他用膝盖猛撞攻击者的下身。
所有的攻击者都是男性,年龄在25到30岁之间。
攻击者被称是在报复一名14岁男孩,称他是学校一霸。
The attackers were said to be taking revenge on the 14-year-old, claiming he was a school bully.
海龟颈部和四肢的肌肉及骨骼的特殊设计使它能把暴露在外的部分缩回去,这样攻击者只能去咬坚硬的外壳。
The particular design of muscles and bones in the neck and limbs of the turtle allow that it can draw in its exposed parts such that an attacker can find nothing but hard shell to bite.
出于爱和尊重,他实际上想要接受打击。他应该走到里面去,因为现在攻击者都躲在里面。
Out of love and respect, he actually wants to take the blows. He should walk on the inside—because that's where attackers are all hiding these days.
有80名攻击者的一个小队在黎明前发起了一次全面进攻。
A group of 80 attackers launched an all-out assault just before dawn.
其他参加聚会的人从攻击者手中救出了这名受伤的男子。
Other partygoers rescued the injured man from his assailant.
蚂蚁储存食物,击退攻击者,并使用化学信号联系彼此以防被攻击。
Ants store food, repel attackers and use chemical signals to contact one another in case of attack.
如果您的程序是数据的浏览器或者编辑器——比如文字处理器或者图像显示器——那么那些数据有可能来自攻击者,所以那是不可信的输入。
If your program is a viewer or editor of data—such as a word processor or an image displayer—that data might be from an attacker, so it's an untrusted input.
同样,并非所有黑客都是攻击者-许多黑客编写保护您的程序!
Also, not all hackers are attackers — many hackers write the programs that defend you!
请从两方面来考虑这个问题:服务器和攻击者。
Think of the problem from two perspectives: the server, and the attacker.
通常,一个攻击者或抢劫犯只是想要你的钱。
不要让攻击者控制任何临时文件。
这类攻击可以将有效域名指向攻击者地址。
Such an attack can point valid domain names at attacker addresses.
同样,攻击者只需要很少的资源。
攻击者可以提供清单8所示的输入。
攻击者盗取了所有10个指纹时会怎样呢?
您接受的字符越少,您给攻击者制造的难度就越大。
The fewer characters you accept, the more difficult you make it for an attacker.
顾名思义,攻击者只是部分地打开连接。
As the name suggests, the attacker opens the connection only halfway.
攻击者打裂搁板并把它们堆在跑道上.
The attacker cracked the racks and stacked them on the track.
这一设置确保攻击者不能修改JNDI命名空间。
This setting ensures that attackers cannot modify the JNDI namespace.
这个程序允许攻击者包括可以修改SQL命令意义的字符。
The program allows an attacker to include characters that change the meaning of that SQL command.
它指的是攻击者有办法构造包含错误数据的网络数据报。
It means that for attackers there exists a way of constructing network datagrams that contain wrong data.
其它攻击者是寻求报复公司的心怀不满的雇员。
Other attackers are disgruntled employees seeking revenge on a company.
攻击者可以操作文件、目录或其祖先目录吗?
Can an attacker manipulate the file, its directory, or any of its ancestor directories?
词汇攻击者可用来描述恶意黑客。
The term attacker can be used to describe a malicious hacker.
有时,攻击者不必盗取物理标记来复制它。
Sometimes an attacker doesn't need to steal the physical token in order to duplicate it.
他的所有这些风格特征都受到攻击者模仿嘲弄。
All these peculiarities of his style have been parodied by his assailants.
从本质上说,如果您允许攻击者在这样的机器上以任何方式运行代码,则攻击者完全可以接管该机器。
Essentially, if you allow an attacker to run code on such a machine through any means, the attacker can completely take over the machine.
这样可以防止攻击者从主页面中窃取信息。
This prevents attackers from stealing information from the main page.
应用推荐