• We had only a vague description of the attacker.

    我们只有那个袭击者粗略描述

    《牛津词典》

  • The attacker knocked on their door and made a lunge for Wendy when she answered.

    袭击者他们温迪开门,向猛冲过去。

    《柯林斯英汉双解大词典》

  • This information will help us build a picture of his attacker.

    条信息有助于描画出袭击人的相貌。

    《牛津词典》

  • The attacker threatened them with a gun.

    袭击者威胁他们

    《牛津词典》

  • She was barely able to stammer out a description of her attacker.

    只能勉强结结巴巴说一说袭击人是什么模样。

    《牛津词典》

  • The drawing is said to be a good likeness of the girl's attacker.

    据说那幅画像袭击那个女孩的歹徒。

    《牛津词典》

  • If your program is a viewer or editor of datasuch as a word processor or an image displayer—that data might be from an attacker, so it's an untrusted input.

    如果程序数据浏览器或者编辑器——比如文字处理器或者图像显示器——那么那些数据有可能来自攻击者,所以可信的输入。

    youdao

  • Luckily, Zhang had just learned how to escape from an attacker, a person who plans to hurt someone.

    运的是,张刚学会了如何从计划伤害他人的袭击者手中逃脱。

    youdao

  • A creative attacker can take advantage of a buffer overflow vulnerability through stack-smashing and then run arbitrary code (anything at all).

    创造力的攻击者透过摧毁堆叠利用缓冲区溢位弱点然后执行任何程序码。

    youdao

  • The sophisticated attacker finds a weakness in a similar type of software, and tries to use that to exploit the system.

    富有经验的攻击者可以发现同类软件缺点并且尝试利用这些弱点进入系统

    youdao

  • A common scenario is that the attacker calls the shopper, pretending to be a representative from a site visited, and extracts information.

    一个常见场景攻击者打电话购物者假装购物者所访问站点代表并且提取信息。

    youdao

  • The first scenario looks at a situation in which a disgruntled employee is the attacker.

    第一种方案研究的攻击者心怀不满雇员情况

    youdao

  • For a second time, I retreated a step while my attacker relented in his attack.

    后退了一步,同时,袭击者攻击也减缓了。

    youdao

  • But missile attacks on ships are rare, so it is difficult to know just how safe a ship really is-especially if an attacker launches a dozen or so missiles at once.

    舰船受到导弹攻击的案例非常因此很难判断条战舰躲过导弹攻击的劫数多大,特别是在攻击者一次发射多枚导弹的情况下。

    youdao

  • Determining the identity of the attacker was a matter of narrowing down the line of potential suspects.

    确定攻击者身份需要逐渐缩小一连串嫌疑人的范围。

    youdao

  • Women were cooking dinner, men were praying and children were playing nearby when the attacker struck, a witness said.

    妇女烹饪晚餐男子祈祷孩子附近攻击者击中一位目击者说。

    youdao

  • Worst of all, the identity of the attacker may remain a mystery.

    最糟糕攻击者身份一个

    youdao

  • For instance, pseudo-random Numbers are used for process IDs and packet IDs, which makes spoofing significantly more difficult for a would-be attacker.

    例如伪随机数可用于进程IDid,使得那些想要进行攻击的人很难进行欺骗

    youdao

  • Another term for an attacker is a black hat.

    攻击者一个词汇帽(black hat)。

    youdao

  • Therefore, as a hack, an attacker might authenticate as a valid user, but then provide an HTTP header (perhaps the iv-cred) that implies more permissions than he actually has.

    因此攻击者可能作为有效用户通过认证然后提供一个HTTP 消息(可能为 iv-cred ),这个消息头表明实际上更多权限

    youdao

  • A malicious attacker can make use of this behavior and launch a remote denial-of-service attack against a vulnerable network service over the Internet.

    恶意攻击可以利用一点,通过Internet网络服务发动远程拒绝服务攻击

    youdao

  • Essentially, if you allow an attacker to run code on such a machine through any means, the attacker can completely take over the machine.

    从本质上说如果允许攻击这样机器任何方式运行代码,则攻击者完全可以接管机器。

    youdao

  • But once an attacker can run code on such a machine, the attacker instantly attains complete control.

    但是一旦攻击可以这样机器上运行代码,就可以立即获取完全控制

    youdao

  • Although URIs provide a lot of flexibility, if you're accepting a URI from a potential attacker, you need to check it before passing it on to anyone else.

    尽管uri提供很大灵活性,可是如果接收到了一个来自攻击者的URI,您需要转给任何其他人之前检查它。

    youdao

  • If an attacker can cause a buffer to overflow, then the attacker can control other values in the program.

    如果攻击能够导致缓冲区溢出那么它就控制程序中的其他

    youdao

  • Your application might need a few more, but limit them -- don't accept data from a potential attacker unless it's critically needed.

    应用程序可能还需要更多但是要限制它们 ——除非是特别需要,否则不要接受潜在攻击者数据

    youdao

  • The problem is that if an attacker can control the underlying libraries used by a program, the attacker can completely control the program.

    问题如果攻击可以控制程序用到底层,那么攻击者就可以控制整个程序。

    youdao

  • Even if monitored, a casual attacker will be stymied by the presence of backspace and other characters that apparently alter the presence or order of characters in the password string.

    即使受到监视,使用后退或者其他明显破坏密码字符串显示顺序字符,都可以使偶然攻击无所适从

    youdao

  • The attacker, a veteran systems administrator, has a problem with her job and takes it out on the systems she is trusted to administer, manage, and protect.

    攻击者名经验丰富系统管理员工作中遇到问题自己管理、保护系统发泄

    youdao

  • The attacker, a veteran systems administrator, has a problem with her job and takes it out on the systems she is trusted to administer, manage, and protect.

    攻击者名经验丰富系统管理员工作中遇到问题自己管理、保护系统发泄

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定