• In your case you will open other page and will let know to attacker the username.

    情况下打开其他页面知道攻击者用户名。

    youdao

  • The police have so far failed to track down the attacker.

    警方至今未能追捕到攻击者。

    《牛津词典》

  • The attacker may have been waiting around for an opportunity to strike.

    袭击者可能一直等待一个下手的机会

    《柯林斯英汉双解大词典》

  • The attacker then tried to throttle her with wire.

    名袭击者然后试图电线勒死

    《柯林斯英汉双解大词典》

  • He tried to use his own weight to push his attacker off but he was off balance.

    试图利用自己重量推开袭击者失去平衡

    《柯林斯英汉双解大词典》

  • It was inconceivable to me that Toby could have been my attacker.

    托比竟会是袭击的人,这来说简直是匪夷所思

    《柯林斯英汉双解大词典》

  • She was able to identify her attacker.

    认出袭击的人。

    《牛津词典》

  • He finally managed to break free from his attacker.

    终于设法摆脱袭击的人。

    《牛津词典》

  • She was barely able to stammer out a description of her attacker.

    只能勉强结结巴巴说一说袭击人是什么模样。

    《牛津词典》

  • The drawing is said to be a good likeness of the girl's attacker.

    据说那幅画像袭击那个女孩的歹徒。

    《牛津词典》

  • Her loud scream scared the attacker and people came to help.

    尖叫声袭击者了一跳,人们赶来帮忙。

    youdao

  • The particular design of muscles and bones in the neck and limbs of the turtle allow that it can draw in its exposed parts such that an attacker can find nothing but hard shell to bite.

    海龟颈部四肢肌肉骨骼特殊设计使暴露在外部分缩回去,这样攻击只能咬坚硬的外壳

    youdao

  • Luckily, Zhang had just learned how to escape from an attacker, a person who plans to hurt someone.

    运的是,张刚学会了如何从计划伤害他人的袭击者手中逃脱。

    youdao

  • If an attacker can cause a buffer to overflow, then the attacker can control other values in the program.

    如果攻击能够导致缓冲区溢出那么它就控制程序中的其他

    youdao

  • To make an attack, the attacker needs to buy several SSL certificates from CAs who sign certificates with the MD5 algorithm.

    实现攻击攻击需要使用MD 5算法签署证书CA购买若干ssl证书。

    youdao

  • The driver pulled over and passengers fled from the bus, bracing the door to keep the attacker inside.

    司机将车在一边,其余乘客逃离巴士将袭击者堵在车里。

    youdao

  • Bodyguards can use one or two blows to stop an attacker.

    保镖要有能力通过三拳脚就阻止袭击者”,北京VSS保安咨询公司总裁迈克尔-翟说。

    youdao

  • Essentially, if you allow an attacker to run code on such a machine through any means, the attacker can completely take over the machine.

    从本质上说如果允许攻击这样机器任何方式运行代码,则攻击者完全可以接管机器。

    youdao

  • Although this example demonstrates an SQL injection in its simplest form, you can see just how easy it is for an attacker to use.

    尽管简单的形式演示了一个SQL注入,但是可以看出攻击者利用SQL注入有多么容易

    youdao

  • Social Engineering is the tricking of an unsuspecting administrator into giving the account ID and passwords over to an attacker.

    社交工程哄骗一个毫无疑虑管理员攻击者说出帐户标识密码的欺骗方法。

    youdao

  • Often, it's best to check in both places; that way, if an attacker manages to slip around one defense, they'll still encounter the other.

    通常最好这两处都其进行检查这样即使攻击者成功地突破了一道防线,他们会遇到另一条。

    youdao

  • When attacked from the side, the crickets stridulated and tried to bite their attacker.

    侧边进攻时,蟋蟀会发出鸣叫声并且试图进攻者

    youdao

  • But that attack was rare in another way: It was easy enough to identify the attacker.

    但是这次袭击一方面来看却是极为少见的:袭击者轻易地就被发现。

    youdao

  • This "help" can also aid an attacker to create data to mislead the program.

    这种帮助可以帮助攻击创建用于误导程序的数据

    youdao

  • They make it easy for an attacker to determine the key.

    因为这些函数攻击容易就可以判断出密钥。

    youdao

  • Often the attacker will overrun the buffer with the malicious code the attacker wants to run, and the attacker will then change the return value to point to the malicious code they've sent.

    通常攻击使用它运行恶意代码来使缓冲区溢出然后攻击者会更改返回指向它们发送的恶意代码。

    youdao

  • This attack USES password cracking to penetrate the systems that the attacker wants to deface.

    攻击使用密码破解渗透攻击破坏系统

    youdao

  • Attacking using a buffer overflow can change this process and allow an attacker to execute any function they wish.

    利用缓冲区溢出进行攻击可以改变这个过程并且允许黑客执行任何他们期望函数

    youdao

  • Think in terms of the assets you're trying to protect and what an attacker might want to do to them.

    根据设法保护资产以及攻击可能会如何处理这些资产来考虑安全性。

    youdao

  • Think in terms of the assets you're trying to protect and what an attacker might want to do to them.

    根据设法保护资产以及攻击可能会如何处理这些资产来考虑安全性。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定