• The dead men could have been the victims of mistaken identity. Their attackers may have wrongly believed them to be soldiers.

    这些死者可能是错身份受害者袭击者可能以为他们当兵

    《柯林斯英汉双解大词典》

  • They drive their attackers off.

    他们击退进攻者

    youdao

  • The two brothers fought together against their attackers.

    兄弟并肩战斗,反对攻击者

    youdao

  • The trapped men shot out through the windows at their attackers.

    那些被围困的窗户里向进攻者开火。

    youdao

  • Many victims of crime are reluctant to press charges against their attackers.

    许多受害者愿意指控攻击他们犯罪分子。

    youdao

  • We have to be aware of their attackers and midfielders because they are very strong coming forward.

    我们必须意识他们锋线中场因为他们的前场强大。

    youdao

  • Yennenga and her benefactor1 routed2 their attackers but the horseman paid for the victory with his life.

    叶尼佳恩人一起击退了袭击者骑士却为此付出了生命。

    youdao

  • By that test, the West let down the Bahrainis: sterner talk from Mr Obama may have deterred their attackers.

    巴林事件这场考验中,虽然巴马的强硬声明也许阻止了轰炸机的炮轰,西方世界仍然巴林人民颇为失望

    youdao

  • Far too many women who report their attackers are then victimized by complaint systems that are difficult to navigate and disciplinary proceedings that are stacked against them.

    许多报告了骚扰者的女性都因为接下来诉讼程序而气馁,这些诉讼程序繁琐且难以进行。

    youdao

  • Their attackers lived in the village of Raispur, less than a mile from the tidy complex where the young man shared an apartment with his parents, but they belong to an altogether different India.

    这些攻击者瑞斯农村,距这个年轻男人父母整洁装修完备的公寓不到公里但是他们属于完全不同印度

    youdao

  • They issued an ultimatum to the police to rid the area of racist attackers, or they will take the law into their own hands.

    他们警方发出了最后通牒他们清除掉地区种族主义袭击者否则他们就要自行采取行动。

    《柯林斯英汉双解大词典》

  • Attackers can deliberately craft their input so that it escapes out of quoting, and chain an arbitrary query on the end of the one you had intended to run.

    攻击者可以蓄意地安排他们输入使之溢出引号之外想运行真正查询后面链接任意一个查询。

    youdao

  • But not all attackers are willing to pay even this small sum; whether it is worth doing so depends on how much revenue their activities bring in.

    即使这么一笔钱不是所有攻击愿意的;这么做不值当取决于解开验证能为他们带来多少收益

    youdao

  • But security experts warn that attackers could use their foothold on the system to start stealing users' and customers' credit card Numbers and personal information.

    但是安全专家警告攻击者可以利用他们系统中的立足点偷窃用户客户信用卡账号个人信息。

    youdao

  • This is a handy thing to look for when investigating a compromised system because attackers often delete logs to hide their tracks.

    在遭到破坏系统查找相关内容非常有用的内容因为攻击者通常会删除日志隐藏他们的踪迹。

    youdao

  • Hours before a visit by the American secretary of state, attackers shot their way into three compounds housing Westerners and Saudis and set off car bombs.

    美国国务卿抵达沙特阿拉伯几小时攻击者驶冲向幢西方人沙特人的混合居民楼引爆了炸弹

    youdao

  • Finjan found the attackers had lured about 90,000 potential victims to their sites, and successfully infected about 6,400 of them.

    安全专家还发现攻击者已经诱骗了大约90,000个潜在用户登录他们网站成功感染6,400个用户。

    youdao

  • In this article I will take a look at what password cracking is, why attackers do it, how they achieve their goals, and what you can do to do to protect yourself.

    本文研究什么密码破解为什么攻击者会这样做他们如何达到目的以及如何保护您自己

    youdao

  • Now that you know how attackers get their code into applications, look at the implications of some common attacks.

    我们已经知道攻击是如何代码注入应用程序接下来再看看一些常见攻击所带来的影响

    youdao

  • Let's take a look at a few scenarios and examine how attackers launch their attacks and how they might be stopped or prevented.

    我们研究一些方案分析攻击如何发起攻击以及如何停止预防他们

    youdao

  • "The attackers took great care to make sure that only their designated targets were hit," he said.

    攻击花了很多心思保证攻击特定目标,”

    youdao

  • Scarier still, the same tech-novice PC owners who failed to fortify their computers properly, allowing them to become spam relays and zombie DDOS attackers, are now making the switch to Macs.

    糟糕的是,一些并没有恰当地自己电脑做好防护措施,自己成为垃圾广告中继zombieDDOS攻击者电脑新手,现在转变成为Mac用户

    youdao

  • To exploit this, attackers send malformed JSON objects to these libraries so the eval function executes their malicious code.

    利用这点攻击者可以这些发送畸形JSON对象这样eval函数就会执行这些恶意代码

    youdao

  • Wherever and whenever a trusted mainstream website distributes or promotes third-party content, attackers seek to abuse the trust relationship established between the site and their users.

    攻击者随时随地瞄准主流网站。当主流网站发布推广第三方内容时,攻击者就寻机利用用户对这些主流网站信任发动攻击。

    youdao

  • Using the telecommunications network, rather than the Internet, for botnet control allows attackers to hide their actions from users.

    对于僵尸网络而言使用通讯网络替代因特网能够有更大的优势,那就是隐匿攻击者的身份。

    youdao

  • That was how Truman Capote summed up the murders with somewhat greater drama, referring to the four Clutter victims and their two attackers who died later on the gallows.

    杜鲁门·卡波特戏剧化的语言概括了这场凶杀案,他六个人是克拉特家的受害者以及被处以绞刑的入侵者

    youdao

  • An Afghan intelligence official in the hotel also told me that three of the attackers have managed to detonate their suicide vests, the first one in the second floor, where the rooms are.

    阿富汗驻酒店情报官员告诉其中三名袭击者引爆了自杀式背心,其中第一房间所在二楼

    youdao

  • An Afghan intelligence official in the hotel also told me that three of the attackers have managed to detonate their suicide vests, the first one in the second floor, where the rooms are.

    阿富汗驻酒店情报官员告诉其中三名袭击者引爆了自杀式背心,其中第一房间所在二楼

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定