拘捕增加了对报复性攻击的恐惧。
两周前的一份周日报纸上刊登了一篇对他进行尖酸刻薄攻击的文章。
There was a vicious and vitriolic attack on him in one of the Sunday newspapers two weeks ago.
无线安全供应商通常会采取措施来减轻干扰攻击的威胁。
Wireless security providers will often take steps to help combat the threat of jamming attacks.
受到持枪抢劫匪帮猛烈攻击的那些卡车试图开到美军基地。
The trucks tried to drive to the American base, running the gauntlet of marauding bands of gunmen.
一些研究表明,宣泄情绪可以减少紧张情绪,降低未来发生攻击的可能性。
Some studies suggest that catharsis leads to reductions in tension and a lowered likelihood of future aggression.
除非这些系统有足够的安全保护,否则物联网很容易成为黑客攻击的新目标。
Unless these systems have adequate security protection, the internet of things could easily become the internet of new things to be hacked.
在遭受攻击的情况下,军事顾问说明了能从另一个终端操控一台计算机的优势。
In the case of an attack, military advisers suggested the advantage of being able to operate one computer from another terminal.
根据心理动力学理论,预防有害攻击的最好方法可能是鼓励危害较小的攻击行为。
According to psychodynamic theory, the best ways to prevent harmful aggression may be to encourage less harmful aggression.
人们发现,录音机在播放树上筑巢的鸣禽的乞食叫声时,比起在播放地面筑巢的鸣禽的乞食叫声时,鸟蛋被攻击的几率明显增大。
The eggs "advertised" by the tree-nesters' begging calls were found bitten significantly more often than the eggs associated with the ground-nesters' calls.
加强监测和防御网络攻击的能力。
中国也是黑客攻击的受害者。
最棘手的问题是找到这些攻击的来源。
The hardest problem in finding the source of these attacks is attribution.
在线游戏是网络攻击的主要目标之一。
攻击栏包含了这个事件谁被攻击的信息。
AttackOn contains the information who was attacked during an event.
这种方法消除了SQL注入攻击的可能性。
This method removes the potential for an SQL injection attack.
关注有关所使用资源被攻击的新闻。
Keep an eye on the news about exploits with resources that you use.
在房子中,易受攻击的点是门和窗户。
In a house, the vulnerable points are the doors and Windows.
阻止攻击的效率是这部分评估的目标。
The effectiveness of blocking attacks was the goal of this component of the review.
公共攻击的动机是,攻击者想要出名。
The motivation for publicity attacks is that the attackers want to make a name for themselves.
临时停火协议不能防止以后发生报复性攻击的可能性。
The temporary cease-fire agreement does not preclude possible retaliatory attacks later.
比方说缺少授权检查就是URL猜测攻击的根源。
Missing authorization checks, for example, are the root cause of URL-guessing attacks.
在本例中,sql语句是允许相同攻击的动态语句。
In this example, the SQL statement is a dynamic statement that would allow the same attack.
清单10演示了允许XSS攻击的表单如何输出结果。
Listing 10 demonstrates how the form could print the results, allowing an XSS attack.
他暗示这次攻击的动机可能仅仅是出于报复。
He suggested that the motivation behind the strikes could be as basic as revenge.
他指出近期已经有一些服务器被攻击的例子。
He points out that there have been recent examples of servers being hacked.
大多数使用者对于安全攻击的知识都很匮乏。
Most users' knowledge of security vulnerabilities of their systems is vague at best.
健身课上充斥着诸如“伪娘”以及其他口头攻击的调侃。
Gym class would be full of taunts like "girly-man" and other verbal attacks.
在遭受攻击的各国家首都,起初的欢乐早就被绝望取代。
Initial hilarity in the capitals of the countries so attacked has long given way to despair.
下面的例子可以帮助您识别易受XSS攻击的领域。
The following examples are intended to help you recognize the areas that are vulnerable to XSS attack.
多云的天气可能也减缓了对地面目标攻击的速度。
Cloudy weather may also have cut the tempo of attacks on ground targets.
应用推荐