Unknown attackers riddled two homes with gunfire.
不明来路的袭击者用枪把两座房屋打得千疮百孔。
They issued an ultimatum to the police to rid the area of racist attackers, or they will take the law into their own hands.
他们向警方发出了最后通牒,要他们清除掉该地区的种族主义袭击者,否则他们就要自行采取行动。
All the attackers were male, aged between 25 and 30.
所有的攻击者都是男性,年龄在25到30岁之间。
She was punched and kicked by her attackers.
她遭到袭击者的拳打脚踢。
The dead men could have been the victims of mistaken identity. Their attackers may have wrongly believed them to be soldiers.
这些死者可能是错认身份的受害者,袭击者可能误以为他们是当兵的。
Out of love and respect, he actually wants to take the blows. He should walk on the inside—because that's where attackers are all hiding these days.
出于爱和尊重,他实际上想要接受打击。他应该走到里面去,因为现在攻击者都躲在里面。
Ants store food, repel attackers and use chemical signals to contact one another in case of attack.
蚂蚁储存食物,击退攻击者,并使用化学信号联系彼此以防被攻击。
A group of 80 attackers launched an all-out assault just before dawn.
有80名攻击者的一个小队在黎明前发起了一次全面进攻。
The attackers were said to be taking revenge on the 14-year-old, claiming he was a school bully.
攻击者被称是在报复一名14岁男孩,称他是学校一霸。
Attackers fired machine guns at the convoy.
袭击者们向护运车队开机枪。
The Tunisian military has sent reinforcements and helicopters to the area, and authorities have been hunting several attackers who were still at large.
突尼斯军方已经派出增援部队及直升机到该区域,官方也正在追捕几名在逃人员。
Also, not all hackers are attackers — many hackers write the programs that defend you!
同样,并非所有黑客都是攻击者-许多黑客编写保护您的程序!
This suggests the attackers may not have been Iraqi.
这表明,袭击者可能不是伊拉克人。
Don't let attackers control any temporary files.
不要让攻击者控制任何临时文件。
External attackers are those who must traverse your "defense in depth" to try and break into your systems.
外部攻击者是那些必须透过您的“深度防御”试图闯入您系统的人。
This prevents attackers from stealing information from the main page.
这样可以防止攻击者从主页面中窃取信息。
Internal attackers are the most common sources of cracking attacks because attackers have direct access to an organization's systems.
内部攻击者是解密攻击最常见的来源,因为攻击者具有对组织系统的直接访问权。
Not all attackers are hackers — some attackers don't know anything about computers.
并非所有攻击者都是黑客-有些攻击者根本不了解计算机。
This setting ensures that attackers cannot modify the JNDI namespace.
这一设置确保攻击者不能修改JNDI命名空间。
Next, take a look at some of the tools attackers use to break into a system.
接下来,研究一下攻击者用来闯入系统的一些工具。
Officials said two attackers were killed and one captured.
官方称两个袭击者被杀害,一个被捕。
Each level tries to thwart different types of attacks and also provides more barriers to attackers.
每个级别防范不同的攻击类型,并提供对攻击者更有效的屏障。
Unfortunately, passing data from attackers to libraries that interpret that data is common.
不幸的是,将数据从攻击者传递到对数据进行解释的库是非常常见的。
The attack software was highly customized, suggesting the attackers may have written the software, the person added.
这名人士说,攻击软件很有针对性,表明攻击者可能是自己编写了软件。
Other attackers are disgruntled employees seeking revenge on a company.
其它攻击者是寻求报复公司的心怀不满的雇员。
Every rocket lobbed into a building means less time firing at your attackers.
每对着建筑每发一枚火箭,都意味着你攻击敌人的时间相对就会减少。
It argued that the report did not detail specific flaws that attackers could exploit.
它辩解说报告没有可资攻击者利用的缺陷细节。
He said that wounded had been killed by attackers and ambulances had been burned.
他说,受伤的人被攻击者杀害了,救护车被烧毁。
Software is the same: complex code creates more opportunities for hackers and attackers.
软件也是一样的道理:复杂的代码会给黑客或攻击者创造更多的机会。
But with denial of service attacks, attackers don't need to gain access to a system.
但进行拒绝服务攻击时,攻击者不必获得对系统的控制权。
应用推荐