• Some characteristics of attack techniques.

    攻击技术一些特点

    youdao

  • The attacker has wasted their time and, worse, revealed their attack techniques.

    攻击浪费了他们时间糟糕的是,揭示了他们的攻击技术。

    youdao

  • In this paper we take a closer look at botnets, common attack techniques, and the individuals involved.

    这里我们对僵尸网络,普遍攻击技术以及涉及到的个人一个更贴近观察

    youdao

  • Through technical statistics of all 4 matches at CBA2001 - 2002 season's finals, the defense and attack techniques and ability of Shanghai Team and PLA Team are comparatively studied.

    通过CBA2001-2002赛季总决赛上海·八一两全部4比赛技术统计,对双方的主要攻防技术能力进行对比分析。

    youdao

  • Though technical statistics of all 4 matches at CBA 2002 - 2003 season's finals, the defense and attack techniques and ability of PLA team and Hong Yuan team are comparatively studied.

    通过CBA 2002-2003赛季总决赛八一广东宏远两全部4场比赛技术统计,对双方的主要攻防技术能力进行了对比研究。

    youdao

  • But always remember that a hacker might compromise an application remotely (via the previous techniques), and then leverage internal attack methods to do even more harm.

    始终要记住黑客可能远程危害一个应用程序(通过前面技术),然后利用内部攻击方法进行更多危害

    youdao

  • Several different protection techniques help with multiple forms of attack, and sometimes a single attack can leverage multiple forms of intrusion to achieve the end goal.

    有几种不同保护技术可以防范多种形式攻击有时攻击可能利用多种入侵形式达到最终目标

    youdao

  • Several different techniques of protection help with multiple forms of attack, and sometimes a single attack may leverage multiple forms of intrusion to achieve the end goal.

    有几种不同保护技术可以防范多种形式攻击有时攻击可能利用多种入侵形式达到最终目标。

    youdao

  • They are both vulnerable to attack using the same techniques shown above with SQL injections; the data store just happens to be XML files instead of an actual database.

    容易使用上文SQL注入中所示相同技巧攻击之数据存储区刚好XML文件而不是实际数据库

    youdao

  • To help you tie these techniques back to the classes of attack just presented, for each technique we will include the following graphic.

    为了帮助这些技术刚才提到攻击类别联系起来,我们使用以下图形解释各种技术

    youdao

  • Unauthorized access using techniques such as dictionary attack and falsified message.

    非授权访问,实施攻击技术包括目录攻击伪造消息

    youdao

  • The recent spam attack on Craigslist triggered many reactions in the blogosphere seeking to analyze spammerstechniques and implications of the spam’s spread.

    不久前CraigslistSpam攻击引发了博客热烈反响,博客界开始分析牛皮癣们的技术寻找可行的治疗方案,思考牛皮癣的蔓延对架构的潜在影响

    youdao

  • Prime-boost techniques, which are also being developed to attack malaria, work mainly by stimulating another part of the immune system-one that kills infected body cells rather than "naked" pathogens.

    Prime - boost技术这种技术正在被用呢帮助人们摆脱疟疾,它工作原理主要通过刺激免疫系统组成部分之一T细胞,直接把感染了病毒人体细胞杀死不是去和那些“赤裸裸”的病原体搏斗。

    youdao

  • Experimental results indicate that these techniques are very effective in keeping resilience to cropping attack.

    实验结果表明,置乱技术抵抗剪切攻击方面非常有效的。

    youdao

  • This experimental result indicate that these techniques are very effective in keeping resilience to cropping attack.

    实验结果表明,置乱技术抵抗剪切攻击方面非常有效

    youdao

  • In the teaching practice, we found that the Get-free techniques to Hugging Waist from the Back and Pincer Attack at the Neck from the Back have obvious defects.

    教学实践过程中我们发现训练教程中由抱腰两种解脱技术存在着比较明显缺陷

    youdao

  • In this paper, attack detection technique, based on auditing information, of information resistance techniques is mainly presented.

    该文重点阐述了信息对抗技术基于审计信息攻击检测技术

    youdao

  • So it is very important and necessary to research the strategies of speculation, the techniques of attack and the possible attack to RMB fully and objectively.

    所以全面客观地研究对冲基金投机策略攻击手法以及人民币可能攻击显得非常重要必要

    youdao

  • But they are weak in active attack and defense ability, and backward in tactics, especially defense techniques and tactics.

    主动进攻防守能力弱,技、战术打法有待整和提高,特别是在防守方面较其它各队有明显差距。

    youdao

  • Cyber attack behavior analysis techniques can be roughly classified as network-oriented analysis and attacker-oriented analysis.

    现有攻击行为分析技术大致可以分为“面向网络”“面向攻击者”两类

    youdao

  • There are no silver bullets for APT and other advanced attack, but there are techniques your organization can take.

    虽然没有针对APT高级攻击的彻底解决办法,但是企业还是可以采用一些技术进行有效防护。

    youdao

  • Which of the following encryption techniques will BEST protect a wireless network from a man-in-the-middle attack?

    下面哪种加密技术可以最好保护无线网络遭受中间人攻击

    youdao

  • To combine in an organic way the performing technique of martial art competition with connotations of traditional martial culture as well as the techniques of attack and defense.

    武术竞赛表演技巧传统武术文化内涵攻防格斗技法有机结合起来。

    youdao

  • By the stats of Chinese excellent saber player Zhong man, in terms of goal average and using percentage of attack defense and anti, we compares his techniques with world other famous players.

    通过我国优秀男子佩剑运动员仲满比赛技术数据统计,、反等技术成功率使用率技术比例以及世界优秀运动员对比进行分析研究

    youdao

  • The attack was notable for its level of sophistication, using obfuscation techniques not typically seen in attacks on corporations, he said.

    这次袭击显着复杂程度一般使用公司攻击看到模糊手法说。

    youdao

  • Bear School Techniques Each piece of heavy armor increases your strong attack 5% and maximum health by 5%.

    学派技巧装备一件甲,生命增加5%,强击伤害增加5%。

    youdao

  • Cat School Techniques Each piece light armor increases critical hit damage by 25% and fast attack damage by 5%.

    学派技巧装备一件率增加25%,伤害增加5%。

    youdao

  • A variety of invasive techniques and exploit ideas and exchanges, so that you become a master script security attack and defense.

    各种入侵思路技术漏洞利用交流成为脚本安全攻防高手

    youdao

  • A variety of invasive techniques and exploit ideas and exchanges, so that you become a master script security attack and defense.

    各种入侵思路技术漏洞利用交流成为脚本安全攻防高手

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定