• The attacker threatened them with a gun.

    袭击者威胁他们

    《牛津词典》

  • They think the attacker was very tallso that lets you out.

    他们认为歹徒是个高个子这样就没你什么事儿了。

    《牛津词典》

  • The attacker enters the input in Listing 8.

    攻击者可以提供清单8所输入

    youdao

  • The attacker died, and the children survived.

    袭击者丧生孩子则活了下来

    youdao

  • Again, the attacker requires very few resources.

    同样攻击者只需要很少资源

    youdao

  • It allows the attacker to impersonate the victim.

    将允许黑客冒充受害者

    youdao

  • The attacker cracked the racks and stacked them on the track.

    攻击者搁板它们跑道上.

    youdao

  • The attacker was later subdued by the police, and no one died.

    这次攻击后来警察所制服,没有死亡。

    youdao

  • The attacker can automate to go against multiple sites at one time.

    攻击可以自动多个站点上进行测试。

    youdao

  • Think of the problem from two perspectives: the server, and the attacker.

    方面来考虑这个问题服务器攻击者

    youdao

  • As the name suggests, the attacker opens the connection only halfway.

    顾名思义攻击者只是部分地打开连接

    youdao

  • Reports said the attacker, a local caretaker and receptionist, was not armed.

    报道袭击者当地名管理员接待员没有携带武器

    youdao

  • This will always result in a match so that the attacker gains entry to the system.

    这个条件一直匹配因此攻击者可以进入系统。

    youdao

  • The attacker analyzes the site to find what types of software are used on the site.

    攻击分析站点查找站点使用软件

    youdao

  • But that attack was rare in another way: It was easy enough to identify the attacker.

    但是这次袭击一方面来看却是极为少见的:袭击者轻易地就被发现。

    youdao

  • This attack USES password cracking to penetrate the systems that the attacker wants to deface.

    攻击使用密码破解渗透攻击破坏系统

    youdao

  • The attacker injects his malicious inputs to the SQL statement to change the query's logic.

    攻击者将其恶意输入注入sql语句中,修改查询语句逻辑。

    youdao

  • XHR: Browser cross-domain rules prevent the attacker from making the request in the first place.

    XHR浏览器跨域规则开始就阻止攻击者发出请求

    youdao

  • A vulnerability is a weakness in the system, but it is not necessarily known by the attacker.

    弱点系统缺点但是攻击者可能知道

    youdao

  • The attacker cannot access all the packets of a request and cannot decipher what message was sent.

    攻击者不能访问一个请求所有,也就不能破译发送消息

    youdao

  • First, the attacker needs to make sure that the fake packets will actually be routed to the target.

    首先攻击者需要确保信息包确实路由到目标机器。

    youdao

  • In this case, nothing terrible happens, and the attacker simply sees an error message in the client.

    这个示例中没有发生什么可怕的事情攻击者只是客户机上看到了一条错误消息

    youdao

  • Determining the identity of the attacker was a matter of narrowing down the line of potential suspects.

    确定攻击者身份需要逐渐缩小一连串嫌疑人的范围。

    youdao

  • In another type of attack, the attacker might modify the stylesheet to hide information from users.

    另一种攻击类型中,攻击可能会修改样式表信息隐藏起来不让用户发现。

    youdao

  • Manual attacks are laborious, and only successful if the attacker knows something about the shopper.

    手动攻击非常艰苦的,并且只有攻击知道关于购物者某些信息的时候才能成功

    youdao

  • If an attacker can cause a buffer to overflow, then the attacker can control other values in the program.

    如果攻击能够导致缓冲区溢出那么它就控制程序中的其他

    youdao

  • But once an attacker can run code on such a machine, the attacker instantly attains complete control.

    但是一旦攻击可以这样机器上运行代码,就可以立即获取完全控制

    youdao

  • The driver pulled over and passengers fled from the bus, bracing the door to keep the attacker inside.

    司机将车在一边,其余乘客逃离巴士将袭击者堵在车里。

    youdao

  • The attacker simply goes to a workstation and tries to attack the IIS server with an HTML editing tool.

    攻击只要工作站尝试使用HTML编辑工具攻击IIS服务器

    youdao

  • That's probably exactly how he wanted to be seen. Do your headlines, for instance, glorify the attacker?

    可能正是希望人们看到的,比如,那些新闻提要是否让袭击者显得荣耀呢?

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定