• 意味着站点易受攻击

    It means that your site is vulnerable.

    youdao

  • 房子中,易受攻击窗户

    In a house, the vulnerable points are the doors and Windows.

    youdao

  • 这位妇女攻击的时候,占有

    He had taken this woman when she was most vulnerable.

    youdao

  • 无论它的传输加密设备本身存有攻击漏洞。

    No matter how well its transmissions are encrypted, the device itself remains vulnerable to being hacked.

    youdao

  • 忽然想起了杰克易受攻击位置了,不是脊柱

    Then she remembers his most vulnerable spot is not the base of his spine.

    youdao

  • 明白华丽的伪装总是那些年轻易受攻击作用。

    Be aware that these are dressed up to attract the young and vulnerable.

    youdao

  • 紧急情报研究员泰勒·克林格声称工程师都是攻击对象。

    Researcher Tyler Klinger of Critical Intelligence claims engineers are vulnerable to such attacks.

    youdao

  • 脸部:露出来的最攻击的部位就是脖子了。他们露出脖子说明他们好好说话

    Faces: the only open vulnerable point is their neck, which is open because they're, well, speaking to each other.

    youdao

  • 没有记住易受攻击系统任何加密材料可能侵害。

    But this is not all - keep in mind that ANY cryptographic material created on vulnerable systems can be compromised.

    youdao

  • 研究组ISP提交了研究报告,寄希望他们能够采取有效措施保护易受攻击用户们

    The researchers have provided ISPs with their findings in the hope that they will do something to protect vulnerable customers.

    youdao

  • 他们声明能够成功操纵使用者输入到达攻击的缓冲区从而造成安全性破坏可能性非常了。

    They declared the likelihood was very low that user input could be successfully manipulated to reach a vulnerable buffer in such a way as to cause a security violation.

    youdao

  • 数据易受攻击环境中流动时,电话手持设备许多可用操作系统只能提供很少甚至安全性

    When data is flowing through a vulnerable environment, many of the available operating systems for phones and handheld devices offer little or no security.

    youdao

  • 然而攻击变得复杂攻击者们经常寻求易受攻击操作系统服务并且已经同意了应用

    However, as attacks become more sophisticated, attackers often seek vulnerable operating system services and already approved applications.

    youdao

  • 唯一令人吃惊意大利教庭被定罪5年后仍认为放在这样一个显眼易受攻击位置非常合适

    The only surprising thing was that Italy’s bishops had seen fit to keep him on in such a high-profile and vulnerable position for five full years after his conviction.

    youdao

  • 适当防火遮盖物用于保护复杂攻击机械设备的零件应远离火星处其他火源之处。

    Suitable fire resistant covers to be used to protect intricate and vulnerable items of machinery and equipment from flying sparks or other potential sources of fire.

    youdao

  • 格内尔也是攻击催生的工业形式表示担忧专家之一,这种形式使美国面临攻击的高度危险。

    Mr. Langner is among the experts who expressed fear that the attack had legitimized a new form of industrial warfare, one to which the United States is also highly vulnerable.

    youdao

  • 如果成功,则可以东部营造一个双层北约少数国家美国有着直接的关系攻击的残余部分没有

    If it succeeds, it could create a two-tier NATO in the east: a few countries with a direct relationship with America, and a vulnerable rump without.

    youdao

  • 上传文件Web应用程序攻击地方之一,因此存储它们之前一定进行验证

    Uploaded files are an important attack vector for Web applications, so it's important to validate all such uploads before you accept them for storage.

    youdao

  • 大约二百万以前我们虚弱而且易受攻击的祖先居住着山洞他们面临大自然严峻考验,生病。

    About 2 million years ago, our feeble and bulnerable (susceptable) ancestors dwelled in the cavities and they were exposed to grim hardships in nature so as to be prone to diseases.

    youdao

  • 人们担忧船东可能开始易受攻击船舶转道绕行好望角不再与日俱增风险,经行苏伊士运河。

    There are fears ship owners could start diverting vulnerable ships round the Cape of Good Hope rather than brave the increasingly risky route through Suez.

    youdao

  • 对此苹果公司上周五发布了升级软件iPhoneOS3.0.1一更新旨在修正手机攻击的问题。

    In response, Apple on Friday made available a software upgrade, iPhone OS 3.0.1, designed to fix the vulnerability.

    youdao

  • 视频还说道奥巴马一个易受攻击因为没有能力承诺的一样停止战争相反,他战争拖最大可能的程度”。

    Obama was "a vulnerable man who will not be able to stop the war, as he promised, but instead he will drag it to the maximum possible extent," the message said.

    youdao

  • 研究优点三个:一,我们方法频率的方式嵌入浮水印产生不扩展的分享影像,降低了像素易受攻击的影响

    There are three advantages of our study. 1. We embedded the watermark by frequency domain and created unexpanded shares, which reduced the impact of pixel modification effectively.

    youdao

  • 这些代码一但被植入会不知不觉地普通用户电脑上生成一张自动的“病毒网络”---首先就是易受攻击的脸谱”用户。

    Once embedded, the code would have created a “botnet” of millions of zombie computers capable of launching all manner of scams on innocent folk—starting with gullible Facebook users themselves.

    youdao

  • 美国在最容易受攻击国家中排名第九,平均48次浏览一次遭到攻击的风险英国排名三十,它攻击的概率1/63。

    The U.S. ranked ninth with one in every 48 Web surfers at risk, while the U.K. was 30th with a rate of one in 63.

    youdao

  • 人力资源十分昂贵,而且大型采购项目——例如英国将来航母项目,这一项目到严格规定的合同保护——相比易受攻击的目标

    Manpower is both expensive and a softer target than big procurement programmes, such as Britain's future aircraft-carriers, which are protected by tightly drawn contracts.

    youdao

  • ReliableSoft wareTechnologies专家侦测了潜在易受攻击程序码并且未能掌握利用任何情况方法

    Experts at Reliable Software Technologies examined the potentially vulnerable code and were unable to learn of a way to exploit any of the conditions.

    youdao

  • 美国研究人员最近发起了一项研究,找出互联网上易受攻击网络设备.他们在扫描过程中发现了21000台路由器、网络摄像头VoIP(网络电话)产品

    Researchers scanning the internet for vulnerable embedded devices have found nearly 21, 000 routers, webcams and VoIP products open to remote attack.

    youdao

  • 美国研究人员最近发起了一项研究,找出互联网上易受攻击网络设备.他们在扫描过程中发现了21000台路由器、网络摄像头VoIP(网络电话)产品

    Researchers scanning the internet for vulnerable embedded devices have found nearly 21, 000 routers, webcams and VoIP products open to remote attack.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定