Web security masters can make responses betimes according to the result, and the responses can save furthest the loss under real time attacks.
网络管理员通过该结果做出及时的反应,在最大限度上降低攻击造成的损失。
Friday morning, local time — more than 35 hours after the initial attacks — Indian commandos launched an all-out push to seize the Jewish center, where gunmen still held hostages.
在最初的袭击发生35个多小时之后,当地时间周五上午,印度突击队对犹太中心发动了总攻,武装分子在这里仍扣押着人质。
For a long period of time, particularly over the past year, the Aden Gulf and seas off the Somali coast have witnessed rampant pirate attacks with many vessels hijacked.
相当长一段时间以来,特别是今年以来,在亚丁湾、索马里海域频繁发生海盗袭击、劫持过往船只事件。
The station was passing over New York at the time of the attacks and it had a profound effect on the astronaut.
在袭击发生的时候,卡本特森正好飞过纽约的上空,这使得他很清楚的看到了袭击后的场面。
The speed with which electronic attacks could be launched gives little time for cool-headed reflection and favours (early, even pre-emptive, )attack.
电子攻击的速度让人没有时间进行冷静的反思,并且适合抢占先机,甚至先发制人的攻击。
At the same time, attacks upon networks are increasing very fast, computer criminal events occur quite often, and network securities are seriously threatened.
与之相伴,对网络的各类攻击与破坏也与日俱增,计算机犯罪越来越多,网络安全受到严重威胁。
Freudian theory is now, at this point of time, extremely controversial and there is a lot of well-known criticisms and attacks on Freud.
如今,精神分析理论存在很多争议,有很多著名的针对弗洛伊德的批判和攻击。
The idea is to spend a little bit of time at each revision of your Web site and prevent the most common attacks on your site.
即每次修订Web站点时都花点时间,为您的站点防止大多数攻击。
Say you spend four hours fighting a boss where you have to perfectly time your attacks while dodging flame and giant rock fists.
假设你花费了4个小时来战翻一个Boss,过程中你必须在准确把握攻击的时间的同时避开火焰和巨石的攻击。
In addition to providing logging facilities, ModSecurity can monitor the HTTP traffic in real time in order to detect attacks.
除了提供记录日志功能外,ModSecurity还能实时的监控HTTP的流量以检测攻击。
DDOS attacks have become relatively commonplace online, but this is believed to be the first time that Twitter has been targeted.
DDOS攻击在网上已经相当普遍,但估计Twitter是第一次成为攻击目标。
Ali was still Pakistan both on the day of attacks on the capital's transport system that killed 52 innocent people and at the time of the attempted attacks of 21 July.
英国首都的交通系统遭袭造成52名无辜者丧生,7月21日又发生未遂袭击事件,这两件事发生的时候,阿里还在巴基斯坦。
He successfully brought the two sides together to hammer out a deal in 2006. The memorial, at any rate, is on track to be finished in time for the tenth anniversary of the attacks in 2011.
2006年他成功的促使双方达成了协议,不管怎么样,纪念馆可以按计划赶上2011年恐怖袭击的10周年纪念。
Prevent denial of service attacks: Using XKMS to get key information is useful if it is available when needed and within a reasonable amount of time.
防止服务的抵赖攻击(denial of service attack):使用XKMS来获取密钥信息比较有用,前提是XKMS在需要的时候可用,并且这一过程能在合理的时间内完成。
The seedier elements of DDoS attacks showed around this time as the technique began to be used by organised criminals to blackmail and extort money from small businesses by threat of cyber-attack.
随着DDoS攻击开始被有组织犯罪以发起网络攻击为威胁成为敲诈勒索小公司钱财的手段,这个技术肮脏的一面开始闪现。
Depending on the application's popularity, attacks can range from only a few an hour to several hundred or thousand in the same time period.
根据应用程序的流行度,攻击幅度可以为一小时攻击几次至同一时间段内攻击数百甚至数千次。
Not only are illegal enterprises collaborating, but they pose a threat that persists over time, with ability to launch new attacks in the future.
让人担心的不仅仅只是非法的企业式的相互协作,因为具备在将来发起下一轮袭击的能力,所以长久以来他们一直是一个威胁。
The study was the first to examine the association between screen time and heart attacks, and found a 48 per cent increased risk of death from any cause.
这份报告首次研究了面对屏幕的时间与心脏病之间所存在的联系,科学家们发现,“无端”死亡的风险提高了48%。
Recently I spent some time in Mauritius; not the six-star hotel bit, but the parts where the poor people live where so many die of heart attacks because of smoking.
最近我在毛里求斯呆了一段时间,不是在六星级酒店,而是在穷人生活的地方,在那里许多人因吸烟而死于心脏病。
"Only sufficiently frequent attacks, with increasing force, will result in eradication, assuming the available resources can be mustered in time," they concluded.
“只有足够的频繁地进攻,同时不断加强力量,才能够根除——当然要假设资源能够及时集中起来。”他们总结道。
By February, trailing badly, she acknowledged what had been obvious for some time: Mr Perry's attacks were working.
到二月份,在严重落后的情况下,她承认了早已明显的事实:裴瑞先生的进攻是有效的。
Given the proliferation of hacker attacks, Run-time Variation 1, shown in Figure 8, is the recommended pattern for the Directly Integrated Single Channel application pattern.
鉴于电脑黑客的攻击能力不断加强,如图8所示的运行时变种1是适合于直接集成单通道应用程序模式的一种值得推荐的模式。
Again, the mutant mice behaved appropriately, but they were much less aggressive, spent less time fighting and they took longer breaks between attacks.
这个基因改变的老鼠表现是适当地,可是它们的攻击性减小、打斗的时间也减少而且在打斗之间的休息时间更长。
Weirdly, the only time Maria felt even close to normal during these attacks was when she was standing in a hot shower.
奇怪的是,当玛丽亚在一次洗热水澡时她觉得身体几乎恢复正常了.
Weirdly, the only time Maria felt even close to normal during these attacks was when she was standing in a hot shower.
奇怪的是,当玛丽亚在一次洗热水澡时她觉得身体几乎恢复正常了.
应用推荐