英语人>网络例句>malicious-looking 相关的网络例句
malicious-looking相关的网络例句

查询词典 malicious-looking

与 malicious-looking 相关的网络例句 [注:此内容来源于网络,仅供参考]

"Rats!" Olney looked at Ruth, and his expression was malicious. I suppose you'll be telling me next that you read Spencer on her recommendation - only you didn't.

"废话!"奥尔尼阴沉了脸望了望露丝,我怕你还要告诉我是她推荐你读斯宾塞的呢——好在你并没这么说。

Some more "bull" that in the parent folder is also the site with some advertising. Ini text files and other folders, this all right, you open the folder to see if those are what, sometimes you can find these . ini file written harassment on a malicious Web site or your website address to other advertisers.

有的更"牛"一点,在父文件夹里还带着一些广告网站的。ini 文本文件和其它文件夹,这个没事,你打开看看那些文件夹里都是啥,有时候你能发现这些。ini 文件里就写着骚扰你的恶意网站或者其它广告网站的地址。

In PC Magazine 's testing, Sana's Primary Response SafeConnect was very effective at keeping malicious software from installing on a clean system.

在PC杂志的测试,SANA的 PrimaryResponseSafeconnect反应是非常有效的保存在恶意软件安装到干净的制度。

Tommy piously intoned, but his accent was not entirely malicious.

汤米很虔诚的吟颂着,不过他的腔调不完全是那麽幸灾乐祸。

In addition, the defendant also announced in the media that the plaintiff's software is malicious.

另外,被告还在媒体上宣传原告软件是恶意软件。

The behavioral method is based on the analysis of what specifically applications do in the system: some actions may be legitimate and harmless, but their combination in a certain sequence can explicitly point to malicious intentions.

行为的方法进行分析的基础上做什么具体的应用系统中的:某些行为可能是合法的和无害的,但他们的结合在一定序列可以明确指向恶意意图。

5 Security 安全 As far as practicably possible, the medium of information provision shall be protected from corruption, degradation and deliberate change by those other than the manufacturer, whether malicious or not.

至于实际可能,信息规定的媒介必须受到保护以免腐败,退化,以及被除厂家以外的人进行恶意或非恶意的故意修改。

It provides an excellent way to prevent unwanted or malicious changes from being made to a PC.

它提供一种完美的保护方式,可以预防对你的电脑所进行的不必要的或恶意的操作。

Can also be said to be malicious protracted.

也可以说是恶意久拖不决。

The protocols are efficient and provable secure and can tolerate the malicious behavior of up to half of the proxies.

该协议是有效的、可证安全的,并且可以容忍至多一半代理的恶意行为。

第17/34页 首页 < ... 13 14 15 16 17 18 19 20 21 ... > 尾页
推荐网络例句

What are your goals and strategies for growth?

你的成长目标和策略是什么?

And unto the angel of the church in Sardis write; These things saith he that hath the seven irits of God, and the seven star I know thy works, that thou hast a name that thou livest, and art dead.

3:1 你要写信给撒狄教会的使者,说,那有神的七灵和七星的,说,我知道你的行为,按名你是活的,其实是死的。

"It is a testament to making sure unemployment compensation is available, making sure we are looking out for people who have lost their jobs," she said.

"这是个实证,证明我们必须确保人们都可以得到失业补偿,确保那些失去工作的人们得到照顾。"