英语人>网络例句>恶意地 相关的搜索结果
网络例句

恶意地

与 恶意地 相关的网络例句 [注:此内容来源于网络,仅供参考]

If a malicious user were able to gain access to the key from which you're reading, he or she could replace the ImagePath value with an arbitrary amount of data.

如果一个恶意用户可以从你正在读去的位置得到对这个关键字的访问,他或她可以使用以一个任意地数据值替换这个ImagePath的键值。

"A."受海上危险影响的船舶,货物,或其他动产","海上危险"则被定义为:"the perils consequent upon or incidental to, the navigation of the sea ,that is to say, perils of the seas, fire, war perils, pirates, rovers, thieves, captures, seizures, restraints and detainments of princes and peoples, jettisons, barratry and any other perils, either of the like kind or which may be designated by the policy.

"( "因海上航行而发生的或与之有关的各项危险。也即,海难,火灾,战争危险,海盗,劫掠者,盗贼,及君主和人民的捕获,扣押,拘禁,管制,抛弃,船长、船员恶意损害被保险人的欺诈恶行及任何诸如此类的或保险单清楚地标明的其他危险。

These dogs get on well with children and strangers, but Basset Hounds also happily accept unwanted intruders, therefore they do not make the best guard dog.

这些狗上以及儿童与陌生人,但Basset力猎犬还愉快地接受恶意入侵者,因此,他们不同意尽最大警卫犬。

Aron cannily reminds us that the more extravagant answers to this question are often the most malevolent: they promise everything; they tend to deliver misery and impoverishment.

阿隆机敏地提醒我们注意,一种政治主张针对这个问题的回答越是不着边际的夸大其词,往往越是最怀有恶意的:他们先是许诺一切;随后给民众带来悲惨和穷困。

Also in 2000, McGraw had a brush with the law when he and tourmate Kenny Chesney got involved in a scuffle with police officers, after Chesney attempted to ride one of the officers' horses; McGraw was later cleared of assault charges and spent the rest of 2000 on a second tour with Hill.

同年麦克劳惹上了点小麻烦,他的巡演伙伴肯尼·切斯尼试图去起警察的马,之后两人与警察展开了一场肉搏;事后麦克劳幸运地免于恶意攻击的指控,并第二次与希尔合作进行了巡演,总算平稳的度过了新千年的第一年。

Like other malware and spyware, you may unknowingly download a dialer when it comes bundled with free software.

像其他恶意软件和间谍软件,您可能不知不觉地下载一个拨号时附带的免费软件。

In this paper, the concept of network security and security structures of OSI and Internet is introduced, and various threats confronting the computer network are also discussed. Several kinds of network information security technologies, including firewall technology, virtual private network, intrusion detection system, data encryption technology, identity authentication and security protocol etc. are also examined. The security of internal network is the biggest problem in the construction of each network. The solution to this problem lies in setting up a firewall. The theory of a firewall and the approach to its actualization is studied. Intrusion detection system, an important part of the computer network security system, has gained extensive attention. IDS monitors the computer and network traffic for intrusion and suspicious activities. It not only detects the intrusion from the extranet hacker, but also the intranet users. The emergence of virtual private network paves the way for realizing secure connection of LAN quickly and at a relatively low cost. The concept, function, key techniques, including the tunnel technology, and the ways to realize VPN are expounded in this paper. Also introduced is the data encrypt network technology, which is called the soul of computer network security, such as digital digest, digital signature, digital certificate, digital encrypt arithmetic and so on. At the same time, the principle and the process of implementing network security by digital certificate and digital signature, the basic principle and characters of security protocols, and finally, three of the security protocols, concerning the security problems in network, IPsec, SLL and SET are analyzed in detail Computer network system should be a system of dynamic defence, both dynamic and static, passive as well as active, and even offensive, combined with management and technology.

