This type of attack happens all the time.
这类攻击随时都会发生。
Techniques used to prevent this type of attack include.
阻止这种类型的攻击的技术有。
Please cancel out any, any type of attack that the Devil has on us.
请取消所有一切的攻击,恶魔已经找上我们。
This type of attack is often run on websites that run third-party ads.
这种类型的攻击通常是运行在网站运行的第三方广告。
In this case, their enhancement bonus applies to either type of attack.
这种情况下,增强加值对两种攻击方式都有效。
This type of attack was what Albert Gonzalez used to steal 130 million credit card Numbers.
这就是AlbertGonzalez用来盗取1.3亿信用卡号的那类攻击。
This type of attack is only possible if the database or password store is already compromised.
这种类型的攻击只可能在数据库或密码存储已经暴露的情况下进行。
In 2002, the White House described 9/11 as “a new type of attack that had not been foreseen.”
白宫在2002年形容911是“无法预料的新型袭击”。
In another type of attack, the attacker might modify the stylesheet to hide information from users.
在另一种攻击类型中,攻击者可能会修改样式表,把信息隐藏起来不让用户发现。
In recent years, there has been an increase of a particular type of attack: client-side attacks.
在最近几年,网络上出现一种新的攻击类型:客户端攻击,攻击的对象是客户端应用程序。
The appropriate key(s) will be shaded to indicate the type of attack(s) each technique helps to prevent.
对于每种技术,适当的方块将加上底纹,表示这种技术有助于防范的攻击类型。
The best way to prevent this type of attack is to enforce policies that make passwords difficult to guess.
防止这种类型攻击的最佳方法是加强策略,使口令很难被猜中。
It's very early in the investigation to determine what type of attack or who might have been behind it.
现在还不能确定是什么样的攻击类型或者是谁在背后操作。
The four squares will be shaded as appropriate to represent the type of attack this technique helps to prevent
这四个方块加了适当的底纹,以代表这种技术有助于防范的攻击类型
Systems used in this type of attack can be compromised in any number of ways and infected with a worm or virus.
此类型攻击中使用的系统可能以多种方式被破坏并受到蠕虫或病毒感染。
Unless otherwise specified, a followup attack is considered to be the same type of attack as the initial attack.
除非另外指出,不然后续攻击被视为和一开始攻击的类型相同。
The length of the key determines the number of possible keys — and hence the feasibility — of this type of attack.
键的长度决定了许多可能的钥匙——因此可行性——这种类型的攻击。
While in Laser Lock mode, the Javelin Soldier is extremely vulnerable to any type of attack because of the 3 second pre-attack delay.
处于激光锁定模式时,由于3秒的攻击前延迟,标枪兵对于任何形式的攻击都相当的脆弱。
Consider Example 1 (a), which is paraphrased from the Windows exploit, of course, that forms the basis for this type of attack vector.
考虑示例1 (a),当然,这改写自Windows攻击,它构成了此类攻击载体的基础。
One of the most famous instances of this type of attack is the Windows animated cursor attack, and it's this pattern that I examine here.
此类攻击最著名的示例之一就是Windows动画光标攻击,这正是本文要讨论的模式。
LM Hash is vulnerable to this type of attack because it does not use today's common method of introducing "salt" to the encryption process.
LMHash容易被此类攻击攻破,是因为它没有使用现今常用的给加密过程引入“salt”的方式。
If the server CPU and memory seem to be running excessively high, the Domino Web logs should be checked for a Denial of Service type of attack.
如果服务器CPU和内存的运用率极高,那么应该检查DominoWeb日志是否存在拒绝服务型攻击。
In addition to the overflow exploits, SQL injection is one other type of attack that relies on developer oversight by not testing incoming data.
除了溢出的利用以外,SQL注入是另一类依赖于开发人员没测试输入数据的疏漏的攻击。
While polyinstantiation will not prevent every type of attack, it is a useful addition to your security toolkit that is straightforward to configure.
尽管多实例化不能防止所有攻击,但它是您的安全工具包的一个有用的补充,而且配置十分简单。
We know that Twitter's architecture has made it more vulnerable to this type of attack than Google or even Facebook, but in situations like this, communication is key.
我们知道Twitter的构架使得Twitter比Google和Facebook更容易遭到攻击,但是在这种情况下,沟通至关重要。
If you are concerned about this type of attack, which is easily prevented through code inspections, you can prevent untrusted clients from connecting to the Web container.
如果您担心这种类型的攻击(可以通过代码检查轻松地加以防止),则可以阻止任何不受信任的客户端连接到web容器。
What we're most interested in is seeing if we can get any insight into any terrorist plot that might be underway so that we can take the measures to stop any type of attack planning.
我们最想知道的是,我们能否获知任何可能正在策划的恐怖行为,以便于我们能够采取措施阻止任何形式的攻击计划。
Although I can't get into the specifics of how to pull this type of attack off, you can look it up if you have SQL knowledge, which—if you're hosting database on your Web server—you should have.
虽然我不能详细解释这种攻击是如何实施的,但如果您了解SQL 的话,就可以找到相关的答案。 如果您在Web服务器上驻留数据库的话,一定要了解这种攻击。
What kind of attack is this type of individual likely to carry out?
这些人可能实现哪种类型的攻击呢?
Angry, abusive responses... or any type of personal attack.
愤怒、辱骂性的回复…或者任何形式的人身攻击。
应用推荐