The dead men could have been the victims of mistaken identity. Their attackers may have wrongly believed them to be soldiers.
这些死者可能是错认身份的受害者,袭击者可能误以为他们是当兵的。
They drive their attackers off.
他们击退了进攻者。
The two brothers fought together against their attackers.
这两兄弟并肩战斗,反对攻击者。
The trapped men shot out through the windows at their attackers.
那些被围困的人从窗户里向进攻者开火。
Many victims of crime are reluctant to press charges against their attackers.
许多受害者不愿意指控攻击他们的犯罪分子。
We have to be aware of their attackers and midfielders because they are very strong coming forward.
我们必须意识到他们的锋线和中场,因为他们的前场很强大。
Yennenga and her benefactor1 routed2 their attackers but the horseman paid for the victory with his life.
叶尼佳和她的恩人一起击退了袭击者,但骑士却为此付出了生命。
By that test, the West let down the Bahrainis: sterner talk from Mr Obama may have deterred their attackers.
在巴林事件这场考验中,虽然奥巴马的强硬声明也许阻止了轰炸机的炮轰,西方世界仍然让巴林人民颇为失望。
Far too many women who report their attackers are then victimized by complaint systems that are difficult to navigate and disciplinary proceedings that are stacked against them.
许多报告了骚扰者的女性们都因为接下来的诉讼程序而气馁,这些诉讼程序繁琐且难以进行。
Their attackers lived in the village of Raispur, less than a mile from the tidy complex where the young man shared an apartment with his parents, but they belong to an altogether different India.
这些攻击者住在瑞斯坡的农村,距这个年轻男人和他的父母的整洁的装修完备的公寓不到一公里,但是他们属于一个完全不同的印度。
They issued an ultimatum to the police to rid the area of racist attackers, or they will take the law into their own hands.
他们向警方发出了最后通牒,要他们清除掉该地区的种族主义袭击者,否则他们就要自行采取行动。
Attackers can deliberately craft their input so that it escapes out of quoting, and chain an arbitrary query on the end of the one you had intended to run.
攻击者可以蓄意地安排他们的输入,使之溢出引号之外,并在您想运行的真正查询后面链接上任意一个查询。
But not all attackers are willing to pay even this small sum; whether it is worth doing so depends on how much revenue their activities bring in.
即使这么小一笔钱也不是所有的攻击者都愿意给的;这么做值不值当取决于解开验证能为他们带来多少收益。
But security experts warn that attackers could use their foothold on the system to start stealing users' and customers' credit card Numbers and personal information.
但是安全专家警告说攻击者可以利用他们在系统中的立足点偷窃用户和客户的信用卡账号和个人信息。
This is a handy thing to look for when investigating a compromised system because attackers often delete logs to hide their tracks.
在遭到破坏的系统中查找相关内容时,这是非常有用的内容,因为攻击者通常会删除日志以隐藏他们的踪迹。
Hours before a visit by the American secretary of state, attackers shot their way into three compounds housing Westerners and Saudis and set off car bombs.
就在美国国务卿抵达沙特阿拉伯几小时前,攻击者驶车冲向三幢西方人和沙特人的混合居民楼,引爆了炸弹。
Finjan found the attackers had lured about 90,000 potential victims to their sites, and successfully infected about 6,400 of them.
安全专家还发现攻击者已经诱骗了大约90,000个潜在用户登录他们的网站,并成功感染了6,400个用户。
In this article I will take a look at what password cracking is, why attackers do it, how they achieve their goals, and what you can do to do to protect yourself.
本文将研究什么是密码破解、为什么攻击者会这样做、他们如何达到目的以及如何保护您自己。
Now that you know how attackers get their code into applications, look at the implications of some common attacks.
我们已经知道攻击者是如何将代码注入应用程序的,接下来再看看一些常见攻击所带来的影响。
Let's take a look at a few scenarios and examine how attackers launch their attacks and how they might be stopped or prevented.
让我们研究一些方案,分析攻击者如何发起攻击以及如何停止或预防他们。
"The attackers took great care to make sure that only their designated targets were hit," he said.
“攻击者花了很多心思以保证只攻击特定的目标,”他说。
Scarier still, the same tech-novice PC owners who failed to fortify their computers properly, allowing them to become spam relays and zombie DDOS attackers, are now making the switch to Macs.
更糟糕的是,一些并没有恰当地给自己的电脑做好防护措施,让自己成为了垃圾广告中继和zombieDDOS攻击者的电脑新手,现在转变成为Mac用户。
To exploit this, attackers send malformed JSON objects to these libraries so the eval function executes their malicious code.
要利用这点,攻击者可以向这些库发送畸形的JSON对象,这样eval函数就会执行这些恶意代码。
Wherever and whenever a trusted mainstream website distributes or promotes third-party content, attackers seek to abuse the trust relationship established between the site and their users.
攻击者随时随地瞄准主流网站。当主流网站发布或推广第三方内容时,攻击者就寻机利用用户对这些主流网站的信任发动攻击。
Using the telecommunications network, rather than the Internet, for botnet control allows attackers to hide their actions from users.
对于僵尸网络而言使用通讯网络替代因特网能够有更大的优势,那就是隐匿攻击者的身份。
That was how Truman Capote summed up the murders with somewhat greater drama, referring to the four Clutter victims and their two attackers who died later on the gallows.
杜鲁门·卡波特用戏剧化的语言概括了这场凶杀案,他指的六个人是克拉特家的四个受害者,以及被处以绞刑的两名入侵者。
An Afghan intelligence official in the hotel also told me that three of the attackers have managed to detonate their suicide vests, the first one in the second floor, where the rooms are.
阿富汗驻该酒店一名情报官员告诉我,其中三名袭击者引爆了自杀式背心,其中第一个在房间所在的二楼。
An Afghan intelligence official in the hotel also told me that three of the attackers have managed to detonate their suicide vests, the first one in the second floor, where the rooms are.
阿富汗驻该酒店一名情报官员告诉我,其中三名袭击者引爆了自杀式背心,其中第一个在房间所在的二楼。
应用推荐