他描述了他如何攻击她的恐怖细节。
他告诉她那些男孩曾是如何攻击他、取笑他的。
我一直在研究如何攻击实例验证请求保护。
I have been researching into actual examples of how to attack the Validate Request protection.
这就是我们在和老鹰对抗中没有意识到如何攻击的关键。
This is just one of those games when we didn't realize how to attack the Hawks.
他们教会我如何去做好准备,如何使对手的精神概骂化以及如何攻击他们的弱点。
How to conceptualize the spirit of my opponents and attack them where they are weak.
我需要建议如何攻击这个问题的预期结果是列表10- 20组非常相似的名字,并可能进一步调整灵敏度结果。
I need advice how to attack this problem the expected results is to have a list with 10-20 groups of very similar names, and may be further adjust the sensitivity for more results.
这个故事我们可以骄傲地讲给朋友和子孙们听,不是关于如何攻击和战胜某种体制,而是如何做正确的决定,从而变得无比坚强。
It is a story we will proudly tell our friends and grandchildren. Not about how we had a chance to beat the system and took it, but about how we did the right thing and were forever strengthened.
不经过训练,你将无法预测你的敌人如何攻击你,在障碍前跌倒,在冲过马拉松终点线前筋疲力尽,刚跑完第一圈就对赛车失去控制。
Without training, you will not be able to anticipate how your enemy will hit you. You will trip at that hurdle. Your knees will buckle before you hit the marathon's finish line.
不经过训练,你将无法预测你的敌人如何攻击你,在障碍前跌倒,在冲过马拉松终点线前力倦神疲,刚跑完第一圈就对赛车失去操纵。
Without training, you will not be able to anticipate how your enemy will hit you. You will trip at that hurdle. Your knees will buckle before you hit the marathon's finish line.
也许某一天,科学家们将学会如何创造一个“防火墙”,以帮助阻挡树联网内的这些攻击。
Perhaps one day scientists will learn how to create a "firewall" to help prevent these attacks within the wood wide web.
如何射杀某个攻击你的人?
在发现可实现的攻击类型后,应考虑如何保护您的组织。
After discovering the types of attacks available, consider how you can defend your organization.
如何保护我的系统不受攻击?
既然已经让您意识到了威胁(希望如此),那么让我们来讨论如何保护系统免受这些攻击。
Now that I've scared you (hopefully), let's talk about how to protect systems from these attacks.
本部分讨论了您如何机智地减少成功攻击的机率,以及当您面对成功攻击时如何作出反应。
This part discusses how you can intelligently reduce the odds of a successful attack, as well as how to respond if you do experience a successful attack.
无论如何,除非肯被攻击在先,肯尼亚不太可能派兵进驻索马里。
In any case, Kenya is unlikely to send its forces into Somalia unless it is attacked first.
现在我会考虑恶意接收方的攻击,并详细描述如何保护应用免受这样的攻击。
I'll consider now attacks by malicious recipients and describe how to protect applications from such attacks.
大卫·卡梅隆本周会见了一些英国最大私人公司的代表,讨论如何保护国家免受网络攻击。
David Cameron met representatives of some of Britain's biggest private companies this week to talk about protecting the country against cyber attack.
我将要向你们展示怎么找出我被攻击以及如何修复。
I will show you how I figured out that I was hacked and how I fixed it.
让我们研究一些方案,分析攻击者如何发起攻击以及如何停止或预防他们。
Let's take a look at a few scenarios and examine how attackers launch their attacks and how they might be stopped or prevented.
你该如何超越攻击并成为更好的人?
如何保护站点不受XSS攻击?
在了解Web站点会遭受的一些比较常见的攻击时,有必要了解这些攻击是如何工作的。
In looking at some of the more common attacks that Web sites are subject to, it is important that you have an understanding of how these attacks work.
本文中,我们讨论了攻击者如何使用跨站点脚本编制作为对网站发动攻击的技术。
In this article, we discussed how attackers use cross-site scripting as a technique to launch attacks against Web sites.
调查人员称,通过调查和回溯攻击,他们已经发现了新的详细资料,是关于攻击如何发生的。
Investigators said they had discovered new details on how the strikes took place by investigating and tracing back the attacks.
例如,我们将看到为什么寻找不正确的输入是一个错误,而且攻击者如何能经常使用非法的负数(而不使用“-”字符)就可以潜入。
For example, we'll see why looking for incorrect input is a mistake, and how attackers can often sneak in illegal negative Numbers without using the "-" character.
他们如何进行攻击?
他们如何进行攻击?
应用推荐