Attackers fired machine guns at the convoy.
袭击者们向护运车队开机枪。
Unknown attackers riddled two homes with gunfire.
不明来路的袭击者用枪把两座房屋打得千疮百孔。
All the attackers were male, aged between 25 and 30.
所有的攻击者都是男性,年龄在25到30岁之间。
He appealed for information from anyone who saw the attackers.
他呼吁来自目睹袭击者的信息。
The dead men could have been the victims of mistaken identity. Their attackers may have wrongly believed them to be soldiers.
这些死者可能是错认身份的受害者,袭击者可能误以为他们是当兵的。
In times like these, there might be attackers hidden about.
在这样的时候,可能隐藏着攻击者。
Ants store food, repel attackers and use chemical signals to contact one another in case of attack.
蚂蚁储存食物,击退攻击者,并使用化学信号联系彼此以防被攻击。
Out of love and respect, he actually wants to take the blows. He should walk on the inside—because that's where attackers are all hiding these days.
出于爱和尊重,他实际上想要接受打击。他应该走到里面去,因为现在攻击者都躲在里面。
The Tunisian military has sent reinforcements and helicopters to the area, and authorities have been hunting several attackers who were still at large.
突尼斯军方已经派出增援部队及直升机到该区域,官方也正在追捕几名在逃人员。
Don't give attackers any help.
不要给攻击者以任何帮助。
我们击退了进攻者。
Attackers: how and why they attack.
攻击者:他们如何以及为何进行攻击?
Israeli soldiers kill two attackers.
以色列士兵击毙了两个袭击者。
Attackers will always figure out a way.
攻击者总是会想到办法的。
Attackers' motivations vary greatly.
攻击者的动机差别很大。
The two attackers escaped on a motorcycle.
两名袭击者骑摩托车逃离了现场。
Three attackers were eventually shot dead.
3名袭击者最后遭击毙。
Don't let attackers control any temporary files.
不要让攻击者控制任何临时文件。
They don't have it as easy as internal attackers.
他们做起来并不象内部攻击者那样容易。
The attackers targeted the symbols of modern India.
袭击者把现代印度的那些象征作为袭击目标。
This suggests the attackers may not have been Iraqi.
这表明,袭击者可能不是伊拉克人。
Attackers: Script kiddies and organized crime rings.
攻击者:脚本kiddy和有组织的犯罪。
The two brothers fought together against their attackers.
这两兄弟并肩战斗,反对攻击者。
Officials said two attackers were killed and one captured.
官方称两个袭击者被杀害,一个被捕。
He said unfortunately one of the attackers managed to escape.
他说,遗憾的是其中一名袭击者设法逃逸。
It's also clear that attackers don't really need source code.
还有一点很清楚,攻击者实际上并不需要源代码。
This prevents attackers from stealing information from the main page.
这样可以防止攻击者从主页面中窃取信息。
This setting ensures that attackers cannot modify the JNDI namespace.
这一设置确保攻击者不能修改JNDI命名空间。
Attackers tend to look for women who appear insecure or unsuspecting.
袭击者往往倾向于查找出现不安全感或不知情的妇女。
Attackers tend to look for women who appear insecure or unsuspecting.
袭击者往往倾向于查找出现不安全感或不知情的妇女。
应用推荐