God won't ask what your highest salary was. He'll ask if you compromised your character to obtain it.
上帝不会问你有多高的薪水,他会问你是否损害自己品质得来的。
God won't ask what your highest salary was, he'll ask if you compromised your character to obtain it.
上帝不会问你收入有多丰富,他会问你是否曾为不义之财而妥协。
God won't ask what your highest salary was, but he'll ask if you compromised your character to obtain it.
上帝不会问你的薪水有多高,但是祂会问你是不是会为五斗米折腰。
God won't ask what your highest salary was, but will ask if you compromised your character to obtain that salary.
神不会问你有多高的薪水,但却会问你以什么心态去赚取这份薪水。
However, if you have technical debt already, you must work around those compromised parts of the system to add new features.
但是,如果您已经拥有技术债务,则必须解决系统中那些折衷部分才能添加新功能。
Once again, these types of files are very un-secure and you will need to take extra precautions to ensure that the data in these files cannot be compromised.
再一次告诉您,这些文件类型都非常不安全,您需要采取额外的预防措施来保证这些文件中的数据不会受到危害。
The functionality of selecting from a result set is not compromised, however, as you can still cycle through the result set using the arrow keys on the keyboard.
不必折中从结果集中选择的功能,但是,您也可以利用键盘的方位键循环选择结果集中的内容。
When an application is compromised, you also need an elegant way to roll out replacement API keys.
当应用被破坏时,你也需要一种完善的方式铺开替换的API密钥。
The problem with using the same password for everything you do is that if it's compromised and someone finds it, the rest of your identity is at risk.
将所有事物设置成同一个密码会随之产生一个后患,如果这个密码被盗用或者被某人知晓,那你的其他所有身份就会处于危险之中。
But what do you do if a system has been compromised and used for illegal or unauthorized activities?
但若系统已遭遇安全威胁并被用于非法或未经授权的活动,又该怎么办呢?
It's slightly less effective than a manual transmission, but remember you only need to use the stall recovery technique on really steep hills where traction is compromised.
这套办法在自动变速器上比在手动变速器上的效果略差,不过记住,只有在真正的陡坡上牺牲牵引力的情况下才需要使用这套熄火自救技术。
On tracks with debris or rubbish you often see mechanics removing this from the car's air intakes during a stop, ensuring radiator efficiency is not compromised.
在某些较脏的赛道(有破损残骸或者垃圾),我们时常会看到在进站时技师会将垃圾或者残片从赛车的进气口移除,从而保证散热器的工作效率。
By putting together a backup and recovery strategy for an instance, you can potentially avoid having to do a complete operating system restore when faced with a compromised instance.
通过为实例准备备份与恢复策略,可在遇到实例损坏问题时,不必进行整个操作系统恢复。
Firefox 3 keeps tabs on the sites that have been identified as compromised, and provides warnings to let you know that you may be visiting a suspected attack site.
Firefox3在被标识为不可信的网站上保持标签,并提供警告让你知道你可能访问了一个可疑的攻击站点。
If, however, you have a trusted network-one which you don't think can be compromised-then SSL isn't needed for your applications and can spare you and your users the performance degradation.
但是,如果网络是可以信任的,而且您不认为这个网络会受到危害,那么应用程序就不需要SSL,这样您和用户就不必面对下降的性能。
If you still haven’t heard by now, Mifare Classic, the RFID technology behind the Oyster Card in London, as well as by other transit operators in Boston and the Netherlands, have been compromised.
如果你现在还没听说过MifareClassic,伦敦地铁公司的生蚝卡背后的RFID(射频识别)技术,同样也是波士顿及荷兰的交通运营商使用的技术,现已失密。
If you get your cookies stolen, your corresponding account can be easily compromised and even taken over.
如果cookies被窃取了,您的相应账号很可能被破坏甚至被他人利用。
It probably won’t get in the wrong hands but keep your information high-level enough that you wouldn’t feel compromised if it did.
也许,演示PPT不会落人不该看的人手中,但你保持其中信息的高度简明扼要,即使被人拿到,你也不会受到什么威胁。
When you find a compromised system, simply download the clean binaries, set your PATH environment variable to use them, and start looking for backdoors.
当你发现一个隐患的系统,只要下载二进制文件的清理,设置你的PATH环境变量来使用他们,并开始寻找后门。
You know, I often wondered how the Freedom Teachings got so compromised over the eons, when so many good people were around to protect them.
要知道,我时常在想,为何万古以来,即使在那么多优秀人士的严密保护之下,自由教学还是会遭受到各类严重的损害。
Your key planet Saturn is compromised by a quincunx from Neptune now putting you in an unsolvable existential dilemma.
你的守护星土星向海王星妥协,将你置于一个现有的无法解决的困境。
No Compromised Key List for this site's certificate HAS been found. You must load the Compromised Key List before continuing.
无法为此网站的证书找到的“折衷密钥列表”。在继续执行之前,必须装入折衷密钥列表。
No Compromised Key List for the certificate HAS been found. You must load the Compromised Key List before continuing.
找不到此证书的“折衷密钥列表”。在继续执行之前,必须装入折衷密钥列表。
If you accept using photo retouch technique as a tool to introduce the new products, which type of advertisement that you are most compromised?
若你能接受相片编修应用在广告的照片上,那请问那类广告是你最能接受的?
If you accept using photo retouch technique as a tool to introduce the new products, which type of advertisement that you are most compromised?
若你能接受相片编修应用在广告的照片上,那请问那类广告是你最能接受的?
应用推荐