虽然这个恐怖组织建立了一个庞大的、秘密的外部行动部门,致力于攻击西方,但它也形成了一种支持和鼓励个人发动袭击的后备战略。
While the terror group established a large, secretive external operations wing bent on attacking the West, it has also cultivated a backup strategy of enabling and inspiring attacks by individuals.
塞浦路斯同样遭受了袭击,远在西边的意大利和西西里也遭到了攻击。
Cyprus, likewise, suffers from these attacks, and so far west as Italy and Sicily are under attack.
查明这些袭击的罪犯,几乎是不可能的,因为网络攻击通常会通过多层被感染的计算机进入,以掩盖其发起源头。
Identifying the culprits in such attacks can be next to impossible, because computer attacks are typically routed through multiple layers of infected computers to disguise the source.
一些主要的日报撰文攻击隐私禁令是一项对议会主权的司法袭击。
Some grander dailies have attacked privacy injunctions as a judicial assault on parliamentary sovereignty.
袭击行为变得如此凶残,以至专家都不知该如何解释这种“前所未有”的行为,特别是为什么鲨鱼在海岸附近发动如此多的攻击。
The attacks have been so ferocious that experts have been left at a loss to explain the "unprecedented" behaviour, particularly why the sharks launched multiple attacks close to shore.
袭击行为变得如此凶残,以至专家都不知该如何解释这种“前所未有”的行为,特别是为什么鲨鱼在海岸附近发动如此多的攻击。
The attacks have been so ferocious that experts have been left at a loss to explain the “unprecedented” behaviour, particularly why the sharks launched multiple attacks close to shore.
更糟糕的是,RSA首席执行官阿特·卡威罗本周证实了三月份从RS A盗取的信息被用于对洛克希德马丁公司的一次更广泛的袭击的一个攻击源。
To make matters worse, RSA CEO art Coviello confirmed earlier this week that information taken from RSA in March had been used as an element of an attempted broader attack on Lockheed Martin.
即使海边专门用来抵御最强的热带风暴的防御性建筑在本周日袭击亚洲诸多国家的10米高的水墙攻击下也毫无招架之力。
Even coastal defences built to withstand the strongest tropical storms may be little use when struck by a wall of water up to 10m high, as hit some Asian countries on Sunday.
“足够证据表明,恐怖袭击非常专业和精度的军事攻击,一定得到巴基斯坦官方机构的支持。”辛格说。
"There is enough evidence to show that, given the sophistication and military precision of the attack, it must have had the support of some official agencies in Pakistan," said Singh.
戈德斯通的报告在以色列引起公愤。以色列说,该国针对加沙发动的为期三个星期的攻击是回击巴勒斯坦多年火箭袭击的正当自卫。
The Goldstone Report sparked outrage in Israel, which said that its three-week assault on Gaza was legitimate self-defense against years of Palestinian rocket attacks.
在孟加拉的孙德尔本斯地区(the Sundarbans regionof Bangladesh),人们在后脑勺戴上一个面具(如上图),来防止来自背后的袭击——这是老虎最喜欢的攻击方式。
In the Sundarbans region of Bangladesh, people wear masks on the back of their heads (pictured above) to prevent an assault from behind - the tiger's preferred method of attack.
袭击开始于星期三晚上大约九点半,他们攻击利奥波德咖啡馆,那个许多来到印度的游客们享用第一餐的地方。
They began their assault at around 9.30pm on Wednesday, attacking Leopold cafe, where many tourists eat their first meal in India.
在11月26日的孟买恐怖袭击之后,加登里奇造船厂和加尔各答工厂收到来自印度内政部的78艘快速攻击艇订单,它们都将在沿海部署。
After the Mumbai terrorist attacks Nov. 26, Garden Reach Shipbuilders and Engineers received orders for 78 WJFACs from the Indian Home Ministry to be deployed along state coastlines.
