• In your case you will open other page and will let know to attacker the username.

    情况下打开其他页面知道攻击者用户名。

    youdao

  • He tried to use his own weight to push his attacker off but he was off balance.

    试图利用自己重量推开袭击者失去平衡

    《柯林斯英汉双解大词典》

  • It was inconceivable to me that Toby could have been my attacker.

    托比竟会是袭击的人,这来说简直是匪夷所思

    《柯林斯英汉双解大词典》

  • The particular design of muscles and bones in the neck and limbs of the turtle allow that it can draw in its exposed parts such that an attacker can find nothing but hard shell to bite.

    海龟颈部四肢肌肉骨骼特殊设计使暴露在外部分缩回去,这样攻击只能咬坚硬的外壳

    youdao

  • Luckily, Zhang had just learned how to escape from an attacker, a person who plans to hurt someone.

    运的是,张刚学会了如何从计划伤害他人的袭击者手中逃脱。

    youdao

  • If an attacker can cause a buffer to overflow, then the attacker can control other values in the program.

    如果攻击能够导致缓冲区溢出那么它就控制程序中的其他

    youdao

  • To accomplish this, the attacker sends a TCP packet with the SYN flag set to the target host, just like when opening a regular TCP connection.

    实现一点,攻击者目标主机发送设置了SYN标志tcp打开常规tCP连接一样。

    youdao

  • To make an attack, the attacker needs to buy several SSL certificates from CAs who sign certificates with the MD5 algorithm.

    实现攻击攻击需要使用MD 5算法签署证书CA购买若干ssl证书。

    youdao

  • The driver pulled over and passengers fled from the bus, bracing the door to keep the attacker inside.

    司机将车在一边,其余乘客逃离巴士将袭击者堵在车里。

    youdao

  • Essentially, if you allow an attacker to run code on such a machine through any means, the attacker can completely take over the machine.

    从本质上说如果允许攻击这样机器任何方式运行代码,则攻击者完全可以接管机器。

    youdao

  • Although this example demonstrates an SQL injection in its simplest form, you can see just how easy it is for an attacker to use.

    尽管简单的形式演示了一个SQL注入,但是可以看出攻击者利用SQL注入有多么容易

    youdao

  • Social Engineering is the tricking of an unsuspecting administrator into giving the account ID and passwords over to an attacker.

    社交工程哄骗一个毫无疑虑管理员攻击者说出帐户标识密码的欺骗方法。

    youdao

  • Often, it's best to check in both places; that way, if an attacker manages to slip around one defense, they'll still encounter the other.

    通常最好这两处都其进行检查这样即使攻击者成功地突破了一道防线,他们会遇到另一条。

    youdao

  • When attacked from the side, the crickets stridulated and tried to bite their attacker.

    侧边进攻时,蟋蟀会发出鸣叫声并且试图进攻者

    youdao

  • But that attack was rare in another way: It was easy enough to identify the attacker.

    但是这次袭击一方面来看却是极为少见的:袭击者轻易地就被发现。

    youdao

  • Knowing which ports are open on a host is an important first step for an attacker to deduce possible vulnerabilities to the target host.

    知道主机哪些端口打开的,对于攻击推断目标主机上可能存在的弱点重要一步

    youdao

  • The attacker can automate to go against multiple sites at one time.

    攻击可以自动多个站点上进行测试。

    youdao

  • Often the attacker will overrun the buffer with the malicious code the attacker wants to run, and the attacker will then change the return value to point to the malicious code they've sent.

    通常攻击使用它运行恶意代码来使缓冲区溢出然后攻击者会更改返回指向它们发送的恶意代码。

    youdao

  • This attack USES password cracking to penetrate the systems that the attacker wants to deface.

    攻击使用密码破解渗透攻击破坏系统

    youdao

  • Attacking using a buffer overflow can change this process and allow an attacker to execute any function they wish.

    利用缓冲区溢出进行攻击可以改变这个过程并且允许黑客执行任何他们期望函数

    youdao

  • Think in terms of the assets you're trying to protect and what an attacker might want to do to them.

    根据设法保护资产以及攻击可能会如何处理这些资产来考虑安全性。

    youdao

  • First, the attacker needs to make sure that the fake packets will actually be routed to the target.

    首先攻击者需要确保信息包确实路由到目标机器。

    youdao

  • Here, how to fight an attacker before he strikes... and then some sharp ideas for how to react if things really do get physical.

    这里如何在袭击者动手之前给以反击并且假如情况确实紧急的话如何回击的一些方法。

    youdao

  • For example, as a user is making an online money transfer, it is possible for an attacker to change the destination account to one that belongs to him.

    比如说某个用户正在进行在线转帐操作时,攻击者目标帐户修改属于他自己的帐户也是可行的。

    youdao

  • This allows an attacker to easily scan unencrypted traffic from the user's computer.

    就使攻击者可以很容易扫描客户端计算机的未加密通信。

    youdao

  • Admittedly, most of the capabilities are dangerous and can be abused, but reducing the capabilities available to an attacker might well protect your system from harm.

    坦率地说大多数能力危险可能滥用,减少攻击可以利用的能力有助于保护系统。

    youdao

  • It need not talk to the network, or understand the contents of the messages it writes to disk, making the program simple and easy to verify and thus hard for an attacker to break.

    无需网络沟通或者了解写到磁盘上消息内容使得程序简单容易验证从而使得攻击者更难破坏它。

    youdao

  • The bow and arrowrevolutionized warfare by enabling one to launch attacks from adistance with far less risk to the attacker.

    变革了战事,它们使攻击者可以远距离进攻而自身所处危险小。

    youdao

  • Whenever the in-house attacker appears to be making progress, the team responds by adding new distortions to the puzzles.

    一旦这个内部攻击进展的迹象,团队便对测验增加新的变形方式

    youdao

  • Whenever the in-house attacker appears to be making progress, the team responds by adding new distortions to the puzzles.

    一旦这个内部攻击进展的迹象,团队便对测验增加新的变形方式

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定