• The attacker knocked on their door and made a lunge for Wendy when she answered.

    袭击者他们温迪开门,向猛冲过去。

    《柯林斯英汉双解大词典》

  • The attacker threatened them with a gun.

    袭击者威胁他们

    《牛津词典》

  • If your program is a viewer or editor of datasuch as a word processor or an image displayer—that data might be from an attacker, so it's an untrusted input.

    如果程序数据浏览器或者编辑器——比如文字处理器或者图像显示器——那么那些数据有可能来自攻击者,所以可信的输入。

    youdao

  • Luckily, Zhang had just learned how to escape from an attacker, a person who plans to hurt someone.

    运的是,张刚学会了如何从计划伤害他人的袭击者手中逃脱。

    youdao

  • After you get all the assets for assessment identified, the next step is to identify and assess the vulnerabilities of each asset that a hacker or attacker could maliciously exploit.

    识别所有评估资产之后一个步骤就是识别评估每种资产可能黑客攻击者利用的漏洞

    youdao

  • A creative attacker can take advantage of a buffer overflow vulnerability through stack-smashing and then run arbitrary code (anything at all).

    创造力的攻击者透过摧毁堆叠利用缓冲区溢位弱点然后执行任何程序码。

    youdao

  • The attacker then calls a customer service representative at the site, posing as the shopper and providing personal information.

    攻击者接下来网站调用客户服务作为购物者登录并且提供个人信息。

    youdao

  • The sophisticated attacker finds a weakness in a similar type of software, and tries to use that to exploit the system.

    富有经验的攻击者可以发现同类软件缺点并且尝试利用这些弱点进入系统

    youdao

  • A common scenario is that the attacker calls the shopper, pretending to be a representative from a site visited, and extracts information.

    一个常见场景攻击者打电话购物者假装购物者所访问站点代表并且提取信息。

    youdao

  • But missile attacks on ships are rare, so it is difficult to know just how safe a ship really is-especially if an attacker launches a dozen or so missiles at once.

    舰船受到导弹攻击的案例非常因此很难判断条战舰躲过导弹攻击的劫数多大,特别是在攻击者一次发射多枚导弹的情况下。

    youdao

  • Determining the identity of the attacker was a matter of narrowing down the line of potential suspects.

    确定攻击者身份需要逐渐缩小一连串嫌疑人的范围。

    youdao

  • Women were cooking dinner, men were praying and children were playing nearby when the attacker struck, a witness said.

    妇女烹饪晚餐男子祈祷孩子附近攻击者击中一位目击者说。

    youdao

  • For instance, pseudo-random Numbers are used for process IDs and packet IDs, which makes spoofing significantly more difficult for a would-be attacker.

    例如伪随机数可用于进程IDid,使得那些想要进行攻击的人很难进行欺骗

    youdao

  • An attacker who can convince a user to access a URL supplied by the attacker could cause script or HTML of the attacker's choice to be executed in the user's browser.

    攻击诱导用户访问攻击者提供URL,从而导致用户浏览器执行攻击者选择脚本HTML

    youdao

  • A malicious attacker can still sniff the wire (note that password digest is not encrypted by default) and replay the entire UsernameToken, so nonce and timestamp checking are imperative.

    恶意攻击者可以探查连接(请注意缺省情况下密码摘要没有被加密)回复整个UsernameToken因此nonce时间戳检查缺一不可的。

    youdao

  • Therefore, as a hack, an attacker might authenticate as a valid user, but then provide an HTTP header (perhaps the iv-cred) that implies more permissions than he actually has.

    因此攻击者可能作为有效用户通过认证然后提供一个HTTP 消息(可能为 iv-cred ),这个消息头表明实际上更多权限

    youdao

  • A malicious attacker can make use of this behavior and launch a remote denial-of-service attack against a vulnerable network service over the Internet.

    恶意攻击可以利用一点,通过Internet网络服务发动远程拒绝服务攻击

    youdao

  • Essentially, if you allow an attacker to run code on such a machine through any means, the attacker can completely take over the machine.

    从本质上说如果允许攻击这样机器任何方式运行代码,则攻击者完全可以接管机器。

    youdao

  • But once an attacker can run code on such a machine, the attacker instantly attains complete control.

    但是一旦攻击可以这样机器上运行代码,就可以立即获取完全控制

    youdao

  • Even if an attacker broke into a game program, all he could do would be to change the score files.

    即使攻击者攻击并进入一个游戏程序所有的事情修改分数文件。

    youdao

  • If this occurred, the sequence Numbers would definitely be different than what we expected. This also protects us from an attacker dropping a message.

    如果这么干,序列号一定我们所期待的不一样保护了我们不受攻击者们扔消息的攻击。

    youdao

  • Although URIs provide a lot of flexibility, if you're accepting a URI from a potential attacker, you need to check it before passing it on to anyone else.

    尽管uri提供很大灵活性,可是如果接收到了一个来自攻击者的URI,您需要转给任何其他人之前检查它。

    youdao

  • If an attacker can cause a buffer to overflow, then the attacker can control other values in the program.

    如果攻击能够导致缓冲区溢出那么它就控制程序中的其他

    youdao

  • Your application might need a few more, but limit them -- don't accept data from a potential attacker unless it's critically needed.

    应用程序可能还需要更多但是要限制它们 ——除非是特别需要,否则不要接受潜在攻击者数据

    youdao

  • The problem is that if an attacker can control the underlying libraries used by a program, the attacker can completely control the program.

    问题如果攻击可以控制程序用到底层,那么攻击者就可以控制整个程序。

    youdao

  • Even if monitored, a casual attacker will be stymied by the presence of backspace and other characters that apparently alter the presence or order of characters in the password string.

    即使受到监视,使用后退或者其他明显破坏密码字符串显示顺序字符,都可以使偶然攻击无所适从

    youdao

  • The attacker, a veteran systems administrator, has a problem with her job and takes it out on the systems she is trusted to administer, manage, and protect.

    攻击者名经验丰富系统管理员工作中遇到问题自己管理、保护系统发泄

    youdao

  • In most cases, if you create a list of "illegal" characters, an attacker will find a way to exploit your program.

    绝大多数情况下如果创建了一个非法字符列表攻击者还是可以找到利用的程序的方法

    youdao

  • If a system authenticates based solely on fingerprints, an attacker could reasonably construct a fake hand after carefully gathering fingerprints of an authorized user of the system.

    如果系统认证基于指纹,则攻击可以仔细搜集系统已认证用户指纹后适当地构造只假手

    youdao

  • If a system authenticates based solely on fingerprints, an attacker could reasonably construct a fake hand after carefully gathering fingerprints of an authorized user of the system.

    如果系统认证基于指纹,则攻击可以仔细搜集系统已认证用户指纹后适当地构造只假手

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定