总是使用攻击指令在活跃的战场上移动,除非你发出全线撤退的命令。
Always use the Attack Move command to move troops across an active battlefi eld unless you’re ordering an all-out retreat.
如果你选择攻击指令而且叙述一个目标,发射机将会不管友好的单位接近向挑选的目标开枪。
If you select the Attack command and specify a target, the catapult will fire at the selected target regardless of friendly unit proximity.
纳德勒在癌细胞上发现了一种分子,就是新研制的T型细胞接受指令发起攻击的目标。
Nadler discovered the molecule on cancer cells that the newly engineered T-Cells were instructed to target.
他希望召集战友发起攻击,并释放以DNA形式封装指令的细菌。
It wants to call over the troops for an attack, so it releases bacteria encoded with packets of information in the form of DNA.
如果程序以root权限执行时执行了利用指令码,则攻击者将得到rootshell。
If the exploit is run while the program is running as root, then the attacker will get a root shell.
指令码人员是将来的骇客,他们的知识足够对易攻击的机器执行预编码的指令码,但还没有足够的知识建立这样的指令码。
Script kiddies are would-be hackers who know enough to run a pre-coded script against a vulnerable machine, but not enough to create such a script in the first place.
攻击CFG生成进程也可以是通过混淆汇编代码以致它不能够正确地确定跳转指令的目标,比如使用寄存器指示跳转目标。
The CFG generation process can also be attacked by obfuscating the assembly code such that one cannot determine the correct target of a jump instruction, such as using a jump through register.
杀戮指令:这项技能提高你宠物特殊技能造成的伤害60%,每次攻击减少20%的伤害加成。1分钟冷却。
Kill Command: This ability now increases the damage done by your pet's special abilities by 60%. Each attack will reduce the damage bonus by 20%. 1 minute cooldown.
介绍了多目标攻击的基本概念及其相关技术,进行了无线电指令修正通道相互干扰概率分析。
This paper introduces the basic concepts of multi target attacking and its relative technologies, analyses the probability of the interference between wireless instruction modifying channels.
宠物指令:攻击,跟随,停留。
指令表随机化(isr)技术是一种新型的保护系统免遭任何类型注入码攻击的通用方法。
ISR (Instruction Set Randomization) is a new, general approach for safeguarding systems against any type of code-injection attack.
在预定航路基础上利用时间误差信号生成侧向机动指令,通过航路动态规划,实现对攻击时间的控制。
According to the time error, the yaw maneuvering command was generated and route dynamic planning on the basis of the pre-determined route was done to control the impact time.
这类擅用攻击的潜在损害程度取决于指令码所执行的内容。
The potential damage from such an exploit depends on the script that is executed.
这类擅用攻击的潜在损害程度取决于指令码所执行的内容。
The potential damage from such an exploit depends on the script that is executed.
应用推荐