Unknown attackers riddled two homes with gunfire.
不明来路的袭击者用枪把两座房屋打得千疮百孔。
All the attackers were male, aged between 25 and 30.
所有的攻击者都是男性,年龄在25到30岁之间。
He appealed for information from anyone who saw the attackers.
他呼吁来自目睹袭击者的信息。
The dead men could have been the victims of mistaken identity. Their attackers may have wrongly believed them to be soldiers.
这些死者可能是错认身份的受害者,袭击者可能误以为他们是当兵的。
In times like these, there might be attackers hidden about.
在这样的时候,可能隐藏着攻击者。
Out of love and respect, he actually wants to take the blows. He should walk on the inside—because that's where attackers are all hiding these days.
出于爱和尊重,他实际上想要接受打击。他应该走到里面去,因为现在攻击者都躲在里面。
Ants store food, repel attackers and use chemical signals to contact one another in case of attack.
蚂蚁储存食物,击退攻击者,并使用化学信号联系彼此以防被攻击。
Attackers fired machine guns at the convoy.
袭击者们向护运车队开机枪。
The Tunisian military has sent reinforcements and helicopters to the area, and authorities have been hunting several attackers who were still at large.
突尼斯军方已经派出增援部队及直升机到该区域,官方也正在追捕几名在逃人员。
The two brothers fought together against their attackers.
这两兄弟并肩战斗,反对攻击者。
Also, not all hackers are attackers — many hackers write the programs that defend you!
同样,并非所有黑客都是攻击者-许多黑客编写保护您的程序!
He said unfortunately one of the attackers managed to escape.
他说,遗憾的是其中一名袭击者设法逃逸。
This suggests the attackers may not have been Iraqi.
这表明,袭击者可能不是伊拉克人。
Don't let attackers control any temporary files.
不要让攻击者控制任何临时文件。
This prevents attackers from stealing information from the main page.
这样可以防止攻击者从主页面中窃取信息。
Don't give attackers any help.
不要给攻击者以任何帮助。
Internal attackers are the most common sources of cracking attacks because attackers have direct access to an organization's systems.
内部攻击者是解密攻击最常见的来源,因为攻击者具有对组织系统的直接访问权。
Not all attackers are hackers — some attackers don't know anything about computers.
并非所有攻击者都是黑客-有些攻击者根本不了解计算机。
This setting ensures that attackers cannot modify the JNDI namespace.
这一设置确保攻击者不能修改JNDI命名空间。
They don't have it as easy as internal attackers.
他们做起来并不象内部攻击者那样容易。
Sometimes privacy attackers do not seek access to underlying information.
有时私人攻击者并不是为了访问信息。
Officials said two attackers were killed and one captured.
官方称两个袭击者被杀害,一个被捕。
It's also clear that attackers don't really need source code.
还有一点很清楚,攻击者实际上并不需要源代码。
Unfortunately, passing data from attackers to libraries that interpret that data is common.
不幸的是,将数据从攻击者传递到对数据进行解释的库是非常常见的。
Sometimes attackers try to slip information out slowly, hidden in ordinary Internet traffic.
有时,攻击者隐匿在普通互联网通讯中,试图慢慢窃取信息。
Other attackers are disgruntled employees seeking revenge on a company.
其它攻击者是寻求报复公司的心怀不满的雇员。
Basically, attackers have a lot of advantages that you as a defender don't.
基本上,攻击者拥有多个防御者不具备的有利条件。
Software is the same: complex code creates more opportunities for hackers and attackers.
软件也是一样的道理:复杂的代码会给黑客或攻击者创造更多的机会。
The two attackers escaped on a motorcycle.
两名袭击者骑摩托车逃离了现场。
The two attackers escaped on a motorcycle.
两名袭击者骑摩托车逃离了现场。
应用推荐