• 处女座受到攻击时喜欢反击

    Virgo likes to attack back when confronted.

    youdao

  • 科学家发现各类植物受到攻击都会发出挥发性有机化合物。

    Scientists have found that all kinds of plants give out VOCs when being attacked.

    youdao

  • 物被昆虫攻击时就会发生这种情况。

    This happens when a plant gets attacked by insects.

    youdao

  • 我们会在察觉受到侵犯攻击时才会觉得

    We only feel ticklish if we detect a sense of invasion or attack.

    youdao

  • 系统受到未授权或未格式化消息攻击

    When the system is hacked with unauthorized and unformatted messages.

    youdao

  • 进行拒绝服务攻击攻击不必获得对系统的控制权。

    But with denial of service attacks, attackers don't need to gain access to a system.

    youdao

  • 这些喜欢劳顿部分原因遭到攻击,他会反击

    Those people liked Lawton in part because he hit back when attacked.

    youdao

  • 此外需要配置Snort告诉感知到攻击应采取怎样的措施。

    Additionally, you'll need to configure Snort and tell it what to do when it senses an attack.

    youdao

  • 追踪网络攻击Zone - H的数据是非常方便工具。

    When I have tracked website attacks, I've found it convenient to look at the Zone-H statistics.

    youdao

  • 复杂攻击标记着这个攻击时一个大型的心动,需要更多计划合作准备

    ComplexAttack is a flag that signifies that an attack was a larger operation that required more planning, coordination and preparation.

    youdao

  • 眼里受到攻击时我们泪水应对比如洋葱气味侵袭,进了眼睛。

    We produce tears in response to insults to the eyes—the sting of onion fumes, a tiny insect that flew into your cornea.

    youdao

  • 朋友遭到攻击时,赫罗德试图这个灵长类动物她的朋友身上弄下来,但是没有成功。

    While her friend was being attacked, Herold unsuccessfully tried to pull the primate off her.

    youdao

  • 布林,2009年底谷歌发现自己遭受一场非常复杂的网络攻击,谷歌评估各项选择

    Brin said Google was still evaluating its options when it discovered it was struck by a highly sophisticated cyber attack in late 2009.

    youdao

  • 了解Web站点遭受一些比较常见攻击必要了解这些攻击是如何工作的。

    In looking at some of the more common attacks that Web sites are subject to, it is important that you have an understanding of how these attacks work.

    youdao

  • 部分讨论了如何机智地减少成功攻击机率以及您面对成功攻击时如何作出反应。

    This part discusses how you can intelligently reduce the odds of a successful attack, as well as how to respond if you do experience a successful attack.

    youdao

  • 问到预计在顶住去年攻破HDDVD那种持续攻击BD+会表现如何犹豫了一下

    When asked if he hoped to see how well BD+ holds up under the kinds of sustained attacks that compromised HD DVD last year, Kocher hesitated.

    youdao

  • 如果不让恶意数据进入程序或者至少不在程序中处理,您的程序在面对攻击时更加健壮。

    If you can keep malicious data from entering your program, or at least keep it from being processed, your program becomes much harder to attack.

    youdao

  • 4个被测设备中的3个,在阻止安全效率测试系统提供许多项安全威胁攻击告失败

    Three of the four tested units failed to block many of the security threats delivered by the three security effectiveness test systems.

    youdao

  • 它们还要在受到其他律师攻击聘请律师自己辩护,而这唇枪舌战的比赛场地依然是律师们自己搭建的。

    They must also hire lawyers to defend themselves against attacks by other lawyers on a playing field built by lawyers.

    youdao

  • 自由我们分享你们孩子们相处经验。孩子们因为厌倦开始相互攻击时如何阻止他们的?

    Feel free to tell us about your experience of traveling with children. What did you do to keep them from killing each other out of boredom?

    youdao

  • 感觉受到不公正对待,受到诽谤攻击时,她拼命予以回击,她的肩膀前倾脖子鼓起露出肌肉

    When she felt she was being unjustly treated, slandered, or attacked and she was struggling to respond, she rolled her shoulders forward and her neck swelled, showing the play of muscles.

    youdao

  • 进行攻击设备蓝牙功能必须处于被激活状态的,而基于蓝牙服务文件共享也必须是活动的。

    Devices must have Bluetooth enabled and File Sharing over Bluetooth service active when the attack is performed.

    youdao

  • 例如描述缓冲溢出攻击时我们想像一些懂得质疑,仅仅是无条件遵循手工列出条例的办公室工作人员

    For instance, to describe a buffer overflow attack, he asks us to imagine an office worker who follows the instructions listed in a manual without questioning them.

    youdao

  • 此外,和传统防弹衣相比攻击较少变形这样就可能避免防弹衣变形而给人体造成严重伤害

    It also distorts less than conventional body armour when it is hit. That means it is less likely to cause serious injury by deflecting inward.

    youdao

  • 提及的恶性程序能很快发现进入控制世界工业过程计算机组,这说明控制系统面对这种攻击多么不堪一击

    The malicious program quickly found its way into computers controlling industrial processes the world over, demonstrating how vulnerable control systems are to such attacks.

    youdao

  • 提及的恶性程序能很快发现进入控制世界工业过程计算机组,这说明控制系统面对这种攻击多么不堪一击

    The malicious program quickly found its way into computers controlling industrial processes the world over, demonstrating how vulnerable control systems are to such attacks.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定