阅读太多不可信的消息会让你忧虑。
Reading too much the unbelievable information can make you worried.
这个政府从一些零星的谣言、陈旧的线索和不可信的报告中编造出兵伊拉克的理由。
The administration makes up excuse for the invasion of Iraq out of a few stray rumors, stale leads and discredited reports.
一项加拿大的研究发现,只有14个月大的孩子就能把可信的人和不可信的人区分开来。
A Canadian study found that children as young as 14 months can differentiate between a credible person and a dishonest one.
如果您的程序是数据的浏览器或者编辑器——比如文字处理器或者图像显示器——那么那些数据有可能来自攻击者,所以那是不可信的输入。
If your program is a viewer or editor of data—such as a word processor or an image displayer—that data might be from an attacker, so it's an untrusted input.
严格检查不可信的输入。
这是恶意程序和信息都不应是不可信的。
This is malicious program and none of information shouldn't be trusted.
甚至他骑的骆驼也带着令人不可信的政客式的微笑。
尽可能多地限制不可信的外部内容是一个良好的实践。
It's a good practice to use the as much as possible to confine untrusted external contents.
企业意识到服务不能够在内部使用,因为它们是不可信的。
Enterprises realize that services are not used internally because they cannot be trusted.
大多数专家说他们错了,因为被测验者给与了不可信的答案。
Most pundits said they were wrong, because respondents were giving unreliable answers.
不可信的数据被保留下来用于在浏览器中可视查看,如图5所示。
The untrusted data is preserved for visual appearance in the browser as shown in Figure 5.
例如,如果在银行您两分钟后仍无任何活动的话,将变成不可信的。
For example, you would become untrusted if two minutes elapsed without any activity within the bank.
不可信的数据被保留下来用于在浏览器中可视查看,如图5 所示。
The untrusted data is preserved for visual appearance in the browser as shown in Figure 5.
之前的那些通过木制滚轴或在海洋上漂流的运输方法被证明是不可信的。
Attempts to re-enact transporting the blocks on wooden rollers or floating them on the sea have not proved convincing.
图4中列出的第一个原则是极其重要的:假定所有用户输入都是不可信的!
The first principle listed in Figure 4 is extremely important: assume that all user input is evil!
不过,有时候,不可信的传闻甚至谣言一旦上了电视,就会越传越讹了。
But sometimes when a flimsy report, or even a rumor gets on tele-vision, there's going to be terrible "echo chamber" effect.
而许多具有所需技能的科学家都不愿意对他们认为是不可信的治疗方法进行研究。
Many scientists with the necessary skills are reluctant to investigate therapies they think are implausible.
Lauren:我有一个名单,但是我认为像“Sting”这样的是不可信的。
LAUREN: I haven't got a list, but I think that someone like Sting would be unbelievable.
当你的脚本从外部代码中读入任何输入,这些输入都必须认为是危险的,不可信的。
When your script reads any input from an outside source, the input must be treated as dangerous and not to be trusted.
绯闻少女:我们是怎么说表象的来着?对了,表象是不可信的。但大多时候,眼见为实。
Gossip girl: what is that we said about appearances? Yeah, they can be deceiving. But most of the time, what you see is what you get.
但是在不到四年的时间内两次地震超出了日本反应堆设计限度,他们的这种争辩是不可信的。
But after two earthquakes in less than four years shook Japanese reactors beyond their design limits, this argument is simply not credible.
对于我来说,那些想要对话的人们都是不可信的,因为那助长了他们无法满足的特别的期待。
To me people who want to have a conversation are suspect, because that raises particular expectations they're unable to satisfy.
为了防止邮件提供商不想实现这个协议或者它是不可信的,还可以由第三方认证机构来持有公钥。
There can be secondary authorities holding the public key in case the email provider does not want to implement the protocol or it is not reliable.
我们已经配置了这个选项,现在重新启动应用程序并尝试使用一个不可信的OpenID提供者。
Now that we have configured this option and restarted the application, we will try an untrusted OpenIDProvider.
如果您的程序响应网络上的请求,那些请求可能正是来自攻击者——所以网络连接是不可信的输入。
If your program responds to requests over a network, those requests might very well come from an attacker — so the network connection is an untrusted input.
如果社会、技术、外部因素可使原来不可信的预言成真的话,那么下一个复活的技术将会是什么呢?
If social, technological and external factors can make supposedly discredited predictions come true, what technology might be next in line for a revival?
亘久不变的灵魂是不存在的,甚至我们对自身的描述都是不可信的(鉴于纠结的“无我”的否定)。
There is no permanent, constant soul in the background. Even our language about ourselves is to be distrusted (requiring the tortured negation of anatta).
有些玩家是不可信的,更糟的是,他们能够通过客户端执行文件获取对加密算法和所有通信的了解。
Some players cannot be trusted, and worse, they have complete access to the encryption algorithm and all communications via the client executable.
当可信主机上的用户希望登录远程计算机(可以是不可信的系统)时,使用SSH中基于主机的身份验证。
Host-based authentication in SSH is used when a user on a trusted host wants to log on to a remote machine, which could be an untrusted system.
当可信主机上的用户希望登录远程计算机(可以是不可信的系统)时,使用SSH中基于主机的身份验证。
Host-based authentication in SSH is used when a user on a trusted host wants to log on to a remote machine, which could be an untrusted system.
应用推荐