God is subtle but he is not malicious.
上帝是微妙的,但他没有恶意的。
The virus was of Gasson's own design and was not malicious.
Gasson自己设计的这个病毒并非恶意病毒。
In particular this means that this file is not malicious but a false alarm.
尤其是这意味着该文件是不是恶意的,但是是虚惊一场。
Protection activities venues of public facilities, not malicious smear zoned, damage.
保护活动场地的公共设施,不得恶意涂划、损坏。
Disclaimer: % This article is not malicious, is full of my blood and tears of history.
声明:此文并非恶意中伤,全是本人的辛酸血泪史。
The secret of happiness is: let the interest expansion, as much as possible to people react to things as much as possible from the goodwill, not malicious.
快乐的秘诀是:让兴趣尽可能地扩张,对人对物的反应尽可能出自善意而不是恶意的兴趣。
In German civil law which obeys the theory of juristic act of real right, the third party's acknowledgement of the former contract's defect is not malicious.
在遵从物权行为理论的德国民法中,第三人对前手交易合同瑕疵的知情不为恶意,第三人对出让人无处分权的知情才构成恶意。
The untrusted data is referred to as tainted data, while the code ensuring that the data is not malicious is called a sanitizer, and is often said to clean the taint.
这个非信任数据被看作是污染的数据,当这个代码确保这个数据是非恶意就称作杀毒功能,通常也称作杀毒污染的东西。
These are not necessarily hateful, malicious people.
这些不一定是心怀怨恨、有恶意的人。
She found that these patients did not get upset with people who had malicious intentions that didn't go as planned.
她发现这些病人对于那些有恶毒的动机但没实施成功的案例并没有感到不安。
Because the digital signature scheme guarantees nothing about who is the intended recipient of the signed message, nobody can determine whether the malicious party's claim is true or not.
由于数字签名方案无法保证谁是经签名的消息的目标接收方,那么也就没有人能确定恶意方声明的真实性。
The modification of actual malicious code to bypass antivirus has not pleased many security-software vendors.
修改真实的恶意代码来绕开防病毒软件没能让很多安全厂商高兴。
Because the digital signature scheme guarantees nothing about how many times the message was signed and sent by the sender, nobody can determine whether the malicious recipient's claim is true or not.
由于数字签名方案无法保证消息被发送方签名并发送的次数,那么也就没有人能确定恶意接收方声明的真实性。
Therefore, it seems that using SOAP-DSIG and SSL simultaneously is sufficient for non-repudiation, so I will now present two attacks by malicious recipients (not by third parties).
所以看起来同时使用SOAP - DSIG和SSL对于实现不可抵赖性来说已经足够了,那么我现在就提供两个来自恶意接收方(而非第三方)的攻击。
Malicious talk that undermines someone's reputation or unfairly criticizes someone's work when they're not around.
在背后诋毁别人声誉或对别人的工作做出不公正的批评。
Dick White disliked Rees intensely, AND thought he was making malicious accusations in order to court attention, if not publicity.
迪克·怀特很不喜欢里斯,认为他如果不是为了大出风头,也是为了博得青睐才进行恶意指控的。
Whether the link is initiated through your Gmail account or not, the malicious site can access your internal credentials.
不管该链接是否通过Gmail账户点开,该恶意网站都会得到你的内部资料。
The reality is that many closed-source vendors are not particularly evil or malicious, are not concealing rootkits, and are just trying to make a living in a way that they know how to make work.
事实是很多闭源供应商并不那么地邪恶或恶毒,也并不故意要隐藏rootkit,他们只不过是在试图借助自己的所知所能谋生而已。
While this particular example might not be considered severe, other more malicious code could be added, especially DELETE or UPDATE statements that modify tables.
虽然这个特例的后果可能并不太严重,但完全有可能添加更恶意的代码,尤其是会修改表的DELETE或update语句。
This hiding of live objects is not necessarily the result of malicious application code.
隐藏活动的对象并不一定是恶意应用程序代码的结果。
Sadly, even when we are sure that the software was not created with malicious intent, we are susceptible to trust problems.
可悲的是,即使我们确信这不是一个含有恶意目的的软件我们也会对信任问题产生怀疑。
Granted, for most users this will not happen, but a malicious one could slip through.
即使大多数用户都不会这样做,但某个恶意的人却可以钻空子。
A malicious proxy can make it appear that the connection is tunneled when it actually is not.
恶意的代理可以在并不存在隧道时却伪装成仿佛隧道真正存在一样。
In network environments where there may be unreliable or malicious computers, the creator of a message is not always the same as the sender of the message.
在可能存在不可靠或恶意的计算机的网络环境中,消息的创建者和消息的发送方不总是相同的。
If any match, the request is rejected, and the malicious input does not arrive at the server.
如果匹配成功,就拒绝该请求,恶意的输入不会到达服务器。
For example, a hacker can enter in the guise of a privileged user with administrative access controls and perform malicious activities that a legitimate system administrator did not initially notice.
例如,黑客可以伪装成具有管理访问权的特权用户进入系统并执行恶意操作,而真正的系统管理员不会马上注意到。
For example, a hacker can enter in the guise of a privileged user with administrative access controls and perform malicious activities that a legitimate system administrator did not initially notice.
例如,黑客可以伪装成具有管理访问权的特权用户进入系统并执行恶意操作,而真正的系统管理员不会马上注意到。
应用推荐