在过去三年中,有超过120起老虎攻击农场动物事件,老虎的袭击还造成了一人死亡。
In the last three years there have been more than 120 tiger attacks on farm animals and one human death.
某些最复杂的网络袭击是多阶段进行的,首先一个恶意软件进入电脑,让其运行,再以此电脑为平台攻击另一台机器。
Some of the most sophisticated cyberattacks are multistage, in which a piece of malware penetrates a computer to use it as a platform for attacking yet another machine.
因为仅仅有数字签名并无法保证发送方就是他们自己所声称的人,消息的传输很容易遭受恶意第三方诸如再现攻击等技术的袭击。
Because a signature alone does not guarantee that the sender is who they say they are, the message transmission is vulnerable to techniques such as replay attacks by some malicious third party.
我再一次后退了一步,同时,我的袭击者的攻击也减缓了。
For a second time, I retreated a step while my attacker relented in his attack.
我再次尝试向前移动,我的袭击者也再次向我攻击。
Yet again, I tried moving forward. My attacker charged me again.
“这类的攻击可能会被人利用的情形包括对个人追踪或者向其发动袭击”他补充道。
"Scenarios where an attack like this would be used would be stalking or targeted attacks against an individual," he added.
这些袭击的目的还是要使非盟维和部队看起来是偏向目前冲突中的一方,这样,维和部队就可以轻易成为袭击的目标并且遭到攻击。
They were also intended to portray AMISOM as a partisan in the on-going conflict so that its troops could easily become a target and subjected attacks, " he said.
但是最新的研究表明,开始看起来分散的袭击会随着攻击者改变他们的方法而显示出一定的模式。
But according to a new study, attacks that seem sporadic in the beginning can begin to show a pattern as the aggressors refine their methods.
正是此时我发现了我的袭击者片刻之前攻击我的原因。
That's when I discovered why my attacker was charging me only moments earlier.
但黑客很少会直接攻击银行系统,而是更倾向于袭击那些存储大量信用卡号码的合作伙伴或零售商。
But rarely have hackers breached a bank itself rather than the partners or retail outlets that often store large caches of those card Numbers.
尽管AQAP以其国际袭击而著称,但其主要以也门或沙特阿拉伯(从更小范围上来看)为攻击目标。
Although its international attacks get most publicity, AQAP's main effort has been in Yemen and, to a lesser extent, in Saudi Arabia.
2004年以来,由无人攻击机袭击造成的平民死亡人数的比例一直为百分之32。
The report also states that the civilian fatality rate has been 32 percent in drone attacks since 2004.
他们称发布命令并控制这次攻击的服务器位于美国,在开始袭击前几周就连接上了互联网。
They said the command and control server that directed the attack was based in the United States and had come online several weeks before it began the assault.
尽管没有证据说明所谓的“7·7袭击事件”与国际奥委会的决定无关,但是这座城市会如何在奥运会期间成为攻击目标是显而易见的。
While the so-called "7/7" attacks were not proved to be linked to the IOC's decision, it brought home how the city might be targeted during the Games.
遇袭时,这三人正与特种部队成员及阿安全部队执行例行的巡逻任务,他们乘坐的车辆遭爆炸袭击后受到轻武器火力攻击。
The trio were working with special forces carrying out a routine security patrol with Afghan forces when their vehicle was struck by a bomb blast and came under small arms fire.
但如果你能够算出来鲨鱼攻击的活动基地来,它可以指导你在哪里可以避免鲨鱼袭击的发生,他表示。
But if you could figure out the base of operations for the great whites, it would give you a good idea of places to avoid if you were worried about shark attacks, he said.
但如果你能够算出来鲨鱼攻击的活动基地来,它可以指导你在哪里可以避免鲨鱼袭击的发生,他表示。
But if you could figure out the base of operations for the great whites, it would give you a good idea of places to avoid if you were worried about shark attacks, he said.
应用推荐