What is a brute-force algorithm?
什么是蛮力算法?
Automated tests, on the other hand, take a brute-force approach.
另一方面,自动化测试采取一种蛮力的方法。
To an extent, debugging through deduction is a brute-force approach.
在某种程度上,通过推论进行调试是一种蛮干的做法。
They used brute-force computation and heuristics for their solutions.
他们用蛮力测试计算和启发法寻找解决方案。
Select the characters to use in brute-force cracking. Must be one of.
选择字符使用蛮力破解。
As a bonus, the application shuts down more gracefully than it does with the CTRL+C brute-force method.
其中一个优点是,与使用 CTRL+C强硬方法相比,应用程序关闭得更恰当。
Classic examples include graphics processing, brute-force searching, fractals, and particle simulations.
典型的例子包括图形处理、强力搜索、分形和粒子模拟。
"We've built systems to protect against these types of brute-force attacks," says Simon Axten, a spokesperson for Facebook.
Facebook的发言人SimonAxten说:“我们已经建立了针对这种类型强力攻击的保护系统。”
The longer it is, and the more exotic the characters (punctuation marks, say), the less likely a brute-force effort to crack it is to succeed.
密码越长,字母(比方说标点符号)越奇异,蛮干试图破解它的成功可能性就越小。
Set initial (starting) password for brute-force searching to string, or use the file with the name string to supply passwords for dictionary searching.
设置初始(启动)的强力搜索以字符串密码,或者使用与该文件名字符串供应字典搜索密码。
If time and money is no problem, they can use brute-force methods that simply try every combination of letters, Numbers and symbols until a match is found.
如果时间和金钱不成问题的话,他们可以使用蛮力手段即简单地偿试每一个字母数字和符号的组合直至对上找到。
It seems that every month, some hacker kid and his friends tie together 1,000 machines and crack the newest encryption method in a few days of raw, brute-force computational battering.
大概每隔一个月,一些黑客及其朋友就会集合1,000台计算机,在最初的几天里强力进行计算破坏,从而使最新的加密方法崩溃。
"The evidence for using kites to move large stones is no better or worse than the evidence for the brute force method," Gharib says.
“使用风筝来移动大石头的证据和使用蛮力方式的证据差不多。”Gharib说。
As economies become richer, they can rely less and less on the brute force of capital spending, coupled with a steady flow of cheap rural migrants, to fuel their expansion.
随着新兴经济体越来越富,他们会越来越少地依赖资本支出的强势支撑,再加上廉价农村劳动力源源不断的输入,又刺激了他们的扩张。
A computer can win through brute force by taking opening moves that lead to a game it has already played out and won.
计算机可以通过蛮力取胜,采用开局着法,而导致它赢得了此场比赛。
The larger the key, the greater the possible number of values and the harder it is to crack using brute force techniques.
密钥越大,可能值的数量就越大,使用蛮力技术破解它就越难。
Dictionary attack — Guessing the password of a valid user using a brute force search through dictionary words.
字典攻击——根据字典词汇,使用蛮力搜索的方式推测一个有效用户的密码。
We can simplify the solution by taking a brute force approach, that is, doing it in two steps.
通过采用“蛮力”方法,我们可以简化这个解决方案,即,采用两个步骤就可以完成。
If that doesn't work, you can always try the sheer brute force method: specify the necessary compiler flags as part of your CC environment variable, or as part of the CFLAGS environment variable.
如果这样仍不行,您还可以尝试使用完全强制的方法:指定需要的编译器标记为您的CC环境变量或者是CFLAGS 环境变量的一部分。
The first is the brute force method, which is to look at all of the requests and then filter based on different criteria.
第一个是强力的方法,就是查看所有的请求,然后根据不同的标准进行过滤。
A brute force attack is the most comprehensive form of attack, though it may often take a long time to work depending on the complexity of the password.
蛮力攻击是最全面的攻击形式,虽然它通常需要很长的时间工作,这取决于密码的复杂程度。
These maybe totally innocent attempts at connecting from a local machine within your network or a brute force attempt from an unknown host.
这些可能是来自您的网络中本地机器的完全无恶意的连接尝试,也可能是来自未知主机的强力连接尝试。
More than the brute force to implement compliance initiatives, the tools themselves should be providing intelligence regarding how best to comply with specific regulatory requirements.
除了强硬地实施遵从性计划之外,我们认为工具本身应该是智能的,以最好地遵守特定的法规需求。
Put another way, a 64-bit password would require 2 raised to the power of 64 attempts to crack it by brute force—in short, 18 billion billion attempts.
换句话说,一个64字节密码对那种使用蛮力破解密码的尝试从2升到了64,简言之,就是18万万亿次的尝试。
In fact, Monte Carlo techniques are much faster than brute force.
事实上,蒙特卡罗技术要比暴力破解技术快得多。
However looking at the total number of possible flights to ones that are viable and preferable should start to eliminate the need to apply Brute Force searching to every single query.
然而,看看可行的、首选的航班数量如此之多时,我们应该认识到不要再用穷举搜索法对每一次查询进行验证。
The first is the brute force method, which is to look at all the requests and filter based on different criteria.
第一种是强烈操作方法,它将查看所有的请求,以及基于不同标准的过滤。
The first is the brute force method, which is to look at all the requests and filter based on different criteria.
第一种是强烈操作方法,它将查看所有的请求,以及基于不同标准的过滤。
应用推荐