• Protection activities venues of public facilities, not malicious smear zoned, damage.

    保护活动场地公共设施不得恶意损坏

    youdao

  • The secret of happiness is: let the interest expansion, as much as possible to people react to things as much as possible from the goodwill, not malicious.

    快乐秘诀兴趣尽可能扩张,对反应尽可能出自善意而不是恶意的兴趣。

    youdao

  • In German civil law which obeys the theory of juristic act of real right, the third party's acknowledgement of the former contract's defect is not malicious.

    遵从物权行为理论德国民法中,第三手交易合同瑕疵的知情为恶意,第三出让人无处分权知情才构成恶意。

    youdao

  • The untrusted data is referred to as tainted data, while the code ensuring that the data is not malicious is called a sanitizer, and is often said to clean the taint.

    这个非信任数据看作是污染的数据,这个代码确保这个数据是非恶意称作杀毒功能,通常也称作杀毒污染的东西。

    youdao

  • She found that these patients did not get upset with people who had malicious intentions that didn't go as planned.

    发现这些病人对于那些恶毒动机但没实施成功的案例并没有感到不安。

    youdao

  • Because the digital signature scheme guarantees nothing about who is the intended recipient of the signed message, nobody can determine whether the malicious party's claim is true or not.

    由于数字签名方案无法保证签名消息目标接收,那么也就没有人确定恶意声明的真实性。

    youdao

  • Because a signature alone does not guarantee that the sender is who they say they are, the message transmission is vulnerable to techniques such as replay attacks by some malicious third party.

    因为仅仅数字签名无法保证发送方就是他们自己声称消息传输容易遭受恶意第三诸如再现攻击等技术的袭击。

    youdao

  • The modification of actual malicious code to bypass antivirus has not pleased many security-software vendors.

    修改真实恶意代码绕开防病毒软件没能让很多安全厂商高兴

    youdao

  • Because the digital signature scheme guarantees nothing about how many times the message was signed and sent by the sender, nobody can determine whether the malicious recipient's claim is true or not.

    由于数字签名方案无法保证消息发送签名发送次数,那么也就没有确定恶意接收方声明真实性

    youdao

  • Therefore, it seems that using SOAP-DSIG and SSL simultaneously is sufficient for non-repudiation, so I will now present two attacks by malicious recipients (not by third parties).

    所以看起来同时使用SOAP - DSIGSSL对于实现不可抵赖性来说已经足够了,那么现在提供两个来自恶意接收方(而非第三方)的攻击

    youdao

  • Malicious talk that undermines someone's reputation or unfairly criticizes someone's work when they're not around.

    背后诋毁别人声誉对别人工作做出公正批评

    youdao

  • Dick White disliked Rees intensely, AND thought he was making malicious accusations in order to court attention, if not publicity.

    迪克·怀特很不喜欢里斯认为如果不是为了大出风头,也是为了博得青睐才进行恶意指控的。

    youdao

  • Whether the link is initiated through your Gmail account or not, the malicious site can access your internal credentials.

    不管链接是否通过Gmail账户点开,该恶意网站都会得到内部资料

    youdao

  • The reality is that many closed-source vendors are not particularly evil or malicious, are not concealing rootkits, and are just trying to make a living in a way that they know how to make work.

    事实很多闭源供应商并不那么地邪恶恶毒,也并不故意要隐藏rootkit他们只不过试图借助自己的所谋生而已。

    youdao

  • While this particular example might not be considered severe, other more malicious code could be added, especially DELETE or UPDATE statements that modify tables.

    虽然这个特例的后果可能并不严重但完全可能添加恶意代码尤其是修改表的DELETEupdate语句

    youdao

  • Sadly, even when we are sure that the software was not created with malicious intent, we are susceptible to trust problems.

    可悲的是,即使我们确信不是一个含有恶意目的软件我们信任问题产生怀疑。

    youdao

  • A malicious proxy can make it appear that the connection is tunneled when it actually is not.

    恶意代理可以并不存在隧道伪装成仿佛隧道真正存在一样。

    youdao

  • In network environments where there may be unreliable or malicious computers, the creator of a message is not always the same as the sender of the message.

    可能存在不可靠恶意计算机网络环境中,消息创建者和消息发送方总是相同的。

    youdao

  • If any match, the request is rejected, and the malicious input does not arrive at the server.

    如果匹配成功,拒绝请求恶意输入不会到达服务器

    youdao

  • For example, a hacker can enter in the guise of a privileged user with administrative access controls and perform malicious activities that a legitimate system administrator did not initially notice.

    例如黑客可以伪装成具有管理访问特权用户进入系统执行恶意操作,真正的系统管理员不会马上注意到。

    youdao

  • By the time Pecora was finished, the public saw Wall Street's finest not as bystanders but as malicious purveyors of the misfortune that had affected millions.

    科拉成功地使公众不再华尔街监管者旁观者认为他们在一场殃及数百万人灾难中充当了恶毒的帮凶。

    youdao

  • Typical functional testing approaches are, after all, designed to verify expected behavior in software, not to find or experiment with unexpected reactions to malicious activities.

    毕竟典型测试方法基于验证软件是否按照预期运行的思路设计的,而不是根据发现或者试验预期之外的反应而设计的。

    youdao

  • Usually, these files look legit when opened so it is quite easy to fall prey and not even notice that something malicious ran in the background.

    通常这些文件看起来没有什么问题,打开之后会毫无通知的情况在后台运行恶意软件

    youdao

  • Automatic logoff is protection of dormant sessions to a given system (generally remote, but not necessarily) from malevolent usage to help mitigate the risk of malicious attack.

    自动下线保护给定系统(通常并不必须是远程)休眠会话不被恶意利用帮助降低受到恶意攻击的风险

    youdao

  • Not only does it protect you from malicious surprises, it helps make sure that you start with a clean SLATE so that your new data isn't blended with a previous user's data.

    不仅使避免遭受恶意攻击,有助于确保一个干净的状态开始,避免数据此前的用户数据混合

    youdao

  • If they do not, these celebrities might actually trigger malicious envy and the sales of products from a competitor could even go up.

    如果不是这样名人可能会诱发恶性嫉妒竞争对手销量上升了。

    youdao

  • If they do not, these celebrities might actually trigger malicious envy and the sales of products from a competitor could even go up.

    如果不是这样名人可能会诱发恶性嫉妒竞争对手销量上升了。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定