本文系统地介绍了网络安全的概念、OSI及Internet的安全体系结构,并讨论了计算机网络面临的各种安全威胁;内部网络的安全问题是每个建网单位面临的最大问题,可以认为防火墙技术是解决网络安全的一个主要手段,本文研究了防火墙的原理及其实现手段;作为一种主动的防御措施,入侵检测系统作为网络系统安全的重要组成部分,得到了广泛的重视,TDS对计算机和网络资源上的恶意使用行为进行识别和响应,不仅检测来自外部的入侵行为,也监督内部用户的未授权活动;虚拟专用网技术的出现,为实现网络间的连接提供了快速安全但又相对便宜的手段,本文较深入的探讨了实现VPN的隧道技术,并对VPN的概念、功能、实现途径、基本构成、关键技术及发展前景等问题进行了全面论述;数据加密技术是网络安全核心技术之一,本文从数据加密算法、数字摘要、数字签名及数字证书等几方面简要介绍了数据加密技术,并分析用数字证书和数字签名实现网络安全的原理和过程;对安全协议的基本原理、主要特点进行了较为深入的研究,并就网络的安全性问题剖析了三种安全协议:IPsec协议、SLL协议和SET协议。

I expressly declare here and now that this rumor was simply the invention of evil-minded relations.

我在这里明确地声明:这个谣言纯系居心叵测的亲戚恶意捏造。

So the planets kept on dancing to the math-music of the universe , and Lan's moon was admired by all ,until one day a evil-minded ice-hearted comet viciously slammed into it , shattering it into a thousand and thousand pieces .

行星们仍然随着宇宙的音乐舞蹈着,Lan的月亮被所有的行星所羡慕。直到有一天,一个恶意的冷酷的彗星邪恶地猛撞它,把它撞成了成千上万的碎片。

The scheme decreases the computation and storage of mobile nodes with reduced commutation overhead.The security is also improved for the initially existence of the off-line trued third party.The scheme provides high availability and security due to the distributed public key management model and gives a good solution to the problem of public key revocation dependent on the localized trust model.The server nodes of public key management can be dynamically adjusted to adapt to the dynamic nature of MANET.

方案中不需要公钥证书的存在,减少了系统通信开销以及结点的计算量和存储容量;在组网时依赖于一个离线的可信任机构,提高了系统的可信度;采用分布式CA模型,克服了传统集中式CAN用性与安全性的问题;依靠局域化的信任模型,对恶意结点进行了有效的处理,较好地解决了公钥撤销问题;****管理服务结点可动态调整,能够较好地适应MANET的动态特性。

第5/9页 首页 < 1 2 3 4 5 6 7 8 9 > 尾页
推荐网络例句

Cynanchum Lingtai apricot production in the average weight 65 grams, the brightly-colored fruit, juicy rich, sweet-sour taste, sweet from the nucleolus, when the late Qing Dynasty famous Shaanxi, Gansu provinces, the Qing imperial court Tongzhi tribute for years.

灵台生产的牛心杏平均单果重65克,果实色泽鲜艳,汁多味浓,甜酸适口,离核仁甜,清末时就驰名陕、甘两省,清同治年间曾为朝廷贡品。

Chenopodium album,Solanum nigrum, and Amaranthus retroflexus were very susceptible to the herbicides. Polygonum persicaria and Abutilon theophrasti were relatively less susceptible to the herbicides, and Lycopersicon esculentum was not susceptible to it. The relationship between reduction rates of weed biomass and PPM values of weed leaves 2,4, and 6 days after treatment was established.

供试的6种杂草对该混剂的敏感性存在显著差异:红心藜Chenopodium album、龙葵Solanum nigrum和反枝苋Amaranthus retroflexus对该混剂最敏感,ED90值分别为47.65、71.67和29.17g/hm2;春蓼Polygonum persicaria和苘麻Abutilon theophrasti敏感,ED90值分别为96.91、114.20g/hm2;而番茄不敏感。

However, I have an idea.

不过,我有个主意。