边缘政策的攻击时间点。
我平常会查看动态sql的攻击时间和CPU时间视图。
I normally look at views of elapsed times and CPU times for dynamic SQL.
构造一枚虚拟领弹按指定的攻击时间和攻击角度以直线飞向目标。
The virtual-leader is introduced, which would fly straightly to the target from the designated impact angle at the designated impact time.
穆昆丹说:“现在的海盗攻击时间,都发生在亚丁湾的东部和北部。
"Now the attacks are taking place to the East and the North of the Gulf of Aden, " noted Mukundan.
有一个聊天室“为邀请制,12个人左右”他说,由他们挑选目标及攻击时间。
There is a chat room "that is invite only, with a dozen or so people," he said, that pick the targets and the time of attack.
在预定航路基础上利用时间误差信号生成侧向机动指令,通过航路动态规划,实现对攻击时间的控制。
According to the time error, the yaw maneuvering command was generated and route dynamic planning on the basis of the pre-determined route was done to control the impact time.
花更多时间看教育类节目的孩子,对其他孩子的情绪性攻击会增加。
Children spending more time watching educational programs increase their emotional aggression toward other children.
当实验者记录下游戏玩家从列表中阅读“攻击性”或“非攻击性”词汇所花的时间时,我们能确定他们实际上在测量什么吗?
And when experimenters record the time it takes game players to read "aggressive" or "non-aggressive" words from a list, can we be sure what they are actually measuring?
通过在适当的时间删除目录,攻击者可以删除计算机中的任何文件。您不应该信任“. .”。
By moving directories at the right time, an attacker could delete every file in the computer.
但是在有噪音鱼缸里的三刺鱼,花更多的时间攻击那些并非作为食物的猎物,比如小块的水藻。
But the sticklebacks in noisy tanks spent more time attacking what's not for dinner, like bits of algae.
根据密码的复杂程度,某些蛮力攻击可能花费一个星期的时间。
Some brute force attacks can take a week depending on the complexity of the password.
攻击者通过查找相对简短的处理时间,有可能会利用这个延长的处理属性。
An attacker can potentially exploit this extended processing attribute by looking for relatively short processing times.
轻、快以及夸张的锋利,唯一的问题就是僵尸群不会在你每次攻击后给你时间让你摆个夸张的姿势再吟两句俳句。
Light, fast and ridiculously sharp, the only problem is how the hordes won't give you time to pose dramatically and whisper haiku after each killing stroke.
他举止严肃,穿着无可挑剔,尽管他树了很多敌人,但在一长段时间里,人们认识他不会受任何攻击的影响。
With his strict demeanour and his impeccable manner of dress he was for a long time considered impervious to any kind of attack, even though he haad made quite a number of enemies.
电子攻击的速度让人没有时间进行冷静的反思,并且适合抢占先机,甚至先发制人的攻击。
The speed with which electronic attacks could be launched gives little time for cool-headed reflection and favours (early, even pre-emptive, )attack.
对手的适应能力很强并且不断地找寻新的攻击方法,因此随着时间的推移我们对于黑客软件的分类列表本身也在不断地增长。
The adversary is adapting and always finding new methods of attack, so the list of categories itself is growing over time as well.
你的时间和精力都要花费在保护自己免遭别人攻击的事情上。
Your energies and time will be spent trying to stop others, and defending yourself against their atacks.
如果测量到的全部时间都比大多数其他测量时间短,则攻击者可以合理地判断他们已经正确输入了释放时间。
If the overall time is measurably shorter than most other measured times, the attacker can be reasonably assured they have entered the release times correctly.
所以你吃的时间越长,你的牙齿暴露于酸的攻击的时间就越长。
Therefore, the more times you eat the more times your teeth are exposed to an acid attack.
蛮力攻击是最全面的攻击形式,虽然它通常需要很长的时间工作,这取决于密码的复杂程度。
A brute force attack is the most comprehensive form of attack, though it may often take a long time to work depending on the complexity of the password.
总的传输时间达到:从基准的1分钟达到完全攻击场景中的13分钟。
The total transfer time went way up: from just 1 minute at the baseline to almost 13 minutes under the full attack scenario.
例如,当诱惑攻击和你没有时间与上帝对话——只需大声呼喊!
For instance, when temptation strikes and you don't have time for a long conversation with God — simply cry out!
即每次修订Web站点时都花点时间,为您的站点防止大多数攻击。
The idea is to spend a little bit of time at each revision of your Web site and prevent the most common attacks on your site.
如果我有时间的话,我甚至会告诉他们我的攻击计划呢。
If I have time, I will usually tell them what my attack plan will be.
这种类型卫星在执行低轨道攻击任务时,从发射到攻击的共需要不到15分钟的飞行时间。
Total flight time from launch to impact for these types of weapons is usually less than 15 minutes when attacking low orbits.
根据应用程序的流行度,攻击幅度可以为一小时攻击几次至同一时间段内攻击数百甚至数千次。
Depending on the application's popularity, attacks can range from only a few an hour to several hundred or thousand in the same time period.
“很难在某个特定的时间进行网络攻击,”他说,“如果网络攻击被当作军事武器,你需要预先设定时间和攻击效果。”
"It's hard to do it at a specific time," he says. "if a cyber-attack is used as a military weapon, you want a predictable time and effect."
尽管电子认证系统的批评者们已经长时间担心攻击的可能性,这还是第一次“在自然环境中”发生这种攻击。
While critics of the CA system have long feared that such an attack could be possible, this is the first time such an attack has been seen "in the wild".
这大部分将会由以色列攻击持续的时间和哈马斯的幸存或灭绝来决定。
Much of this will be determined by the duration of Israeli attacks and the survival or demise of Hamas.
这大部分将会由以色列攻击持续的时间和哈马斯的幸存或灭绝来决定。
Much of this will be determined by the duration of Israeli attacks and the survival or demise of Hamas.
应用推荐