Protection activities venues of public facilities, not malicious smear zoned, damage.
保护活动场地的公共设施,不得恶意涂划、损坏。
The secret of happiness is: let the interest expansion, as much as possible to people react to things as much as possible from the goodwill, not malicious.
快乐的秘诀是:让兴趣尽可能地扩张,对人对物的反应尽可能出自善意而不是恶意的兴趣。
In German civil law which obeys the theory of juristic act of real right, the third party's acknowledgement of the former contract's defect is not malicious.
在遵从物权行为理论的德国民法中,第三人对前手交易合同瑕疵的知情不为恶意,第三人对出让人无处分权的知情才构成恶意。
The untrusted data is referred to as tainted data, while the code ensuring that the data is not malicious is called a sanitizer, and is often said to clean the taint.
这个非信任数据被看作是污染的数据,当这个代码确保这个数据是非恶意就称作杀毒功能,通常也称作杀毒污染的东西。
She found that these patients did not get upset with people who had malicious intentions that didn't go as planned.
她发现这些病人对于那些有恶毒的动机但没实施成功的案例并没有感到不安。
Because the digital signature scheme guarantees nothing about who is the intended recipient of the signed message, nobody can determine whether the malicious party's claim is true or not.
由于数字签名方案无法保证谁是经签名的消息的目标接收方,那么也就没有人能确定恶意方声明的真实性。
Because a signature alone does not guarantee that the sender is who they say they are, the message transmission is vulnerable to techniques such as replay attacks by some malicious third party.
因为仅仅有数字签名并无法保证发送方就是他们自己所声称的人,消息的传输很容易遭受恶意第三方诸如再现攻击等技术的袭击。
The modification of actual malicious code to bypass antivirus has not pleased many security-software vendors.
修改真实的恶意代码来绕开防病毒软件没能让很多安全厂商高兴。
Because the digital signature scheme guarantees nothing about how many times the message was signed and sent by the sender, nobody can determine whether the malicious recipient's claim is true or not.
由于数字签名方案无法保证消息被发送方签名并发送的次数,那么也就没有人能确定恶意接收方声明的真实性。
Therefore, it seems that using SOAP-DSIG and SSL simultaneously is sufficient for non-repudiation, so I will now present two attacks by malicious recipients (not by third parties).
所以看起来同时使用SOAP - DSIG和SSL对于实现不可抵赖性来说已经足够了,那么我现在就提供两个来自恶意接收方(而非第三方)的攻击。
Malicious talk that undermines someone's reputation or unfairly criticizes someone's work when they're not around.
在背后诋毁别人声誉或对别人的工作做出不公正的批评。
Dick White disliked Rees intensely, AND thought he was making malicious accusations in order to court attention, if not publicity.
迪克·怀特很不喜欢里斯,认为他如果不是为了大出风头,也是为了博得青睐才进行恶意指控的。
Whether the link is initiated through your Gmail account or not, the malicious site can access your internal credentials.
不管该链接是否通过Gmail账户点开,该恶意网站都会得到你的内部资料。
The reality is that many closed-source vendors are not particularly evil or malicious, are not concealing rootkits, and are just trying to make a living in a way that they know how to make work.
事实是很多闭源供应商并不那么地邪恶或恶毒,也并不故意要隐藏rootkit,他们只不过是在试图借助自己的所知所能谋生而已。
While this particular example might not be considered severe, other more malicious code could be added, especially DELETE or UPDATE statements that modify tables.
虽然这个特例的后果可能并不太严重,但完全有可能添加更恶意的代码,尤其是会修改表的DELETE或update语句。
Sadly, even when we are sure that the software was not created with malicious intent, we are susceptible to trust problems.
可悲的是,即使我们确信这不是一个含有恶意目的的软件我们也会对信任问题产生怀疑。
A malicious proxy can make it appear that the connection is tunneled when it actually is not.
恶意的代理可以在并不存在隧道时却伪装成仿佛隧道真正存在一样。
In network environments where there may be unreliable or malicious computers, the creator of a message is not always the same as the sender of the message.
在可能存在不可靠或恶意的计算机的网络环境中,消息的创建者和消息的发送方不总是相同的。
If any match, the request is rejected, and the malicious input does not arrive at the server.
如果匹配成功,就拒绝该请求,恶意的输入不会到达服务器。
For example, a hacker can enter in the guise of a privileged user with administrative access controls and perform malicious activities that a legitimate system administrator did not initially notice.
例如,黑客可以伪装成具有管理访问权的特权用户进入系统并执行恶意操作,而真正的系统管理员不会马上注意到。
By the time Pecora was finished, the public saw Wall Street's finest not as bystanders but as malicious purveyors of the misfortune that had affected millions.
佩科拉成功地使公众不再视华尔街的监管者们为旁观者,而认为他们在一场殃及数百万人的灾难中充当了恶毒的帮凶。
Typical functional testing approaches are, after all, designed to verify expected behavior in software, not to find or experiment with unexpected reactions to malicious activities.
毕竟,典型的测试方法是基于验证软件是否按照预期运行的思路设计的,而不是根据发现或者试验预期之外的反应而设计的。
Usually, these files look legit when opened so it is quite easy to fall prey and not even notice that something malicious ran in the background.
通常这些文件看起来没有什么问题,当打开之后会在毫无通知的情况下在后台运行恶意软件。
Automatic logoff is protection of dormant sessions to a given system (generally remote, but not necessarily) from malevolent usage to help mitigate the risk of malicious attack.
自动下线是保护到给定系统(通常但并不必须是远程的)的休眠会话不被恶意利用,帮助降低受到恶意攻击的风险。
Not only does it protect you from malicious surprises, it helps make sure that you start with a clean SLATE so that your new data isn't blended with a previous user's data.
这不仅使您避免遭受恶意攻击,还有助于确保您从一个干净的状态开始,避免您的新数据与此前的用户数据混合。
If they do not, these celebrities might actually trigger malicious envy and the sales of products from a competitor could even go up.
如果不是,这样的名人可能会诱发恶性嫉妒,而竞争对手的销量就会上升了。
If they do not, these celebrities might actually trigger malicious envy and the sales of products from a competitor could even go up.
如果不是,这样的名人可能会诱发恶性嫉妒,而竞争对手的销量就会上升了。
应用推荐