• This type of attack was what Albert Gonzalez used to steal 130 million credit card Numbers.

    就是AlbertGonzalez用来盗取1.3亿信用卡攻击

    youdao

  • This type of attack is only possible if the database or password store is already compromised.

    这种类型攻击可能数据库密码存储已经暴露的情况下进行。

    youdao

  • In 2002, the White House described 9/11 as “a new type of attack that had not been foreseen.”

    白宫2002年形容911“无法预料新型袭击”。

    youdao

  • In another type of attack, the attacker might modify the stylesheet to hide information from users.

    另一种攻击类型中,攻击可能会修改样式表信息隐藏起来不让用户发现。

    youdao

  • In recent years, there has been an increase of a particular type of attack: client-side attacks.

    最近几年,网络上出现一种新的攻击类型:客户攻击,攻击的对象是客户端应用程序。

    youdao

  • The appropriate key(s) will be shaded to indicate the type of attack(s) each technique helps to prevent.

    对于每种技术适当的方块加上底纹表示这种技术有助于防范攻击类型

    youdao

  • The best way to prevent this type of attack is to enforce policies that make passwords difficult to guess.

    防止这种类型攻击最佳方法加强策略使口令很难猜中

    youdao

  • The four squares will be shaded as appropriate to represent the type of attack this technique helps to prevent

    四个方块加了适当的底纹代表这种技术有助于防范攻击类型

    youdao

  • Systems used in this type of attack can be compromised in any number of ways and infected with a worm or virus.

    类型攻击使用系统可能多种方式破坏受到蠕虫病毒感染。

    youdao

  • Unless otherwise specified, a followup attack is considered to be the same type of attack as the initial attack.

    除非另外指出,不然后续攻击视为和开始攻击类型相同

    youdao

  • The length of the key determines the number of possible keysand hence the feasibilityof this type of attack.

    长度决定许多可能钥匙——因此可行性——这种类型的攻击。

    youdao

  • While in Laser Lock mode, the Javelin Soldier is extremely vulnerable to any type of attack because of the 3 second pre-attack delay.

    处于激光锁定模式由于3攻击延迟标枪对于任何形式的攻击都相当脆弱

    youdao

  • Consider Example 1 (a), which is paraphrased from the Windows exploit, of course, that forms the basis for this type of attack vector.

    考虑示例1 (a),当然改写Windows攻击,它构成此类攻击载体基础

    youdao

  • One of the most famous instances of this type of attack is the Windows animated cursor attack, and it's this pattern that I examine here.

    此类攻击著名示例之一就是Windows动画光标攻击,正是本文要讨论的模式

    youdao

  • LM Hash is vulnerable to this type of attack because it does not use today's common method of introducing "salt" to the encryption process.

    LMHash容易此类攻击攻破,是因为没有使用现今常用加密过程引入salt”的方式。

    youdao

  • If the server CPU and memory seem to be running excessively high, the Domino Web logs should be checked for a Denial of Service type of attack.

    如果服务器CPU内存运用率极高,那么应该检查DominoWeb日志是否存在拒绝服务型攻击

    youdao

  • In addition to the overflow exploits, SQL injection is one other type of attack that relies on developer oversight by not testing incoming data.

    除了溢出的利用以外,SQL注入一类依赖开发人员测试输入数据疏漏攻击

    youdao

  • While polyinstantiation will not prevent every type of attack, it is a useful addition to your security toolkit that is straightforward to configure.

    尽管实例不能防止所有攻击但它安全工具包一个有用的补充,而且配置十分简单。

    youdao

  • We know that Twitter's architecture has made it more vulnerable to this type of attack than Google or even Facebook, but in situations like this, communication is key.

    我们知道Twitter构架使得TwitterGoogleFacebook容易遭到攻击但是这种情况下沟通至关重要。

    youdao

  • If you are concerned about this type of attack, which is easily prevented through code inspections, you can prevent untrusted clients from connecting to the Web container.

    如果担心这种类型攻击(可以通过代码检查轻松地加以防止),则可以阻止任何不受信任的客户端连接web容器。

    youdao

  • What we're most interested in is seeing if we can get any insight into any terrorist plot that might be underway so that we can take the measures to stop any type of attack planning.

    我们最想知道,我们能否获知任何可能正在策划恐怖行为,以便于我们能够采取措施阻止任何形式攻击计划

    youdao

  • Although I can't get into the specifics of how to pull this type of attack off, you can look it up if you have SQL knowledge, which—if you're hosting database on your Web server—you should have.

    虽然不能详细解释这种攻击如何实施,但如果了解SQL 的话,就可以找到相关的答案。 如果您Web服务器驻留数据库的话,一定要了解这种攻击。

    youdao

  • The focus of this article is a specific type of code injection attack: the Blind XPath injection.

    本文主要介绍代码注入攻击一种特殊类型XPath

    youdao

  • One common type of malware, called a buffer overflow attack, overwhelms programs that accept input, like the address line in a Web browser or a search window for a database.

    恶意软件一种常见攻击类型所谓缓冲区溢出攻击,会使接受输入程序崩溃,web浏览器地址数据库搜索窗口

    youdao

  • So I immediately type up the paragraph, see what it looks like on a clean sheet of paper, and then attack that sheet of paper with my pencil again.

    所以我会立刻写好的一段打印出来,看看一张干净的白纸上是什么样子,然后再用铅笔在纸上涂涂改改。

    youdao

  • For example, if you look at the drugs people take for Type 2 diabetes, certain drugs have recently been linked to increased risk of heart attack.

    例如如果留心人们治疗2型糖尿病服用药物某些药物近来加剧心脏病发作的风险联系起来

    youdao

  • In a buffer overflow attack, the hacker takes advantage of specific type of computer program bug that involves the allocation of storage during program execution.

    缓冲溢出攻击黑客利用程序执行期间存储分配中的特定计算机程序漏洞

    youdao

  • A type of statistical analysis used to study high-energy physics and stock market fluctuations could yield a new Angle of attack in the fight against the virus that causes AIDS.

    一种统计方法主要用于研究高能物理股市波动,现在有可能人类对抗艾滋病战役中开辟新的战场。

    youdao

  • In 2004, for instance, Sunil Rao of Duke University Medical Centre, in North Carolina, carried out a study of people suffering from acute coronary syndrome (a specific type of heart attack).

    对此2004年,卡杜克大学医学中心(Duke University Medical Center)桑尼(Sunil Rao),对冠状动脉综合症(心脏病)患者进行了一项调查

    youdao

  • In 2004, for instance, Sunil Rao of Duke University Medical Centre, in North Carolina, carried out a study of people suffering from acute coronary syndrome (a specific type of heart attack).

    对此2004年,卡杜克大学医学中心(Duke University Medical Center)桑尼(Sunil Rao),对冠状动脉综合症(心脏病)患者进行了一项调查

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定