This is a typical wolf's attack: attack and then leap away quickly.
这是典型的狼的进攻方式:攻击然后迅速跳开。
Ever since, warnings about the imminent attack of the "bond vigilantes" have been used to attack any spending on job creation.
从那以后,有关“债务义和拳(义警)”随时都可能发动进攻的警告已经被用来攻击在创造就业方面的任何开支。
This chapter reviews essential practices not only to decrease the odds of a successful attack, but also to respond quickly when an attack inevitably succeeds.
这一章回顾了基本的实践,不仅包括减少成功攻击的机率,也包括当攻击不可避免时,很快地作出反应。
In order to prevent attacks, minimize their impact and remove points of attack, first of all, you have to fully understand the attack methods in order to find the correct countermeasures.
为了防止攻击,最大限度地减少其影响和消除攻击点,首先,你必须充分了解攻击方法,以便找到正确的对策。
Another well-known form of attack is the hybrid attack.
另一个众所周知的攻击形式是混合攻击。
Fundamentally, all these approaches reduce the damage of a buffer overflow attack from a program-takeover attack into a denial-of-service attack.
从根本上讲,所有这些方法都能减轻从程序接管攻击到拒绝服务攻击的缓冲区溢出攻击所带来的破坏。
While critics of the CA system have long feared that such an attack could be possible, this is the first time such an attack has been seen "in the wild".
尽管电子认证系统的批评者们已经长时间担心攻击的可能性,这还是第一次“在自然环境中”发生这种攻击。
The doves retort that NATO's Article 5, which says that an attack on one member is an attack on the whole alliance, is deterrent enough; new members who question its worth are hurting their own cause.
鸽派反驳道,北约5号文件规定了对其一成员国的攻击就是对整个联盟的攻击,这已经足够了,对此表示怀疑的新成员国是在损害他们的目标。
Even if the prey had a good sensory system to notice a predator closing in, the success rate of a nocturnal attack may be higher than a diurnal attack.
即使猎物拥有很好的感知系统,注意到了食肉动物正在靠近,夜间攻击的成功率也可能比白天攻击的成功率高。
Several different protection techniques help with multiple forms of attack, and sometimes a single attack can leverage multiple forms of intrusion to achieve the end goal.
有几种不同的保护技术可以防范多种形式的攻击,而有时一次攻击可能利用多种入侵形式来达到最终目标。
Several different techniques of protection help with multiple forms of attack, and sometimes a single attack may leverage multiple forms of intrusion to achieve the end goal.
有几种不同的保护技术可以防范多种形式的攻击,而有时一次攻击可能利用多种入侵形式才达到最终目标。
A brute force attack is the most comprehensive form of attack, though it may often take a long time to work depending on the complexity of the password.
蛮力攻击是最全面的攻击形式,虽然它通常需要很长的时间工作,这取决于密码的复杂程度。
It looks more like a mutual defence pact: an attack on one euro-zone member is now an attack on all.
这看起来更像一个联防公约:对欧元区的一个成员袭击就是对所有成员袭击。
An attack on social democracy risks, in other words, being seen as an attack on Sweden itself.
换句话说,对社民党的攻击是在冒被视为攻击瑞典人自己的风险。
They can be used to attack other systems, host attack tools, send spam, or just steal data.
犯罪分子可以利用计算机网络攻击他人计算机系统、软件、发送垃圾邮件或是窃取资料。
This will help to reduce the likelihood of a full-fledged attack or to progressively weaken the attack against exploited vulnerabilities.
这将帮助减少受到全面攻击的可能性,或者主动减少对暴露的漏洞的攻击。
As mentioned above, a replay attack by some malicious third party is the most convenient attack.
正如上文所提到的,来自某个恶意第三方的再现攻击是最容易遭受到的攻击。
Traditional and early agile approaches both took a "greedy approach" : Traditional approaches attack the riskiest parts first and early agile approaches attack the most valuable parts first.
传统方法和早期的敏捷方法都是一种“贪婪的方法”:传统方法先“攻击”最具风险的部分,而早期的敏捷方法先“攻击”最有价值的部分。
Since attackers are usually trying to add malicious scripts, this particular variation is called a "cross-site scripting attack" (XSS attack).
由于攻击者通常是试图添加恶意的脚本,因些这种变化被称为“交叉站点脚本攻击” (XSS攻击)。
They said before the Delta attack that they were going to attack airplanes in Western countries, in the United States, and they did exactly that just a few months later.
他们在三角洲攻击之前说过,要在西方国家攻击飞机,也就是在美国,几个月之后,他们确实做了。
In other words you attack might be a correct attack, you're not saying something false about this person but the truth of what your saying has no barrier at all to what he is saying, that's a fallacy.
换言之,你的攻击可能是个正确的攻击,对于这个人你们没说错,但是你们说的真理没有边界,关于他所说的,是个谬论。
In fact, the time to actually become a target of an attack or an attempted attack can be only moments after an application goes online and becomes available to the world.
事实上,只要应用程序联网并公开给外部,那么就会立刻成为攻击目标或攻击未遂的目标。
"It was more of an attack, a well-planned attack in the way these images were released," Chen said.
“公布这些照片是对我的攻击,精心策划的攻击”,陈冠希表示。
Several of these attack types are familiar; these same types of attack occur with any remotely accessible service (for example, message tampering).
其中有些攻击类型是比较常见的,这些相同的攻击类型会出现在任何可以远程访问的服务中(例如,消息篡改)。
Shortly after the attack, local television showed blood and debris being washed from the attack site, destroying potentially crucial evidence.
当地电视台播出的画面显示,在袭击事件发生后不久,现场的血迹和残骸都被冲洗掉了,这毁坏了有可能成为关键性证据的线索。
Increases the cost of attack, because the attack has to be adapted for each computer, "she says."
她认为:“这就增加了攻击的成本,因为攻击必须适应每个系统。”
Increases the cost of attack, because the attack has to be adapted for each computer, "she says."
她认为:“这就增加了攻击的成本,因为攻击必须适应每个系统。”
应用推荐