• This type of attack happens all the time.

    攻击随时都会发生

    youdao

  • Techniques used to prevent this type of attack include.

    阻止这种类型攻击技术

    youdao

  • Please cancel out any, any type of attack that the Devil has on us.

    取消所有一切攻击恶魔已经我们

    youdao

  • This type of attack is often run on websites that run third-party ads.

    这种类型攻击通常运行网站运行的第三方广告

    youdao

  • In this case, their enhancement bonus applies to either type of attack.

    这种情况下增强种攻击方式都有效。

    youdao

  • This type of attack was what Albert Gonzalez used to steal 130 million credit card Numbers.

    就是AlbertGonzalez用来盗取1.3亿信用卡攻击

    youdao

  • This type of attack is only possible if the database or password store is already compromised.

    这种类型攻击可能数据库密码存储已经暴露的情况下进行。

    youdao

  • In 2002, the White House described 9/11 as “a new type of attack that had not been foreseen.”

    白宫2002年形容911“无法预料新型袭击”。

    youdao

  • In another type of attack, the attacker might modify the stylesheet to hide information from users.

    另一种攻击类型中,攻击可能会修改样式表信息隐藏起来不让用户发现。

    youdao

  • In recent years, there has been an increase of a particular type of attack: client-side attacks.

    最近几年,网络上出现一种新的攻击类型:客户攻击,攻击的对象是客户端应用程序。

    youdao

  • The appropriate key(s) will be shaded to indicate the type of attack(s) each technique helps to prevent.

    对于每种技术适当的方块加上底纹表示这种技术有助于防范攻击类型

    youdao

  • The best way to prevent this type of attack is to enforce policies that make passwords difficult to guess.

    防止这种类型攻击最佳方法加强策略使口令很难猜中

    youdao

  • It's very early in the investigation to determine what type of attack or who might have been behind it.

    现在不能确定什么样攻击类型或者是谁背后操作。

    youdao

  • The four squares will be shaded as appropriate to represent the type of attack this technique helps to prevent

    四个方块加了适当的底纹代表这种技术有助于防范攻击类型

    youdao

  • Systems used in this type of attack can be compromised in any number of ways and infected with a worm or virus.

    类型攻击使用系统可能多种方式破坏受到蠕虫病毒感染。

    youdao

  • Unless otherwise specified, a followup attack is considered to be the same type of attack as the initial attack.

    除非另外指出,不然后续攻击视为和开始攻击类型相同

    youdao

  • The length of the key determines the number of possible keysand hence the feasibilityof this type of attack.

    长度决定许多可能钥匙——因此可行性——这种类型的攻击。

    youdao

  • While in Laser Lock mode, the Javelin Soldier is extremely vulnerable to any type of attack because of the 3 second pre-attack delay.

    处于激光锁定模式由于3攻击延迟标枪对于任何形式的攻击都相当脆弱

    youdao

  • Consider Example 1 (a), which is paraphrased from the Windows exploit, of course, that forms the basis for this type of attack vector.

    考虑示例1 (a),当然改写Windows攻击,它构成此类攻击载体基础

    youdao

  • One of the most famous instances of this type of attack is the Windows animated cursor attack, and it's this pattern that I examine here.

    此类攻击著名示例之一就是Windows动画光标攻击,正是本文要讨论的模式

    youdao

  • LM Hash is vulnerable to this type of attack because it does not use today's common method of introducing "salt" to the encryption process.

    LMHash容易此类攻击攻破,是因为没有使用现今常用加密过程引入salt”的方式。

    youdao

  • If the server CPU and memory seem to be running excessively high, the Domino Web logs should be checked for a Denial of Service type of attack.

    如果服务器CPU内存运用率极高,那么应该检查DominoWeb日志是否存在拒绝服务型攻击

    youdao

  • In addition to the overflow exploits, SQL injection is one other type of attack that relies on developer oversight by not testing incoming data.

    除了溢出的利用以外,SQL注入一类依赖开发人员测试输入数据疏漏攻击

    youdao

  • While polyinstantiation will not prevent every type of attack, it is a useful addition to your security toolkit that is straightforward to configure.

    尽管实例不能防止所有攻击但它安全工具包一个有用的补充,而且配置十分简单。

    youdao

  • We know that Twitter's architecture has made it more vulnerable to this type of attack than Google or even Facebook, but in situations like this, communication is key.

    我们知道Twitter构架使得TwitterGoogleFacebook容易遭到攻击但是这种情况下沟通至关重要。

    youdao

  • If you are concerned about this type of attack, which is easily prevented through code inspections, you can prevent untrusted clients from connecting to the Web container.

    如果担心这种类型攻击(可以通过代码检查轻松地加以防止),则可以阻止任何不受信任的客户端连接web容器。

    youdao

  • What we're most interested in is seeing if we can get any insight into any terrorist plot that might be underway so that we can take the measures to stop any type of attack planning.

    我们最想知道,我们能否获知任何可能正在策划恐怖行为,以便于我们能够采取措施阻止任何形式攻击计划

    youdao

  • Although I can't get into the specifics of how to pull this type of attack off, you can look it up if you have SQL knowledge, which—if you're hosting database on your Web server—you should have.

    虽然不能详细解释这种攻击如何实施,但如果了解SQL 的话,就可以找到相关的答案。 如果您Web服务器驻留数据库的话,一定要了解这种攻击。

    youdao

  • What kind of attack is this type of individual likely to carry out?

    这些可能实现哪种类型攻击呢?

    youdao

  • Angry, abusive responses... or any type of personal attack.

    愤怒辱骂性回复或者任何形式人身攻击

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定