• The people in the room seemed to regard her as an unwelcome intruder.

    屋子似乎当成不受欢迎外人

    《牛津词典》

  • An intruder broke into the campaign headquarters and managed to erase 17,000 names from computer files.

    一名入侵者闯入作战指挥部设法删除电脑文件中的17000个名字

    《柯林斯英汉双解大词典》

  • A fortress is easier to protect because it's simpler: it has no windows, few doors, no skylights, or vent systems through which an intruder might sneak.

    堡垒保护容易因为构造更简单没有窗口几乎没有几道门没有天窗通风系统这些入侵者可能利用的东西。

    精选例句

  • He flattened the intruder with a single punch.

    闯入者打倒在地。

    《牛津词典》

  • He tackled a masked intruder at his home.

    家里抓住了一个私自闯入蒙面人。

    《牛津词典》

  • Armed guards wrestled with the intruder.

    武装警卫闯入者扭打起来

    《牛津词典》

  • Unexpectedly as she had appeared, not one of them felt that she was an intruder at all.

    出乎意料地出现了,但他们谁也觉得是个不速之客

    精选例句

  • Whereas we tend to view it as an intruder, a stranger, certainly an organ whose powers need to be limited or defined and constrained, the Chinese don't see the state like that at all.

    鉴于我们倾向国家看作是入侵者陌生人当然是个组织权力需要限制被界定约束中国人可一点这样看待国家

    www.hjenglish.com

  • You essentially deny the intruder the ability to see or access things they should not see.

    这样可以拒绝入侵者查看访问他们应该看到内容

    www.ibm.com

  • They also suggest that the sounds may function to attract the attention of predators, in which case the intruder would be rather defenseless.

    同时指出这种声音还吸引来食肉动物这样情况入侵者防御上处于明显弱势

    putclub.com

  • An even more subtle attack is that any page returned over HTTP can be potentially altered by an intrudereven URLs embedded in the page.

    一种狡猾的攻击方法入侵者可以修改通过HTTP返回任何页面——甚至包括页面嵌入URL

    www.ibm.com

  • This prevents the most egregious types of attack, where an intruder can use the built in administrative infrastructure to deploy rogue applications onto your desktop.

    这样可以防止恶劣攻击类型(入侵者可能使用内置管理基础设施恶意应用程序部署桌面上)。

    www.ibm.com

  • The intruder can also scan the hard drive to detect any stored passwords.

    入侵者可以检测硬件驱动器搜索任何存储密码

    www.ibm.com

  • If a male bobolink hears another male calling in his territory, he'll chase the intruder away.

    如果雄性食米鸟听见另一雄性自己地盘鸣叫入侵者赶走

    www.ngpod.cn

  • The intruder is not necessarily outside the company, but he is executing code from outside of the application itself.

    入侵者并不一定是公司外部是从应用程序自身外部执行代码

    www.youdict.com

  • It took a week to winkle out the intruder.

    足足花了一个星期将入侵者逐出。

    www.ecocn.org

  • According to the Intruder Perspective, the aliens are here for their own purposes, and their abduction and hybrid program activities are intrusive and callous to human concerns.

    根据入侵者视角外星人来这里他们自己的目的他们绑架杂交程序活动对于人类来说侵入性冷酷无情的。

    blog.163.com

  • During a CSRF attack, requests originate from an intruder site and are transmitted through an authenticated browser page to the server.

    CSRF攻击过程请求来自入侵者站点,然后通过经过验证浏览器页面传输服务器

    www.ibm.com

  • If an intruder has access to your database, or even raw machine-level access to the database volumes, he or she might be able to see information in the session.

    如果入侵者可以访问数据库甚至数据库信息原始计算机级访问可能看到会话中的信息

    www.ibm.com

  • The intruder is not necessarily outside the company, but rather is executing code from outside of the application itself.

    入侵者并不一定公司外部他们是从应用程序自身外部执行代码

    www.ibm.com

  • Ward made note of the plank at the open window, and near it he discovered two muddy footprints he believed had been made by the intruder.

    沃德敞开窗户上木板作了记录木板边上发现了处泥泞足迹认为侵入者留下

    article.yeeyan.org

  • Essentially, an intruder passes in a string that is too large for some existing buffer.

    其本质入侵者传入一个大于现有缓冲区字符串

    www.ibm.com

  • He seemedto be acting outhis dream of fighting with an intruder, and acting outdreams is aclassic REM sleep disorder.

    似乎在把梦中同一个侵入者搏斗付诸真正行动,把梦中行为付诸现实典型REM睡眠障碍

    article.yeeyan.org

  • If that link is compromised, an intruder could then assert any identity and completely undermine the security of the infrastructure.

    如果链接受到威胁,则入侵者可以断言任何身份彻底破坏基础设施安全性

    www.youdict.com

  • If that link can be compromised, an intruder could then assert any identity and completely undermine the security of the infrastructure.

    如果可以攻破链路入侵者可以断言任何身份彻底破坏基础设施安全性

    www.youdict.com

  • Responses are then returned to the intruder site.

    然后响应返回入侵者站点

    www.ibm.com

  • This is a security hole because an intruder could potentially pretend to be a messaging engine and compromise the bus traffic.

    一个安全性漏洞因为入侵者可能可以伪装消息传递引擎截获总线通信流

    www.ibm.com

  • It took a week to winkle out the intruder. Nobody knows what, if any, damage was caused.

    足足一个星期之后入侵者才被剔除如果损失的话,没有人知道这次入侵导致损失是什么

    article.yeeyan.org

  • It took a week to winkle out the intruder. Nobody knows what, if any, damage was caused.

    足足一个星期之后入侵者才被剔除如果损失的话,没有人知道这次入侵导致损失是什么

    article.yeeyan.org

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定