而且甲虫只攻击成熟的树木,昆虫学家杰西洛根指出年轻的树的作用根本不及成熟的树。
And while the beetles only attack mature trees, entomologist Jesse Logan argues that young trees can't do what the mature trees do.
为防止此类攻击,基于md5哈希的根证书和签名者证书不应受信任。
To guard against such an attack, root and signer certificates based on the MD5 hash should not be trusted.
疫霉菌攻击树木的根,更在连年干旱的情况下切断了它们供水。
The fungus attacks the roots of the trees, choking off a water supply that has been made scarce by successive years of drought.
MySQL的默认安装,特别是根密码空缺和缓冲区溢出的潜在漏洞,使得这个数据库服务器成为容易攻击的目标。
The default installation of MySQL, particularly the empty root password and the potential vulnerability to buffer overflow, makes the database server an easy target for attacks.
但是,哈希姆就在这里受到四个男人的攻击,他被切掉一根手指,而且遭到毒打。
But it was where Hashim was set on by four men, had a finger cut off and was badly beaten.
最后一行不允许任何人作为根用户登录,这会让黑客攻击更困难。
Finally, the last line doesn't allow anybody to log in as root, making life a bit more difficult for hackers.
纳瓦内被绑在树上,而女友克里曼斯被多次攻击,数根手指被割破见骨。
Mr Iovane was shackled to a tree while Miss Clemens was repeatedly attacked and had her fingers sliced open.
另外,刺鳐的尾部还有一根锋利有毒的尾刺,可以用来恫吓潜在的威胁者,其致命一击的能力甚至让人类也感到胆寒,不过这种攻击案例极为罕见,它们的性格相当温顺,只有在被挑衅时才会进行反击。
The barb can deliver a lethal blow even to humans, but incidents are extremely rare. Stingrays are fairly docile and typically strike only when provoked.
遇上大规模地面战,巨大的冈根护罩发射器会生成一个庞大的能量防护伞,用来抵御激光束和各种高动能武器的攻击。
In large-scale combat, giant Gungan shield generators can create an immense umbrella of protective shield energy that can stop laser bolts and physical objects with great kinetic energy.
我需要设计一个应用程序,以保护数据库中的一些数据库免受根攻击。
I need to design an application that protects some data in a database against root attack.
和文崔斯一起,德奇释放一种可怕的化学武器攻击冈根人的殖民地——卫星奥马·德恩。
Alongside Ventress, Durge unleashed a horrible chemical weapon attack on the Gungan colony moon of Ohma-D 'un.
在捕食和附加食物交互作用条件下,测定根田鼠种群攻击水平与种群参数之间的关系,应用对策论分析攻击行为的模式。
The demographic implications and strategy of aggressive behavior of root voles under different food, predation treatments were analyzed by using statistical methods and game theory models.
用四根柔韧的金属腿来发动攻击。
你有可能被破解攻击者通过某种手段和持续访问您的系统,或者种植一些恶意软件(可能是一个根工具包),骚扰你的服务器。
You have likely been compromised through some means and the attacker has persistent access to your system, or has planted some malware (possibly a root-kit) that is molesting your server.
与根域名服务器等顶级域相比,本地的权威名字服务器更易于发生设备故障和遭受恶意攻击。
Comparing with the top-level domains (TLD) such as the root servers, the local authoritative servers were more vulnerable to device failures and malicious attacks.
非攻击型物品,2分钟:包括治疗石、龙之息、根块茎和假人等等。
Non-Aggresive2 minutes: This includes items such as Healthstone, Night Dragon's Breath, Whipper Root Tuber and Target Dummy.
非攻击型物品,2分钟:包括治疗石、龙之息、根块茎和假人等等。
Non-Aggresive2 minutes: This includes items such as Healthstone, Night Dragon's Breath, Whipper Root Tuber and Target Dummy.
应用推荐