Swipe is the operative word: cards are increasingly vulnerable to attacks when you make purchases in a store.
“刷卡”是最关键的一个词:当你在商店购物时,信用卡越来越容易受到攻击。
During the bounce-back motion, the character is completely vulnerable to attacks.
在被弹回来时,角色很容易被攻击。
Disabling code access security makes the system vulnerable to attacks by malicious code such as viruses and worms.
禁用代码访问安全性会使系统容易受到恶意代码(如病毒和蠕虫)的攻击。
Although these slower transactions may not be noticeable to the casual user, they may still be vulnerable to attacks at the ISP level.
虽然这些较慢的交易对普通用户来说可能觉察不到,但它们在IS P层面上仍容易遭到攻击。
Today surfers seem particularly vulnerable to attacks — sharks swimming from below can sometimes mistake a person paddling a board for a seal.
在今天冲浪的人们似乎很容易受到鲨鱼的袭击:因为当有鲨鱼在人们下面游过时,鲨鱼有时候会把冲浪板上的人误认为是海豹而进行攻击。
Greek officials on Thursday denied claims that serious construction delays facing Athens could leave venues and transit systems more vulnerable to attacks.
周四,希腊官员否认了此种说法,即雅典所面临的严重的工程建设延期将使得比赛场所和交通运输系统更易受到攻击。
Shanghai rent car driver, we remind vulnerable to attacks from the location of the lightning most centered in the car roof, the wheel of the metal part circle.
上海租车网提醒司机,汽车比较容易遭受雷击的位置大多集中在汽车的顶棚、车轮的金属圈部分。
Only if Banks violate the golden rule of banking, i.e., if they mismatch currencies or maturities or engage in a combination of both, they become vulnerable to attacks through CDSs.
只有当银行违反了银行业的黄金法则,也就是说,如果他们发生货币错配、期限错配或者货币期限都错配的时候,他们才容易受到CDS的攻击。
The mechanism also allows the operating system to identify the source of the attack and isolate it, so that the operating system will no longer be vulnerable to attacks from that application.
该机制同时允许操作系统鉴定攻击源并将其隔离,以使自身免受带毒应用的再次攻击。
Users may select encryption without specifying authentication, but this action leaves the packets vulnerable to active attacks, which can lead to an outside entity breaking the encryption.
用户可以选择不用特定的认证进行加密,但是这样会让包容易受到攻击,导致让别人破坏加密。
Fortunately, such a scenario is likely to remain science fiction. But smart systems might be vulnerable to malfunctioning or attacks by hackers.
幸运的是,这一幕或许仍然只是科幻小说中的情节,不过智能系统的确很容易瘫痪或是被黑客侵袭。
Your computer iseven more vulnerable to security attacks if you're running plug-ins that aren'tup to date, because out-of-date plug-ins don't contain the latest securityfixes.
如果运行非最新插件,你的计算机更容易受安全攻击,因为旧插件没有最新安全补丁。
Tankers and large container ships are most vulnerable to pirate attacks, said ReCAAP, because they are slow moving.
ReCAAP还说,由于航速较慢,油轮和大型集装箱船是海盗首选的袭击目标。
Worse than this, many such systems are not optimized and are vulnerable to the threats of partial or complete failure and external attacks.
比这更糟糕的是,这样的系统很多都没有经过优化,容易受到部分或全面故障和外部攻击的威胁。
All kinds of computers are vulnerable to electrical failures or data theft. But bacteria are immune from cyber attacks. You can safeguard the information.
所有类型的电脑都容易遭受电力故障或数据被盗。但是细菌对于网络攻击是免疫的。你可以对信息进行安全地保护。
One is security: such systems will be vulnerable to all sorts of hacker attacks.
有一个是安全:此类系统易受各式各样的黑客攻击。
This script is vulnerable to cross-site scripting attacks because it blindly prints out submitted form data.
该脚本容易受跨站点脚本攻击,因为它盲目输出所提交的表单数据。
It did crash my browser a couple of times when I loaded malformed content, which makes it vulnerable to denial of service attacks, so I'm hesitant to recommend it for full production use.
加载混乱的内容时真的有两次把我的浏览器当掉了,这一点很容易受到拒绝服务攻击,因此我不知道是否应该推荐在真正的产品环境中使用它。
The first step is to identify critical system assets — intangible or tangible — that are vulnerable to malicious attacks.
第一步是确定易遭到恶意攻击的关键系统资产——无形的或者有形的。
The first step says you need to identify critical system assets-tangible and intangible-that are most likely vulnerable to malicious attacks.
第一步表示您需要识别(有形或无形的)关键系统资产,这些资产罪可能受到恶意攻击。
Because a signature alone does not guarantee that the sender is who they say they are, the message transmission is vulnerable to techniques such as replay attacks by some malicious third party.
因为仅仅有数字签名并无法保证发送方就是他们自己所声称的人,消息的传输很容易遭受恶意第三方诸如再现攻击等技术的袭击。
The malicious program quickly found its way into computers controlling industrial processes the world over, demonstrating how vulnerable control systems are to such attacks.
提及的恶性程序能很快发现并进入控制世界上工业过程的计算机组,这说明控制系统在面对这种攻击时是多么的不堪一击。
But experts are warning that the so-called smart grids might be vulnerable to cyber attacks.
但是,专家警告说,这种所谓智能网很容易受到网络攻击。
But smart systems might be vulnerable to malfunctioning or attacks by hackers.
智能系统,反而在故障面前极度脆弱,而且很容易受黑客攻击。
Flu can kill in other ways, too, from rendering you vulnerable to bacterial infections to triggering heart attacks.
流感也可以通过其他方式致死,例如使患者易受细菌感染从而引发心脏病。
Mobile devices are still perceived by many as being vulnerable to security attacks.
很多人认为,移动设备容易受到安全攻击。
Search engines that echo the search keyword that was entered are also vulnerable to such attacks.
响应搜索关键字的搜索引擎也容易遭受这类攻击。
This piece of code is vulnerable to XSS attacks because no check is made to validate the input.
这段代码很容易受xss攻击,因为没有进行任何的输入验证。
This piece of code is vulnerable to XSS attacks because no check is made to validate the input.
这段代码很容易受xss攻击,因为没有进行任何的输入验证。
应用推荐