进攻者被击退了。
The attacker threatened them with a gun.
袭击者用枪威胁他们。
We had only a vague description of the attacker.
我们只有那个袭击者的粗略描述。
The police have so far failed to track down the attacker.
警方至今未能追捕到攻击者。
The attacker may have been waiting around for an opportunity to strike.
袭击者可能一直在等待着一个下手的机会。
Loud voice can usually make the attacker calm down.
响亮的声音通常可以让攻击者冷静下来。
She gave an exact description of the attacker.
她对袭击者的特征作了精确的描述。
They think the attacker was very tall—so that lets you out.
他们认为歹徒是个高个子,这样就没你什么事儿了。
Her loud scream scared the attacker and people came to help.
她的尖叫声把袭击者吓了一跳,人们赶来帮忙。
Let the attacker know you're ready.
让攻击者知道你有所准备。
The attacker enters the input in Listing 8.
攻击者可以提供清单8所示的输入。
If the attacker can, there's a problem.
如果可以,就存在问题了。
The attacker died, and the children survived.
袭击者丧生,孩子则活了下来。
现在看看攻击者。
Again, the attacker requires very few resources.
同样,攻击者只需要很少的资源。
It allows the attacker to impersonate the victim.
这将允许黑客冒充受害者。
Worst of all, the identity of the attacker may remain a mystery.
最糟糕的是,攻击者的身份仍是一个迷。
The attacker cracked the racks and stacked them on the track.
攻击者打裂搁板并把它们堆在跑道上.
The attacker was later subdued by the police, and no one died.
这次攻击后来被警察所制服,没有人死亡。
The attacker can automate to go against multiple sites at one time.
攻击者可以自动的在多个站点上进行测试。
The attacker then asks for the password to be reset to a specific value.
攻击者接下来将密码重新设置为特定的值。
Think of the problem from two perspectives: the server, and the attacker.
请从两方面来考虑这个问题:服务器和攻击者。
As the name suggests, the attacker opens the connection only halfway.
顾名思义,攻击者只是部分地打开连接。
If the attacker has the application display a set of HTML, trouble may creep in.
如果攻击者通过应用程序显示一组HTML,这有可能就会带来麻烦。
Reports said the attacker, a local caretaker and receptionist, was not armed.
报道称袭击者是当地一名管理员和接待员,没有携带武器。
When the attacker tried to drive the bus away, the driver disabled the vehicle.
当袭击者企图开车逃跑时,司机让大巴无法启动。
That means the attacker can set up the entire attack in essentially one operation!
这意味着攻击者本质上能够在一个操作中完成整个攻击!
The first scenario looks at a situation in which a disgruntled employee is the attacker.
第一种方案研究的是攻击者是心怀不满的雇员的情况。
That will let the attacker control internal data and possibly take over the program.
这样可以让攻击者控制内部数据,甚至控制整个程序。
But that attack was rare in another way: It was easy enough to identify the attacker.
但是,这次袭击从另一方面来看却是极为少见的:袭击者很轻易地就被发现。
应用推荐