• 割裂流血效果攻击强度加成。

    The bleed effect of "Lacerate" now increases in potency with greater attack power.

    youdao

  • 网站受攻击或者机时如何快速恢复

    How to recover the website rapidly when it is attacked or crash?

    youdao

  • 格丽转移了目标不再攻击

    Gretchen had switched targets and he no longer was under attack.

    youdao

  • 塞拉利昂之后的是尼日尔,它的攻击率为1/442。

    After Sierra Leone, Niger fared well with one in every 442 surfers likely to be attacked while online.

    youdao

  • 国内服务器网站安全威胁日益升级攻击次数连年跃升

    Domestic server, website security threats escalating, the number of attacks in recent years jumped.

    youdao

  • 尸体爆炸(第3层)现在造成暗影伤害并且不再攻击强度影响。

    Corpse Explosion (Tier 3) now does shadow damage, and is no longer modified by attack power.

    youdao

  • 普通混凝土可以用于一些区域攻击支配强的

    Ordinary concrete can be used in some areas, but it is subject to attack by strong acids and alkalis .

    youdao

  • 可用性系统持续工作即使攻击的时候也是如此(“工作持续性”)。

    Availability: the system will keep working even when being attacked (" works continuously ").

    youdao

  • 计算机网络受攻击前后安全特性变化角度提出了网络概念

    The paper put forward the concept of network entropy from the point of view of the security characteristic change of computer network after it was attacked.

    youdao

  • 赛珍珠1931年的小说《大地农村家庭描写,因坦率广攻击

    Buck's account of a farming family in "The Good Earth" was widely attacked for its frankness when it came out in 1931.

    youdao

  • 如果系统服务不可用,合法用户无法使用攻击系统上网络服务(2)。

    Once the system or service has been made unavailable, legitimate clients are blocked from using the network service hosted by the system under attack (See Figure 2).

    youdao

  • 准则强调攻击目标功能损伤而不是受攻击目标物理杀伤

    The criterion is laid special stress on functional damage of the attacked targets, not the physical killing of the attacked targets.

    youdao

  • 分析这些方案共性受攻击原理,最后给出一个安全的签名方案

    Then, commonness of these schemes is analysed, an improved coalition resistant group signature scheme is put forward.

    youdao

  • 这个方案针对网格水印两个难点网格频率分解受攻击网格的拓扑恢复

    The algorithm focuses on the two challenges of mesh watermarking, i. e. , frequency decomposition of meshes and topology reconstruction of attacked meshes.

    youdao

  • 莫斯科电视撤军做了广泛报导,一则苏联电视报导车队攻击但是并未提供细节

    Moscow television carried extensive coverage of the pullout. A Soviet television correspondence said the convoy had come under fire but did not provide details.

    youdao

  • 尽管印度女性攻击更加频繁,但一些外国游客逐渐成为攻击对象,并引发了广泛的国际关注

    Several foreign tourists also have been targeted in attacks that often get international attention, although Indian women are assaulted far more frequently.

    youdao

  • 大脑神经无可替代,植物无法移动,也受攻击部分吃掉毁坏后它们活下去

    Brains and neurons are irreplaceable, but plants are immobile and often attacked, so they must be able to survive after part of them is eaten or destroyed.

    youdao

  • 我们网站受攻击,刚刚又再次出问题导致无法登陆,另外大会会务繁重,我们代祷

    Our website has been frequently attacked and it collapsed again yesterday . Also, there's still much to be done before the conference so please pray for us.

    youdao

  • 成功的攻击允许攻击受攻击应用程序执行任意代码。同时,失败攻击导致拒绝服务。

    Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks may cause denial-of-service conditions.

    youdao

  • 你使用引导法术时,两次攻击都会减少你法术持续时间25%,之后攻击不再影响

    When channeling a spell: The first and second hit reduces current duration by 25% of total duration each. All hits after the second will have no effect.

    youdao

  • 外壳型入侵型病毒通常攻击可执行文件,即带有或扩展名的文件。当然数据文件受攻击危险

    Shell and intrusive viruses most commonly attack executable program flies-those with a. com or. exe extension, although data flies are also at some risk.

    youdao

  • 如果用户怀疑电脑受攻击了,Prevx建议下载款其它的杀毒软件,推荐使用非主流杀毒软件。

    Prevx also suggests downloading another security product if you are suspicious, and recommends you use an alternative security product.

    youdao

  • 数百警察决然警察棍向公园中的群众开始攻击攻击的群众则开始投掷石块高声辱骂干脆逃跑

    Hundreds of police waded into the crowd with nightsticks, as their targets threw rocks, shouted curses, or ran.

    youdao

  • 此外,和传统防弹衣相比受攻击较少变形这样就可能避免防弹衣变形而给人体造成严重伤害

    It also distorts less than conventional body armour when it is hit. That means it is less likely to cause serious injury by deflecting inward.

    youdao

  • 进行系统加固应该采取首要步骤之一降低受攻击机器运行代码越多,代码利用机会更越大

    One of the first steps you should take when hardening a machine is to reduce its attack surface. The more code that's running on a machine, the greater the chance that the code will be exploitable.

    youdao

  • 如果攻击程序系统管理员启动的,那么恶意代码作为原始程序的一部分进行执行黑客系统中的管理员特权

    If the attacked program was initiated by a system administrator, the malicious code will then run as a part of the original program, giving the attacker administrator privileges on the system.

    youdao

  • 能够所有可能攻击继续工作的系统存在的,但是系统可以抵御许多攻击攻击迅速恢复可用状态。

    No system can keep up under all possible attacks, but systems can resist many attacks or rapidly return to usefulness after an attack.

    youdao

  • 网络预警技术预知主体受攻击可能性具体指证将要发生的行为和产生的后果,而到网络安全业界的重视

    The early warning technology attaches great importance in the network security field because it can foresee the possibility of the attacks and the following behavior and consequences.

    youdao

  • 网络预警技术预知主体受攻击可能性具体指证将要发生的行为和产生的后果,而到网络安全业界的重视

    The early warning technology attaches great importance in the network security field because it can foresee the possibility of the attacks and the following behavior and consequences.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定