• 描述了他如何攻击恐怖细节

    He described in chilling detail how he attacked her.

    《柯林斯英汉双解大词典》

  • 告诉那些男孩曾是如何攻击取笑他的。

    He told her how the boys had set on him, teasing him.

    《柯林斯英汉双解大词典》

  • 一直研究如何攻击实例验证请求保护

    I have been researching into actual examples of how to attack the Validate Request protection.

    youdao

  • 就是我们和老鹰对抗没有意识到如何攻击关键

    This is just one of those games when we didn't realize how to attack the Hawks.

    youdao

  • 他们教会如何去做好准备,如何使对手精神骂化以及如何攻击他们弱点

    How to conceptualize the spirit of my opponents and attack them where they are weak.

    youdao

  • 需要建议如何攻击这个问题预期结果列表10- 20非常相似名字可能进一步调整灵敏度结果。

    I need advice how to attack this problem the expected results is to have a list with 10-20 groups of very similar names, and may be further adjust the sensitivity for more results.

    youdao

  • 这个故事我们可以骄傲地讲给朋友子孙们听,不是关于如何攻击战胜某种体制而是如何正确的决定,从而变得无比坚强。

    It is a story we will proudly tell our friends and grandchildren. Not about how we had a chance to beat the system and took it, but about how we did the right thing and were forever strengthened.

    youdao

  • 经过训练无法预测敌人如何攻击你,障碍跌倒,在冲过马拉松终点线前筋疲力尽,刚跑完第一圈就对赛车失去控制。

    Without training, you will not be able to anticipate how your enemy will hit you. You will trip at that hurdle. Your knees will buckle before you hit the marathon's finish line.

    youdao

  • 经过训练无法预测敌人如何攻击你,障碍跌倒,在冲过马拉松终点线前力倦神,刚跑完第一圈就对赛车失去操纵。

    Without training, you will not be able to anticipate how your enemy will hit you. You will trip at that hurdle. Your knees will buckle before you hit the marathon's finish line.

    youdao

  • 许某一天,科学家们将学会如何创造一个“防火墙”,以帮助阻挡树联网内的这些攻击

    Perhaps one day scientists will learn how to create a "firewall" to help prevent these attacks within the wood wide web.

    youdao

  • 如何射杀某个攻击的人?

    How to shoot at someone who outdrew you?

    youdao

  • 发现可实现攻击类型后,应考虑如何保护组织

    After discovering the types of attacks available, consider how you can defend your organization.

    youdao

  • 如何保护系统不受攻击

    How do I protect my system from attack?

    youdao

  • 既然已经意识到了威胁(希望如此),那么让我们来讨论如何保护系统免受这些攻击

    Now that I've scared you (hopefully), let's talk about how to protect systems from these attacks.

    youdao

  • 部分讨论了如何机智地减少成功攻击机率以及您面对成功攻击如何作出反应。

    This part discusses how you can intelligently reduce the odds of a successful attack, as well as how to respond if you do experience a successful attack.

    youdao

  • 无论如何除非攻击在先,肯尼亚不可能派兵进驻索马里。

    In any case, Kenya is unlikely to send its forces into Somalia unless it is attacked first.

    youdao

  • 现在我会考虑恶意接收方攻击详细描述如何保护应用免受这样攻击

    I'll consider now attacks by malicious recipients and describe how to protect applications from such attacks.

    youdao

  • 大卫·卡梅隆本周会见了一些英国最大私人公司代表讨论如何保护国家免受网络攻击

    David Cameron met representatives of some of Britain's biggest private companies this week to talk about protecting the country against cyber attack.

    youdao

  • 将要你们展示怎么找出攻击以及如何修复

    I will show you how I figured out that I was hacked and how I fixed it.

    youdao

  • 我们研究一些方案分析攻击如何发起攻击以及如何停止预防他们。

    Let's take a look at a few scenarios and examine how attackers launch their attacks and how they might be stopped or prevented.

    youdao

  • 如何超越攻击成为更好

    How do you stay above the attacks and be the better person?

    youdao

  • 如何保护站点不受XSS攻击

    How to secure a site against XSS attacks?

    youdao

  • 了解Web站点遭受一些比较常见攻击时,必要了解这些攻击如何工作的。

    In looking at some of the more common attacks that Web sites are subject to, it is important that you have an understanding of how these attacks work.

    youdao

  • 本文中,我们讨论了攻击如何使用跨站点脚本编制作为网站发动攻击技术

    In this article, we discussed how attackers use cross-site scripting as a technique to launch attacks against Web sites.

    youdao

  • 调查人员通过调查回溯攻击他们已经发现了新的详细资料,是关于攻击如何发生的。

    Investigators said they had discovered new details on how the strikes took place by investigating and tracing back the attacks.

    youdao

  • 例如我们看到为什么寻找不正确输入一个错误而且攻击如何经常使用非法负数(不使用“-字符)就可以潜入

    For example, we'll see why looking for incorrect input is a mistake, and how attackers can often sneak in illegal negative Numbers without using the "-" character.

    youdao

  • 他们如何进行攻击

    How will they attack?

    youdao

  • 他们如何进行攻击

    How will they attack?

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定