战斗潜能:现在只对自动攻击生效。
Combat Potency: Now only works with auto attacks (no more Shiv.)
优化自动攻击的目标选取行为来帮助减少无意的目标切换。
Improved auto-attack targeting to help reduce unintentional target switching.
一种会自动攻击新程序的计算机免疫系统,显然是不现实的。
A computer immune system that automatically attacks new programs clearly won't do the job.
自动攻击现在不仅仅是自动攻击,它还会自动帮你按邪恶攻击!
Auto attack is now literally auto attack. It will click sinister strike for you!
它描述了使用自动攻击的方法及自我改进和跟踪状态的设备和技术。
It describes an automated attack approach capable to self improve and to track the state context of a target device.
固定的科技Argonev不会自动攻击的第一目标,除非球员的船只是在系统的。
Fixed the TEC Argonev not auto-attacking past the first target unless the player's ships are in-system with it.
不想炉石传说,你不用在桌子上打牌,取而代之的是和英雄队伍去战斗,方式是自动攻击。
Unlike Heathstone, you don't play cards on table, insteadfight with a team of heroes by auto-battle.
黑客的目的就是利用自动攻击来寻找应用程序中的漏洞,进而破解应用程序,将数据直接转移到自己手中。
The goal for hackers is to break applications with automated attacks searching for vulnerabilities until the apps crack and spill data straight into the hands of the hackers.
当你在空旷区域放置步哨时,仔细观察四周你将会看到一层网格,表示步哨将会自动攻击此范围中的敌人。
If you're in an open place, look around after selecting the Sentry Gun and you will see a grid appear which indicates the line where enemies cross to trigger the auto-aim feature of the Sentry Gun.
他们写道,这里引用:“现有数据不表明被半自动攻击性武器枪击及致死的人是10年期间被明令禁止使用的武器。”
They wrote, quote: "Existing data do not show whether the number of people shot and killed with semiautonatic assault weapons declined during the 10 year period that those fire arms were banned."
提示:打开你的自动攻击在陷阱周围移动,只要你一进入攻击范围你就能自动的打到他,这比你一边狂按邪恶攻击一边移动更加安全。
Tip: Turn on your auto attacks and move yourself around the trap, as soon as you are in range you will hit him automatically. It is much safer than mashing SS as you move around the trap.
这种攻击是手动的或者自动的。
如果显示的错误信息是“用户名没有被找到”,那么攻击者就会自动编制一份用户名名单。
If it said "the user name you entered has not been found", an attacker could automatically compile a list of user names.
如果试着替自己哈痒,脑部会自动预感到这种“攻击”从而使我们感觉不到惊吓。
If we try to tickle ourselves, our brains anticipate this "attack" and prevent us from feeling panicked.
蠕虫的定义如下,蠕虫是一个自包含软件组件,可以自动执行可识别和攻击目标系统漏洞的探测操作。
By definition, a worm is a self-contained software component that automatically performs probe actions designed to identify and exploit vulnerabilities on a targeted system.
自动下线是保护到给定系统(通常但并不必须是远程的)的休眠会话不被恶意利用,帮助降低受到恶意攻击的风险。
Automatic logoff is protection of dormant sessions to a given system (generally remote, but not necessarily) from malevolent usage to help mitigate the risk of malicious attack.
最近软件得到了改进,当命令发送到支持者的电脑上时,会自动进行攻击,无需人工操作。
Recently the software was improved so that a command could be sent to a supporter’s computers and the attack would begin — no human needed.
避免数据自动存入数据库(阻止SQL注入式攻击)。
Automatically escapes data saved to the database (to prevent SQL injection attacks).
Firefox遭到的攻击其次,还好它有内置的自动更新功能。
Firefox is the second most attacked browser, but fortunately, it has a self-updating feature built in.
电子邮件、远程登录和超级用户特权都需要密码,这些密码最好各不相同而且难以通过自动化攻击猜测或推断出来。
To wit, e-mail, remote login, and superuser privileges all require a password—preferably disparate and each difficult to guess or derive using an automated attack.
组织面临的大多数攻击包括随机、无组织的攻击和有组织的、有针对性的攻击 ——两者往往都是自动进行的。
Most of the attacks that an organization will experience range from random, unstructured episodes to the well-organized and targeted variety—both of which tend to be automated.
我们的自动化系统已经到位,能够在攻击者退出服务平台前检测并阻止他们的攻击行为。
We have automatic systems in place that detect and block many attacks before they leave our infrastructure.
攻击者可以自动的在多个站点上进行测试。
The attacker can automate to go against multiple sites at one time.
这些自动程序可以攻击或者能被设置能破坏或者使网站瘫痪,甚至顺带着攫取一些甜头,从信用卡细节资料到工业设计。
These automate attacks and can be configured to deface or crash a website, or even snatch goodies ranging from credit-card details to industrial designs.
大量的攻击活动来源于僵尸网络的自动化攻击。
这些代码一但被植入,就会不知不觉地在普通用户的电脑上生成一张自动的“病毒网络”---首先就是易受攻击的“脸谱”用户。
Once embedded, the code would have created a “botnet” of millions of zombie computers capable of launching all manner of scams on innocent folk—starting with gullible Facebook users themselves.
以色列正在建造一个自动化攻击区。
如果他们找到了正确的攻击目标,那么目标标定仓就会自动计算目标的坐标。
Once they find the correct spot, the targeting pod computes the coordinates.
如果他们找到了正确的攻击目标,那么目标标定仓就会自动计算目标的坐标。
Once they find the correct spot, the targeting pod computes the coordinates.
应用推荐