• 而且甲虫攻击成熟树木昆虫学家杰西指出年轻的作用本不及成熟树。

    And while the beetles only attack mature trees, entomologist Jesse Logan argues that young trees can't do what the mature trees do.

    youdao

  • 防止此类攻击基于md5哈希证书签名者证书受信任

    To guard against such an attack, root and signer certificates based on the MD5 hash should not be trusted.

    youdao

  • 霉菌攻击树木,更连年干旱的情况下切断了它们供水

    The fungus attacks the roots of the trees, choking off a water supply that has been made scarce by successive years of drought.

    youdao

  • MySQL默认安装特别是密码空缺缓冲区溢出潜在漏洞使得这个数据库服务器成为容易攻击目标

    The default installation of MySQL, particularly the empty root password and the potential vulnerability to buffer overflow, makes the database server an easy target for attacks.

    youdao

  • 但是哈希姆这里受到四个男人攻击手指而且遭到毒打

    But it was where Hashim was set on by four men, had a finger cut off and was badly beaten.

    youdao

  • 最后允许任何人作为用户登录这会让黑客攻击困难

    Finally, the last line doesn't allow anybody to log in as root, making life a bit more difficult for hackers.

    youdao

  • 瓦内被树上女友克里曼斯多次攻击,数手指破见骨。

    Mr Iovane was shackled to a tree while Miss Clemens was repeatedly attacked and had her fingers sliced open.

    youdao

  • 另外,刺的尾部还有锋利有毒的尾刺,可以用来恫吓潜在的威胁者,其致命的能力甚至人类也感到胆寒,不过这种攻击案例极为罕见,它们的性格相当温顺,只有挑衅时才会进行反击。

    The barb can deliver a lethal blow even to humans, but incidents are extremely rare. Stingrays are fairly docile and typically strike only when provoked.

    youdao

  • 遇上大规模地面战巨大发射器生成一个庞大能量防护,用来抵御激光束各种高动能武器的攻击

    In large-scale combat, giant Gungan shield generators can create an immense umbrella of protective shield energy that can stop laser bolts and physical objects with great kinetic energy.

    youdao

  • 需要设计一个应用程序,以保护数据库中的一些数据库免受攻击

    I need to design an application that protects some data in a database against root attack.

    youdao

  • 和文崔斯一起,德释放一种可怕化学武器攻击殖民地——卫星奥马·德恩。

    Alongside Ventress, Durge unleashed a horrible chemical weapon attack on the Gungan colony moon of Ohma-D 'un.

    youdao

  • 捕食和附加食物交互作用条件,测定田鼠种群攻击水平种群参数之间关系,应用对策分析攻击行为模式

    The demographic implications and strategy of aggressive behavior of root voles under different food, predation treatments were analyzed by using statistical methods and game theory models.

    youdao

  • 柔韧金属发动攻击

    Attacks with its 4 pliable metallic legs.

    youdao

  • 可能破解攻击通过某种手段持续访问系统或者种植一些恶意软件(可能一个工具包),骚扰服务器

    You have likely been compromised through some means and the attacker has persistent access to your system, or has planted some malware (possibly a root-kit) that is molesting your server.

    youdao

  • 域名服务器顶级相比本地权威名字服务器更易于发生设备故障遭受恶意攻击

    Comparing with the top-level domains (TLD) such as the root servers, the local authoritative servers were more vulnerable to device failures and malicious attacks.

    youdao

  • 攻击物品,2分钟包括治疗之息、块茎假人等等。

    Non-Aggresive2 minutes: This includes items such as Healthstone, Night Dragon's Breath, Whipper Root Tuber and Target Dummy.

    youdao

  • 攻击物品,2分钟包括治疗之息、块茎假人等等。

    Non-Aggresive2 minutes: This includes items such as Healthstone, Night Dragon's Breath, Whipper Root Tuber and Target Dummy.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定