• This is a typical wolf's attack: attack and then leap away quickly.

    典型进攻方式:攻击然后迅速

    youdao

  • Ever since, warnings about the imminent attack of the "bond vigilantes" have been used to attack any spending on job creation.

    那以后,有关债务义和拳(义)”随时可能发动进攻警告已经用来攻击创造就业方面的任何开支

    youdao

  • This chapter reviews essential practices not only to decrease the odds of a successful attack, but also to respond quickly when an attack inevitably succeeds.

    一章回顾了基本实践不仅包括减少成功攻击机率包括攻击不可避免时,很快地作出反应。

    youdao

  • In order to prevent attacks, minimize their impact and remove points of attack, first of all, you have to fully understand the attack methods in order to find the correct countermeasures.

    为了防止攻击最大限度地减少影响消除攻击点首先必须充分了解攻击方法以便找到正确对策

    youdao

  • Another well-known form of attack is the hybrid attack.

    另一个众所周知攻击形式混合攻击。

    youdao

  • Fundamentally, all these approaches reduce the damage of a buffer overflow attack from a program-takeover attack into a denial-of-service attack.

    从根本上讲所有这些方法都能减轻程序接管攻击拒绝服务攻击缓冲区溢出攻击所带来的破坏

    youdao

  • While critics of the CA system have long feared that such an attack could be possible, this is the first time such an attack has been seen "in the wild".

    尽管电子认证系统批评者们已经长时间担心攻击可能性还是第一自然环境中”发生这种攻击。

    youdao

  • The doves retort that NATO's Article 5, which says that an attack on one member is an attack on the whole alliance, is deterrent enough; new members who question its worth are hurting their own cause.

    反驳道北约5号文件规定了其一成员国攻击就是整个联盟的攻击,这已经足够了,对此表示怀疑成员国是在损害他们目标

    youdao

  • Even if the prey had a good sensory system to notice a predator closing in, the success rate of a nocturnal attack may be higher than a diurnal attack.

    即使猎物拥有好的感知系统注意到了食肉动物正在靠近夜间攻击成功率可能白天攻击的成功率

    youdao

  • Several different protection techniques help with multiple forms of attack, and sometimes a single attack can leverage multiple forms of intrusion to achieve the end goal.

    有几种不同保护技术可以防范多种形式攻击有时攻击可能利用多种入侵形式达到最终目标

    youdao

  • Several different techniques of protection help with multiple forms of attack, and sometimes a single attack may leverage multiple forms of intrusion to achieve the end goal.

    有几种不同保护技术可以防范多种形式攻击有时攻击可能利用多种入侵形式达到最终目标。

    youdao

  • A brute force attack is the most comprehensive form of attack, though it may often take a long time to work depending on the complexity of the password.

    攻击全面攻击形式虽然通常需要长的时间工作,这取决于密码的复杂程度

    youdao

  • It looks more like a mutual defence pact: an attack on one euro-zone member is now an attack on all.

    看起来联防公约:欧元区的一个成员袭击就是对所有成员袭击。

    youdao

  • An attack on social democracy risks, in other words, being seen as an attack on Sweden itself.

    话说,社民党攻击冒被视为攻击瑞典人自己的风险。

    youdao

  • They can be used to attack other systems, host attack tools, send spam, or just steal data.

    犯罪分子可以利用计算机网络攻击他人计算机系统软件发送垃圾邮件或是窃取资料

    youdao

  • This will help to reduce the likelihood of a full-fledged attack or to progressively weaken the attack against exploited vulnerabilities.

    帮助减少受到全面攻击可能性或者主动减少暴露的漏洞攻击。

    youdao

  • As mentioned above, a replay attack by some malicious third party is the most convenient attack.

    正如上文所提到的,来自某个恶意第三再现攻击容易遭受到的攻击。

    youdao

  • Traditional and early agile approaches both took a "greedy approach" : Traditional approaches attack the riskiest parts first and early agile approaches attack the most valuable parts first.

    传统方法早期敏捷方法都是一种贪婪方法”:传统方法攻击具风险的部分早期的敏捷方法先“攻击”最有价值的部分。

    youdao

  • Since attackers are usually trying to add malicious scripts, this particular variation is called a "cross-site scripting attack" (XSS attack).

    由于攻击通常试图添加恶意脚本,因些这种变化称为“交叉站点脚本攻击” (XSS攻击)。

    youdao

  • They said before the Delta attack that they were going to attack airplanes in Western countries, in the United States, and they did exactly that just a few months later.

    他们三角洲攻击之前过,西方国家攻击飞机,也就是美国几个月之后,他们确实做了

    youdao

  • In other words you attack might be a correct attack, you're not saying something false about this person but the truth of what your saying has no barrier at all to what he is saying, that's a fallacy.

    换言之攻击可能是个正确的攻击,对于这个你们但是你们真理没有边界,关于所说的,是个谬论

    youdao

  • In fact, the time to actually become a target of an attack or an attempted attack can be only moments after an application goes online and becomes available to the world.

    事实上只要应用程序联网公开外部,那么就立刻成为攻击目标攻击未遂目标。

    youdao

  • "It was more of an attack, a well-planned attack in the way these images were released," Chen said.

    公布这些照片攻击精心策划的攻击”,陈冠希表示。

    youdao

  • Several of these attack types are familiar; these same types of attack occur with any remotely accessible service (for example, message tampering).

    其中有些攻击类型比较常见这些相同的攻击类型会出现任何可以远程访问服务中(例如消息篡改)。

    youdao

  • Shortly after the attack, local television showed blood and debris being washed from the attack site, destroying potentially crucial evidence.

    当地电视台播出的画面显示袭击事件发生不久现场血迹残骸都被冲洗掉了,这毁坏了有可能成为关键性证据的线索。

    youdao

  • Increases the cost of attack, because the attack has to be adapted for each computer, "she says."

    认为:“就增加攻击成本因为攻击必须适应每个系统。”

    youdao

  • Increases the cost of attack, because the attack has to be adapted for each computer, "she says."

    认为:“就增加攻击成本因为攻击必须适应每个系统。”

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定