• Swipe is the operative word: cards are increasingly vulnerable to attacks when you make purchases in a store.

    刷卡关键的一个词:商店购物时,信用卡越来越容易受到攻击

    youdao

  • During the bounce-back motion, the character is completely vulnerable to attacks.

    弹回来时,角色容易被攻击。

    youdao

  • Disabling code access security makes the system vulnerable to attacks by malicious code such as viruses and worms.

    禁用代码访问安全性使系统容易受到恶意代码(病毒蠕虫)的攻击

    youdao

  • Although these slower transactions may not be noticeable to the casual user, they may still be vulnerable to attacks at the ISP level.

    虽然这些较慢交易普通用户来说可能觉察不到,但它们IS P层面上容易遭到攻击

    youdao

  • Today surfers seem particularly vulnerable to attackssharks swimming from below can sometimes mistake a person paddling a board for a seal.

    在今天冲浪的人们似乎容易受到鲨鱼袭击:因为当有鲨鱼在人们下面过时,鲨鱼有时候把冲浪板上误认为是海豹而进行攻击。

    youdao

  • Greek officials on Thursday denied claims that serious construction delays facing Athens could leave venues and transit systems more vulnerable to attacks.

    周四希腊官员否认了此种说法雅典所面临的严重工程建设延期使得比赛场所交通运输系统更易受到攻击

    youdao

  • Shanghai rent car driver, we remind vulnerable to attacks from the location of the lightning most centered in the car roof, the wheel of the metal part circle.

    上海租车网提醒司机汽车比较容易遭受雷击位置大多集中汽车的顶棚车轮金属部分

    youdao

  • Only if Banks violate the golden rule of banking, i.e., if they mismatch currencies or maturities or engage in a combination of both, they become vulnerable to attacks through CDSs.

    只有银行违反银行业黄金法则也就是说如果他们发生货币配、期限错配或者货币期限错配的时候,他们容易受到CDS攻击

    youdao

  • The mechanism also allows the operating system to identify the source of the attack and isolate it, so that the operating system will no longer be vulnerable to attacks from that application.

    机制同时允许操作系统鉴定攻击隔离以使自身免受带毒应用再次攻击

    youdao

  • Users may select encryption without specifying authentication, but this action leaves the packets vulnerable to active attacks, which can lead to an outside entity breaking the encryption.

    用户可以选择不用特定认证进行加密但是这样容易受到攻击导致让别人破坏加密。

    youdao

  • Fortunately, such a scenario is likely to remain science fiction. But smart systems might be vulnerable to malfunctioning or attacks by hackers.

    幸运的是,一幕或许仍然只是科幻小说中的情节,不过智能系统的确很容易瘫痪或是黑客侵袭。

    youdao

  • Your computer iseven more vulnerable to security attacks if you're running plug-ins that aren'tup to date, because out-of-date plug-ins don't contain the latest securityfixes.

    如果运行最新插件计算机容易安全攻击因为插件没有最新安全补丁。

    youdao

  • Tankers and large container ships are most vulnerable to pirate attacks, said ReCAAP, because they are slow moving.

    ReCAAP还说由于航速较油轮大型集装箱海盗首选的袭击目标。

    youdao

  • Worse than this, many such systems are not optimized and are vulnerable to the threats of partial or complete failure and external attacks.

    糟糕是,这样系统很多没有经过优化,容易受到部分全面故障外部攻击的威胁

    youdao

  • All kinds of computers are vulnerable to electrical failures or data theft. But bacteria are immune from cyber attacks. You can safeguard the information.

    所有类型电脑容易遭受电力故障数据被盗但是细菌对于网络攻击免疫的。可以信息进行安全地保护

    youdao

  • One is security: such systems will be vulnerable to all sorts of hacker attacks.

    有一个安全此类系统各式各样黑客攻击。

    youdao

  • This script is vulnerable to cross-site scripting attacks because it blindly prints out submitted form data.

    脚本容易跨站点脚本攻击因为盲目输出所提交表单数据

    youdao

  • It did crash my browser a couple of times when I loaded malformed content, which makes it vulnerable to denial of service attacks, so I'm hesitant to recommend it for full production use.

    加载混乱内容真的浏览器了,一点容易受到拒绝服务攻击因此知道是否应该推荐真正的产品环境中使用

    youdao

  • The first step is to identify critical system assetsintangible or tangiblethat are vulnerable to malicious attacks.

    一步确定易遭到恶意攻击的关键系统资产——无形或者有形

    youdao

  • The first step says you need to identify critical system assets-tangible and intangible-that are most likely vulnerable to malicious attacks.

    一步表示需要识别(有形无形的)关键系统资产,这些资产罪可能受到恶意攻击。

    youdao

  • Because a signature alone does not guarantee that the sender is who they say they are, the message transmission is vulnerable to techniques such as replay attacks by some malicious third party.

    因为仅仅数字签名无法保证发送方就是他们自己声称消息传输容易遭受恶意第三诸如再现攻击等技术的袭击。

    youdao

  • The malicious program quickly found its way into computers controlling industrial processes the world over, demonstrating how vulnerable control systems are to such attacks.

    提及的恶性程序能很快发现进入控制世界工业过程计算机组,这说明控制系统面对这种攻击时是多么不堪一击

    youdao

  • But experts are warning that the so-called smart grids might be vulnerable to cyber attacks.

    但是专家警告说,这种所谓智能网容易受到网络攻击。

    youdao

  • But smart systems might be vulnerable to malfunctioning or attacks by hackers.

    智能系统反而在故障面前极度脆弱,而且容易受黑客攻击。

    youdao

  • Flu can kill in other ways, too, from rendering you vulnerable to bacterial infections to triggering heart attacks.

    流感可以通过其他方式致死,例如使患者细菌感染从而引发心脏病。

    youdao

  • Mobile devices are still perceived by many as being vulnerable to security attacks.

    很多认为移动设备容易受到安全攻击

    youdao

  • Search engines that echo the search keyword that was entered are also vulnerable to such attacks.

    响应搜索关键字的搜索引擎容易遭受攻击

    youdao

  • This piece of code is vulnerable to XSS attacks because no check is made to validate the input.

    代码容易受xss攻击因为没有进行任何的输入验证

    youdao

  • This piece of code is vulnerable to XSS attacks because no check is made to validate the input.

    代码容易受xss攻击因为没有进行任何的输入验证

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定