不少昆虫都会使用类似喷血的行为防御攻击,例如斑蝥,石蝇幼虫以及蝗虫等。
A number of insects, including blister beetles, stonefly larvae and bushhoppers behave in similar way when attacked.
黑熊幼崽用树来防御,而经常生活在没有树的环境中的棕熊和北极熊则依靠攻击性来保护它们的幼崽。
Black bear cubs use trees for defense, whereas brown bears and polar bears, which regularly inhabit treeless environments, rely on aggression to protect their cubs.
由于上述对策研究重在防御而非攻击,因此还未形成一场军备竞赛。
With the emphasis on defence rather than attack, it is not an arms race yet.
个人攻击将使人们会使人自我防御,然后他们将不会听进去你说的任何话。
Personal attacks make people feel defensive, and then they won't really listen to anything you have to say.
舒查德的新攻击使得互联网的防御结构出现漏洞。
Schuchard's new attack pits the structure of the internet against itself.
这些不断演变的攻击更有可能通过现有的网络防御展开,看不见而且不受控制。
These continually evolving attacks are far more likely to go unseen and unchecked by existing network defences.
他们的目标是在遭到攻击后进行联合防御。
Their aim was to organise joint defence if they come under attack.
猫鼬快速的反应可以帮助他躲避眼镜蛇的防御性攻击,它有力的下颚能够一下子杀死一条蛇。
The mongoose’s quick reflexes help it dodge the cobra’s defensive bite, and its powerful jaws can dispatch a snake in one blow.
大多数的参赛队都列出传统的海军编制- - -由一系列不同类型的军舰组成,每艘都能很好地防御敌方的攻击。
Most teams fielded some version of a traditional naval fleet-an array of ships of various sizes, each well defended against enemy attack.
猫鼬快速的反应可以帮助他躲避眼镜蛇的防御性攻击,它有力的下颚能够一下子杀死一条蛇。
The mongoose's quick reflexes help it dodge the cobra's defensive bite, and its powerful jaws can dispatch a snake in one blow.
应在公司用于检测漏洞和保护s OA基础结构的业务策略中包含用于目标和攻击者之间的多个SOA的深度防御模型。
A defense in depth model with multiple SOAs between the target and the adversary should be part of a company's business strategy for detecting vulnerability and protecting SOA infrastructure.
腾讯表示这么做是针对恶意软件攻击的防御举措,但此举引发大量指责,称腾讯权势过大。
Tencent said it was defending itself against a malicious software attack, but the move triggered accusations that Tencent had too much power.
对网民来说,强密码对于诸如钓鱼攻击和键盘记录之类的密码盗窃手段毫无防御能力。 相反,强密码还会给网民带来相当大的负担。
Strong passwords do nothing to protect online users from password stealing attacks such as phishing and keylogging, and yet they place considerable burden on users.
本文概述了e - Commerce系统中的关键参与者,安全性攻击和防御。
This article outlined the key players and security attacks and defenses in an e-Commerce system.
然后从事电脑安全的企业RSA,它的服务器被黑客破坏,这个攻击或许导致RSA大客户LockheedMartin的 电脑防御系统失效。
Then computer security firm RSA had their servers breached, an attack that may have led to the hacking of defence giant Lockheed Martin, an RSA client.
“许多国家已经拥有,或正在进行对反舰导弹以及能击垮像瓦良格号这样体型庞大,防御较弱的军舰的攻击潜艇的研究,”Storey指出。
"Many countries have, or are, investing in anti-ship missiles and attack submarines which make large, poorly defended warships such as the Varyag highly vulnerable," pointed out Storey.
但在十年多的情报搜集,反攻击和防御措施后,今天的美国,的确看似比十年前九月十日脆弱的美国大有改善。
But after a decade of intelligence-gathering, counter-attacks and defensive measures, America does seem a good deal less vulnerable than it was on September 10th ten years ago.
这种技术常常用于帮助防御基于ARP的中间人攻击。
It can often help prevent ARP-based Man-in-the-Middle attacks.
Tomcat 7还针对会话固定攻击(sessionfixation attack)采取了一些防御措施。
Preventative measures have also been taken to protect against session fixation attacks.
ModSecurity能够立即针对你的WEB应用系统进行攻击防御,有三种通用的方法。
ModSecurity can also act immediately to prevent attacks from reaching your web applications. There are three commonly used approaches.
加强监测和防御网络攻击的能力。
防御的上策为攻击。
在你的网络中适当的安装这些组件,就可以确保任何攻击都必须通过一个或多个这样的防御系统。
By placing these components, as appropriate, throughout your network, you can ensure any attack must pass through one or more of these defenses.
外部攻击者是那些必须透过您的“深度防御”试图闯入您系统的人。
External attackers are those who must traverse your "defense in depth" to try and break into your systems.
欧洲还有一处城堡其防御设施是用于防御来自地内的攻击。
There is also a castle in Europe with defenses set to defend against an attack from the inside out.
它们并不倾向主动攻击人类,但有很强的防御意识,一旦被激怒就会发动攻击。
They do not actively seek out humanprey, but are very defensive and will attack when provoked.
星球大战防御绻统的支持者们希望它不仅能保护一个遭受核攻击的国家,也希望它能成为使核攻击游不发生的足够威胁。
Supporters of the Star Wars defense system hope that this would not only protect a nation against an actual nuclear attack, but would be enough of a threat to keep a nuclear war from ever happening.
这些防御措施有效地阻止了基于解析器创建外部网络连接的所有攻击。
These defenses effectively stop any attacks based on the parser making external network connections.
这些防御措施有效地阻止了基于解析器创建外部网络连接的所有攻击。
These defenses effectively stop any attacks based on the parser making external network connections.
应用推荐