• This prevents the most egregious types of attack, where an intruder can use the built in administrative infrastructure to deploy rogue applications onto your desktop.

    这样可以防止恶劣攻击类型(入侵者可能使用内置管理基础设施恶意应用程序部署的桌面上)。

    youdao

  • If an intruder has access to your database, or even raw machine-level access to the database volumes, he or she might be able to see information in the session.

    如果入侵者可以访问数据库甚至数据库信息原始计算机级访问,可能看到会话中的信息。

    youdao

  • If even one program goes undetected, the intruder might have a way back into your system.

    如果一个程序在不知不觉中,入侵者可能重新找到你的系统。

    youdao

  • So if you see a bearded intruder on a fixed-gear bike in your neighbourhood, welcome him.

    所以如果住的社区看到骑着自行车、一脸络腮胡子的不速之客的话,就欢迎吧。

    youdao

  • Thank you for your access to this page: Dear intruder (BUG discoverer) I take you to the page meant to say: I am not a hacker!

    首先感谢访问这个页面尊敬入侵者(BUG发现者)您带到这个页面的意思是:我不是黑客

    youdao

  • Thank you for your access to this page: Dear intruder (BUG discoverer) I take you to the page meant to say: I am not a hacker!

    首先感谢访问这个页面尊敬入侵者(BUG发现者)您带到这个页面的意思是:我不是黑客

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定