Breaking up a fight will cause one side to win (chosen at random) and then attack you.
如果玩家中断他们的打斗,打斗的一方就会获胜(随机选择)后攻击玩家。
Fluoride ions can then attack underlying tissues and can be absorbed into the blood stream.
接着氟化物离子会侵袭皮下组织,并且会被吸收进血流。
Xu Sheng said, “Set up scaling ladders and towers so that we can see inside and then attack.”
徐盛曰:"可竖云梯,造虹桥,下观城中而攻之。"
These T-cells, once activated by cow-milk, then attack the beta cells of the pancreas and destroy them.
这些T细胞一旦被牛奶激活,就会攻击胰腺中的β细胞并将其摧毁。
Microsoft has warned that the leaked software may get infected with malicious codes which could then attack computers.
微软警告公众,泄露版本可能带有恶意代码,可攻击电脑。
Salt also changed the way nations fought. With preserved food on ships, nations could sail to distant lands... and then attack them.
盐还改变了国家征战的方式。船上有了腌制食品,各国就能航行到遥远的国度…然后攻击他们。
So I immediately type up the paragraph, see what it looks like on a clean sheet of paper, and then attack that sheet of paper with my pencil again.
所以我会立刻把写好的一段打印出来,看看它在一张干净的白纸上是什么样子,然后再用铅笔在纸上涂涂改改。
General Abbas said military jets first bombed militant positions in the early stages of the operation Tuesday and then attack helicopters killed more than 50 fighters.
阿巴斯少将说,军用喷气机星期二在这次行动的初期阶段首先轰炸了激进分子据点,然后攻击直升机打死了50多名武装分子。
That will change 7 in due course of time and we shall then attack the problems which are not related to health and to wages and plumbing and machinery in general.
到那时,我们会集中力量去对付那些与身体健康、工资收入、城市下水管道和机械制造无关的问题。
It strikes me as bad manners for a magazine to accept one of my advertisements and then attack it editorially - like inviting a man to dinner then spitting in his eye.
我觉得,在一本杂志上刊登了广告,却攻击它的内容,是不礼貌的,这正如邀请人共赴宴席,却朝他的脸上吐痰一样。
Then, attack one of these areas methodically, by reading books on that particular subject.
然后,通过阅读某特定主题的书籍,有条理地进攻这里面的某个领域。
Then Alexander turned to attack the rest of Persia.
然后,亚历山大开始攻击珀斯其余的部分。
Then they would identify a link common to many different paths and launch a ZMW attack to bring it down.
接着他们会为许多不同路径确认一个共同连接并发起ZMW攻击以使之瘫痪。
If the captain would not attack other ships and take booty, then he was removed as captain.
如果一个船长既不攻击其他的船只也不劫掠战利品的话,他将会被处死。
Why can't you put that in your paper, or if you want, just publish the paper, which is interesting and then have a postscript in which you attack the... Because that's obviously relevant.
你为什么不把它们写进你的论文里呢,或者如果你想的话,可以先发表这篇论文,这篇很有意思,之后可以有一个补充说明来抨击,因为这显然是相关的。
The strategy was two-fold. First, out-muscle United. Then, channel the attack through Peter Crouch, the tall target man.
战术就两点。第一,身体流生吃曼联。其次,进攻中以高中锋皮特·克劳奇为支撑点发动攻势。
If you provide encryption, then an attacker can generally still attack the technique by modifying your client.
如果您提供加密,则攻击者通常仍然可以通过修改您的客户机来攻击该技术。
So if you have a can of fizzy drink and sip it all day long, then the acid in your mouth will be under constant attack.
这样一来,如果你一整天都在小口啜饮一罐饮料,就等于那些酸性物质一直在攻击你的牙齿。
All pirates sailed with the understanding that if they didn't help attack ships and colonies, then they would receive no pay.
所有的海盗都明白,如果他们在攻击船只和殖民地时不出力的话,他们是无法获得报酬的。
When an attacker introduces a malicious script to a dynamic form submitted by the user, a cross-site scripting (XSS) attack then occurs.
当攻击者向用户提交的动态表单引入恶意脚本时,就会产生跨站点脚本(XSS)攻击。
The writer of the letter asked a civil question; attack cats, then, only if you can do so with good humor, good taste, and in such a way that your answer will be courteous as well as responsive.
致信者问得彬彬有礼而你想攻击猫的话也要富有幽默感,这样你的回复就能既客气又反映地得体。
In fuzz testing, you attack a program with random bad data (aka fuzz), then wait to see what breaks.
在模糊测试中,用随机坏数据(也称做fuzz)攻击一个程序,然后等着观察哪里遭到了破坏。
If the attacker sits in the middle of the network, then within the scope of the Internet, this attack becomes impractical.
如果攻击者在网络的中间,在Internet范围内,这种攻击是不可行的。
This is done by tricking a WPA to send out a large amount of data, and then mathematically cracking it without using a dictionary attack.
通过诱使一个WPA发送大量的数据,然后无需使用字典式攻击,而是使用数学方法就可以破解掉它。
If you assume your site will never come under attack, or face any problems of any sort, then when something eventually does go wrong, you will be in massive amounts of trouble.
最后,变得偏执一点吧。除非你认为你的站点永远不会受到攻击,否则就正视所有的问题,当问题真正发生的时候,你的情况会变得很糟。
But always remember that a hacker might compromise an application remotely (via the previous techniques), and then leverage internal attack methods to do even more harm.
但始终要记住,黑客可能远程危害一个应用程序(通过前面的技术),然后利用内部攻击方法来进行更多的危害。
But always remember that a hacker might compromise an application remotely (via the previous techniques), and then leverage internal attack methods to do even more harm.
但始终要记住,黑客可能远程危害一个应用程序(通过前面的技术),然后利用内部攻击方法来进行更多的危害。
应用推荐