进攻者被击退了。
We had only a vague description of the attacker.
我们只有那个袭击者的粗略描述。
The police have so far failed to track down the attacker.
警方至今未能追捕到攻击者。
The attacker may have been waiting around for an opportunity to strike.
袭击者可能一直在等待着一个下手的机会。
Loud voice can usually make the attacker calm down.
响亮的声音通常可以让攻击者冷静下来。
She gave an exact description of the attacker.
她对袭击者的特征作了精确的描述。
Her loud scream scared the attacker and people came to help.
她的尖叫声把袭击者吓了一跳,人们赶来帮忙。
Let the attacker know you're ready.
让攻击者知道你有所准备。
What's the identity of the attacker?
初步判断袭击者身份是什么?
If the attacker can, there's a problem.
如果可以,就存在问题了。
The one under attack is now the attacker.
被袭击者现在变成了袭击者。
现在看看攻击者。
The woman fought off the attacker with her pen.
被袭击的妇女用自己的钢笔反击才得以挣脱。
He said the attacker was not seriously wounded.
他说袭击者伤势不重。
This is the attacker has never been a place to meet.
这是攻击者从来没有达到的地方。
Worst of all, the identity of the attacker may remain a mystery.
最糟糕的是,攻击者的身份仍是一个迷。
Process user input data and make it available to the attacker.
处理用户的输入数据并让攻击者获取。
The attacker then asks for the password to be reset to a specific value.
攻击者接下来将密码重新设置为特定的值。
She told how the attacker drew a knife and held it up to her throat.
她讲了袭击者是如何拔出刀子抵住她喉咙的。
We assume that the attacker has access to certain platform MSR registers.
我们假设攻击者已经有平台可对MSR寄存器进行读写。
If the attacker has the application display a set of HTML, trouble may creep in.
如果攻击者通过应用程序显示一组HTML,这有可能就会带来麻烦。
The attacker discovered on the Internet that the worker had four children.
攻击者通过互联网上发现,该位员工有四个孩子。
The attacker would then provide a "bin" program that the program could find.
这样攻击者就可以提供一个程序可以找到的“bin”程序。
When the attacker tried to drive the bus away, the driver disabled the vehicle.
当袭击者企图开车逃跑时,司机让大巴无法启动。
That means the attacker can set up the entire attack in essentially one operation!
这意味着攻击者本质上能够在一个操作中完成整个攻击!
The first scenario looks at a situation in which a disgruntled employee is the attacker.
第一种方案研究的是攻击者是心怀不满的雇员的情况。
That will let the attacker control internal data and possibly take over the program.
这样可以让攻击者控制内部数据,甚至控制整个程序。
However, the attacker may also take over the account by changing the E-mail address.
然而,攻击者也可以通过修改email地址来接管帐户。
Hopefully, a victim will report the card as missing before the attacker gets that far.
希望受害者能在攻击者得手之前报告信用卡丢失。
Thus, for the control of the operating system of the attacker, there is no protection.
因而,对于控制了操作系统的攻击者来说,并没有防护能力。
应用推荐