割裂的流血效果受攻击强度的加成。
The bleed effect of "Lacerate" now increases in potency with greater attack power.
网站受攻击或者当机时如何快速恢复?
How to recover the website rapidly when it is attacked or crash?
格丽卿转移了目标,他也不再受攻击了。
Gretchen had switched targets and he no longer was under attack.
排在塞拉利昂之后的是尼日尔,它的受攻击率为1/442。
After Sierra Leone, Niger fared well with one in every 442 surfers likely to be attacked while online.
国内服务器、网站安全威胁日益升级,受攻击次数连年跃升。
Domestic server, website security threats escalating, the number of attacks in recent years jumped.
尸体爆炸(第3层)现在造成暗影伤害,并且不再受攻击强度影响。
Corpse Explosion (Tier 3) now does shadow damage, and is no longer modified by attack power.
普通的混凝土可以用于一些区域,但它是受攻击支配由强的酸和碱。
Ordinary concrete can be used in some areas, but it is subject to attack by strong acids and alkalis .
可用性:系统将持续工作,即使在受攻击的时候也是如此(“工作的持续性”)。
Availability: the system will keep working even when being attacked (" works continuously ").
从计算机网络受攻击前后安全特性变化的角度,提出了网络熵的概念。
The paper put forward the concept of network entropy from the point of view of the security characteristic change of computer network after it was attacked.
赛珍珠在其1931年的小说《大地》中对农村家庭的描写,因其坦率而广受攻击。
Buck's account of a farming family in "The Good Earth" was widely attacked for its frankness when it came out in 1931.
如果系统或服务不可用,合法用户就无法使用受攻击系统上的网络服务(见图2)。
Once the system or service has been made unavailable, legitimate clients are blocked from using the network service hosted by the system under attack (See Figure 2).
该准则强调的是受攻击目标功能的损伤,而不是受攻击目标物理的杀伤。
The criterion is laid special stress on functional damage of the attacked targets, not the physical killing of the attacked targets.
分析了这些方案的共性及受攻击原理,最后给出了一个安全的群签名方案。
Then, commonness of these schemes is analysed, an improved coalition resistant group signature scheme is put forward.
这个方案针对网格水印的两个难点:网格的频率分解和受攻击网格的拓扑恢复。
The algorithm focuses on the two challenges of mesh watermarking, i. e. , frequency decomposition of meshes and topology reconstruction of attacked meshes.
莫斯科电视为撤军做了广泛的报导,一则苏联电视报导说车队曾受攻击,但是并未提供细节。
Moscow television carried extensive coverage of the pullout. A Soviet television correspondence said the convoy had come under fire but did not provide details.
尽管印度女性受攻击更加频繁,但一些外国游客也逐渐成为攻击对象,并引发了广泛的国际关注。
Several foreign tourists also have been targeted in attacks that often get international attention, although Indian women are assaulted far more frequently.
大脑和神经无可替代,但植物无法移动,也常受攻击,在部分被吃掉或毁坏后它们还得能活下去。
Brains and neurons are irreplaceable, but plants are immobile and often attacked, so they must be able to survive after part of them is eaten or destroyed.
我们的网站常受攻击,刚刚又再次出问题导致无法登陆,另外大会会务也很繁重,请为我们代祷。
Our website has been frequently attacked and it collapsed again yesterday . Also, there's still much to be done before the conference so please pray for us.
成功的攻击会允许攻击者在受攻击的应用程序上执行任意代码。同时,失败的攻击会导致拒绝服务。
Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks may cause denial-of-service conditions.
当你使用引导法术时,前两次受攻击都会减少你法术的持续时间25%,之后的攻击将不再会影响。
When channeling a spell: The first and second hit reduces current duration by 25% of total duration each. All hits after the second will have no effect.
外壳型和入侵型病毒通常攻击可执行文件,即带有或扩展名的文件。当然数据文件也有受攻击的危险。
Shell and intrusive viruses most commonly attack executable program flies-those with a. com or. exe extension, although data flies are also at some risk.
如果用户怀疑电脑受攻击了,Prevx建议下载一款其它的杀毒软件,并推荐使用一款非主流杀毒软件。
Prevx also suggests downloading another security product if you are suspicious, and recommends you use an alternative security product.
数百名警察决然地用警察棍向公园中的群众开始攻击,受攻击的群众则开始投掷石块、高声辱骂或干脆逃跑。
Hundreds of police waded into the crowd with nightsticks, as their targets threw rocks, shouted curses, or ran.
此外,和传统防弹衣相比,受攻击时它也较少变形,这样就可能避免因防弹衣向内变形而给人体造成严重伤害。
It also distorts less than conventional body armour when it is hit. That means it is less likely to cause serious injury by deflecting inward.
进行系统加固应该采取的首要步骤之一是降低其受攻击面:机器上运行的代码越多,代码被利用的机会更越大。
One of the first steps you should take when hardening a machine is to reduce its attack surface. The more code that's running on a machine, the greater the chance that the code will be exploitable.
如果受攻击的程序是由系统管理员启动的,那么恶意代码将作为原始程序的一部分进行执行,给黑客系统中的管理员特权。
If the attacked program was initiated by a system administrator, the malicious code will then run as a part of the original program, giving the attacker administrator privileges on the system.
能够在所有可能的攻击下继续工作的系统是不存在的,但是系统可以抵御许多攻击或在受攻击后迅速恢复至可用状态。
No system can keep up under all possible attacks, but systems can resist many attacks or rapidly return to usefulness after an attack.
网络预警技术因其可预知主体受攻击的可能性和具体的指证将要发生的行为和产生的后果,而受到网络安全业界的重视。
The early warning technology attaches great importance in the network security field because it can foresee the possibility of the attacks and the following behavior and consequences.
网络预警技术因其可预知主体受攻击的可能性和具体的指证将要发生的行为和产生的后果,而受到网络安全业界的重视。
The early warning technology attaches great importance in the network security field because it can foresee the possibility of the attacks and the following behavior and consequences.
应用推荐