但世行很快的恢复了系统的正常的正常运行,表示没有证据显示有攻击的迹象。
But it quickly resumed its normal operations and says it has seen no evidence of any attacks.
当受到这一漏洞攻击时,虽然一些用户能够恢复他们的数据,但大多数人只能束手无策,没有任何办法找回被清除的文件和信息。
Although some users have been able to restore their data after being hit by the bug, many others have simply been left without any way of recovering the files and information that have been erased.
他们发现糖就像兴奋剂一样,让细菌的正常反应得以恢复,从而使它们对抗生素的攻击更为敏感。
They found that sugar ACTS as a stimulant that switches on normal bacterial responses, rendering the bugs vulnerable to antibiotic attack.
RIAA迅速找到了问题所在并在数小时内恢复了页面,不过此时网站被攻击的消息早已是人尽皆知。
The RIAA fixed the problem within a few hours and eventually all the ‘lost’ content was restored, but not before thousands of people had fun with it.
中国最大的搜索引擎百度昨日遭遇自1999年成立以来最严重的攻击,4小时后才恢复正常。
Baidu, China's largest Internet search engine, was the target of a four-hour cyber attack yesterday, the most severe since it was established in 1999.
Endris在恢复的时候在脑子里回想着被攻击的情景;他想以后还能不能再冲浪了。
Endris replayed the attack in his mind as he recuperated; he wondered if he'd ever surf again.
这个广受欢迎的微博客网站,在星期四的大部分时间里停止服务,它其实是在抵御一场网络攻击,但当天晚间服务得到了恢复。
Twitter, the popular microblogging site, was out of service much of the day Thursday as it worked to defend itself against a Web attack, but service appeared to have been restored by late evening.
能够在所有可能的攻击下继续工作的系统是不存在的,但是系统可以抵御许多攻击或在受攻击后迅速恢复至可用状态。
No system can keep up under all possible attacks, but systems can resist many attacks or rapidly return to usefulness after an attack.
澳大利亚国防部称这些黑客攻击发生在周一至周二时间段,而他们则被迫关闭了RAAF的站点,目前该网站已经恢复运行。
The Aussie Department of Defence confirmed that the hack took place between Monday and Tuesday, forcing it to pull the entire RAAF website offline. The site has now been restored.
我恢复站点到3天前的状态(那时候被攻击)。
I restored my site from 3 days ago (when it happened) I lost a few posts but the damage was gone.
可存活性被用来表明一个系统在面对蓄意攻击、故障失效或偶发事故而仍能完成其任务并及时恢复整个服务的能力。
Survivability is the capability of a system to fulfill its mission in the presence of attacks, failures, or accidents, and recover full service in a timely manner.
您可以备份和恢复注册表的话,这是损坏的病毒攻击。
You can back up Registry and restore it if it is damaged by a virus attack.
索尼已开始恢复旗下网络平台PlayStation Net work。上月,这个平台遭到了黑客的攻击,约1亿用户信息泄露。
Sony began to restore its PlayStation Network after hackers breached its security, compromising the personal information of 100m users last month.
实验结果表明,该算法可以从全局和局部或非线性几何攻击中恢复失真,是实用和有效的。
Experiment results show that this algorithm can restore distortion caused by global and local or no-linear geometrical attack, and it is practical and effective.
如果她攻击带有印记的单位,那么印记就会触发,造成魔法伤害,并恢复能量值。
Akali's melee attacks against a marked target will trigger and consume the mark to cause additional damage and restore energy.
一个玩家可以让低血量的蟑螂钻地并在几秒钟内恢复满,这样他就可以爬出来接着攻击机枪兵了。
A player can burrow a Roach at low health for it to regenerate back to full health in seconds, at which point it can unburrow and begin attacking the Marines again.
然而,这盘区域可以通过病毒攻击或硬件故障,这使得它无法使用HP系统恢复被损坏。
However, this disk area can be damaged by virus attacks or hardware failures which makes it impossible to use the HP System Recovery.
“毒蛇守护”修改为:猎人获得毒蛇守护,使远程和近战攻击能够恢复法力,但降低你的伤害50%。
Aspect of the viper changed to - the hunter takes on the aspect of the viper, causing ranged and melee attacks to regenerate mana but reducing your total damage done by 50%.
实验表明,使用该方法能较好地恢复图像,有效地同步水印检测器与水印信号,从而使水印对仿射变换攻击具有鲁棒性。
The experiment result shows that the synchronization method can synchronize the detector with the watermark perfectly and that the watermark is robust to affine transformation attack.
受此攻击失去的属性点能够以每天1点的速度恢复。
Ability points lost to damage return on their own at the rate of 1 point per day for each damaged ability.
基于时间的缓存攻击是指通过分析处理器中算法的不同执行时间来恢复密钥的攻击。
Time-based cache attacks analyzes the time difference in the execution of algorithm over a processor, and recovers the secret key.
为提高可恢复双水印算法抵抗伪造攻击的能力,提出一种用于图像篡改检测和恢复的安全双水印算法。
To improve the security against the counterfeiting attack, this paper proposes a secure dual watermark scheme for image tamper detection and recovery.
网站受攻击或者当机时如何快速恢复?
How to recover the website rapidly when it is attacked or crash?
分析了全光网络分布式攻击定位算法,构建了全光网络攻击定位与恢复的仿真平台。
In all-optical networks, distributed algorithms for attack localization was analyzed, and an all-optical network simulation platform was constructed for attack localization and resumption.
这个方案针对网格水印的两个难点:网格的频率分解和受攻击网格的拓扑恢复。
The algorithm focuses on the two challenges of mesh watermarking, i. e. , frequency decomposition of meshes and topology reconstruction of attacked meshes.
这个方案针对网格水印的两个难点:网格的频率分解和受攻击网格的拓扑恢复。
The algorithm focuses on the two challenges of mesh watermarking, i. e. , frequency decomposition of meshes and topology reconstruction of attacked meshes.
应用推荐