The police have so far failed to track down the attacker.
警方至今未能追捕到攻击者。
The attacker may have been waiting around for an opportunity to strike.
袭击者可能一直在等待着一个下手的机会。
The attacker then tried to throttle her with wire.
那名袭击者然后试图用电线勒死她。
She was able to identify her attacker.
她认出了袭击她的人。
He finally managed to break free from his attacker.
他终于设法摆脱了袭击他的人。
She was barely able to stammer out a description of her attacker.
她只能勉强结结巴巴地说一说袭击她的人是什么模样。
The drawing is said to be a good likeness of the girl's attacker.
据说那幅画像很像袭击那个女孩的歹徒。
Her loud scream scared the attacker and people came to help.
她的尖叫声把袭击者吓了一跳,人们赶来帮忙。
Bodyguards can use one or two blows to stop an attacker.
保镖要有能力通过三拳两脚就能阻止袭击者”,北京VSS保安咨询公司总裁迈克尔-翟说。
An attacker can threaten to throw eggs against your brick house, but it is harmless.
攻击可以威胁向您的房子扔鸡蛋,但这是无害的。
This "help" can also aid an attacker to create data to mislead the program.
这种“帮助”也可以帮助攻击者创建用于误导程序的数据。
They make it easy for an attacker to determine the key.
因为这些函数让攻击者很容易就可以判断出密钥。
Now, an attacker would need to find somewhere to input a malicious script.
现在,攻击者需要找到某个地方来输入恶意脚本。
When the attacker tried to drive the bus away, the driver disabled the vehicle.
当袭击者企图开车逃跑时,司机让大巴无法启动。
The attacker then asks for the password to be reset to a specific value.
攻击者接下来将密码重新设置为特定的值。
The class was curious what technique she had used to take down her attacker.
同学们都想知道她用哪一招放倒了进攻者。
The question to ask is can an attacker control the value of the variable filename?
要问的问题是攻击者可以控制变量filename的值吗?
Once stolen, an attacker can use the cookie to impersonate the user.
一旦偷取到cookie,攻击者会使用cookie去伪装成真正的用户。
She recognize her attacker and give his description to the police.
她认出了袭击她的人并向警察进行了描述。
The girl sat down with a police artist to compile a Photofit of her attacker.
女孩坐着和警方画像专家一起模拟拼绘攻击她的人的画像。
She was able to give the police an accurate description of her attacker.
她能把袭击者的情况向警方作出准确的描述。
The woman managed to break loose from her attacker and run for help.
那个女子想方设法摆脱了袭击者之后跑去求救。
We assume that the attacker has access to certain platform MSR registers.
我们假设攻击者已经有平台可对MSR寄存器进行读写。
Process user input data and make it available to the attacker.
处理用户的输入数据并让攻击者获取。
This is the attacker has never been a place to meet.
这是攻击者从来没有达到的地方。
She told how the attacker drew a knife and held it up to her throat.
她讲了袭击者是如何拔出刀子抵住她喉咙的。
What might an attacker use this vulnerability to do?
攻击者可能利用此漏洞做什么?
Bond grabbed hold of the vicious attacker and flung him to the ground.
邦德一把抓住这个凶狠的袭击者,并把他摔倒在地上。
She is able to identify her attacker.
她能认出袭击她的人。
She is able to identify her attacker.
她能认出袭击她的人。
应用推荐