Unknown attackers riddled two homes with gunfire.
不明来路的袭击者用枪把两座房屋打得千疮百孔。
All the attackers were male, aged between 25 and 30.
所有的攻击者都是男性,年龄在25到30岁之间。
The dead men could have been the victims of mistaken identity. Their attackers may have wrongly believed them to be soldiers.
这些死者可能是错认身份的受害者,袭击者可能误以为他们是当兵的。
Out of love and respect, he actually wants to take the blows. He should walk on the inside—because that's where attackers are all hiding these days.
出于爱和尊重,他实际上想要接受打击。他应该走到里面去,因为现在攻击者都躲在里面。
Ants store food, repel attackers and use chemical signals to contact one another in case of attack.
蚂蚁储存食物,击退攻击者,并使用化学信号联系彼此以防被攻击。
Attackers fired machine guns at the convoy.
袭击者们向护运车队开机枪。
The Tunisian military has sent reinforcements and helicopters to the area, and authorities have been hunting several attackers who were still at large.
突尼斯军方已经派出增援部队及直升机到该区域,官方也正在追捕几名在逃人员。
Also, not all hackers are attackers — many hackers write the programs that defend you!
同样,并非所有黑客都是攻击者-许多黑客编写保护您的程序!
This suggests the attackers may not have been Iraqi.
这表明,袭击者可能不是伊拉克人。
Don't let attackers control any temporary files.
不要让攻击者控制任何临时文件。
External attackers are those who must traverse your "defense in depth" to try and break into your systems.
外部攻击者是那些必须透过您的“深度防御”试图闯入您系统的人。
This prevents attackers from stealing information from the main page.
这样可以防止攻击者从主页面中窃取信息。
Internal attackers are the most common sources of cracking attacks because attackers have direct access to an organization's systems.
内部攻击者是解密攻击最常见的来源,因为攻击者具有对组织系统的直接访问权。
Not all attackers are hackers — some attackers don't know anything about computers.
并非所有攻击者都是黑客-有些攻击者根本不了解计算机。
This setting ensures that attackers cannot modify the JNDI namespace.
这一设置确保攻击者不能修改JNDI命名空间。
Next, take a look at some of the tools attackers use to break into a system.
接下来,研究一下攻击者用来闯入系统的一些工具。
Officials said two attackers were killed and one captured.
官方称两个袭击者被杀害,一个被捕。
Each level tries to thwart different types of attacks and also provides more barriers to attackers.
每个级别防范不同的攻击类型,并提供对攻击者更有效的屏障。
Unfortunately, passing data from attackers to libraries that interpret that data is common.
不幸的是,将数据从攻击者传递到对数据进行解释的库是非常常见的。
Other attackers are disgruntled employees seeking revenge on a company.
其它攻击者是寻求报复公司的心怀不满的雇员。
Every rocket lobbed into a building means less time firing at your attackers.
每对着建筑每发一枚火箭,都意味着你攻击敌人的时间相对就会减少。
It argued that the report did not detail specific flaws that attackers could exploit.
它辩解说报告没有可资攻击者利用的缺陷细节。
He said that wounded had been killed by attackers and ambulances had been burned.
他说,受伤的人被攻击者杀害了,救护车被烧毁。
Software is the same: complex code creates more opportunities for hackers and attackers.
软件也是一样的道理:复杂的代码会给黑客或攻击者创造更多的机会。
But with denial of service attacks, attackers don't need to gain access to a system.
但进行拒绝服务攻击时,攻击者不必获得对系统的控制权。
Are there any particular kinds of attacks you're worried about, such as attackers impersonating legitimate users?
您是否担心会有特殊类型的攻击,如攻击者假扮合法用户?
Environment variables can be completely controlled by locally running attackers, and attackers can exploit this in surprising ways.
环境变量可以被本地运行的攻击者完全控制,而且攻击者可以用不同寻常的方式来利用这一点。
Israeli soldiers kill two attackers.
以色列士兵击毙了两个袭击者。
The attackers targeted the symbols of modern India.
袭击者把现代印度的那些象征作为袭击目标。
The attackers targeted the symbols of modern India.
袭击者把现代印度的那些象征作为袭击目标。
应用推荐