify the JNDI namespace.
他们做起来并不象内部攻击者那样容易。
有时私人攻击者并不是为了访问信息。
Sometimes privacy attackers do not seek access to underlying information.
攻击者需要多少的努力与知识?
词汇攻击者可用来描述恶意黑客。
The term attacker can be used to describe a malicious hacker.
他的所有这些风格特征都受到攻击者模仿嘲弄。
All these peculiarities of his style have been parodied by his assailants.
从本质上说,如果您允许攻击者在这样的机器上以任何方式运行代码,则攻击者完全可以接管该机器。
Essentially, if you allow an attacker to run code on such a machine through any means, the attacker can completely take over the machine.
应用推荐