英语人>网络例句>攻击用的 相关的搜索结果
网络例句

攻击用的

与 攻击用的 相关的网络例句 [注:此内容来源于网络,仅供参考]

Hawthorne is also a great allegorist and almost every story can be read allegorically, as is the case in "Young Goodman Brown." Whereas allegory is used to hold fast against the crushing blows of reality, the symbol serves as a weapon to attack and penetrate it.

霍索恩allegorist也是一个伟大的故事,几乎每寓意可以阅读、如同在"古德曼布朗年轻"而寓言是用来坚守对现实冲击破碎、符号作为武器,攻击和渗透。

Jack is an ambidextrous hitter; he can bat right-handed or left-handed.

杰克是一位双手都很灵巧的打击手;他可以用右手或左手攻击。

The Annihilator Tripod has a short range EMP attack it can use on Enemy Vehicles and Buildings.

三脚拥有短程EMP攻击,它可以用在敌人的车辆和建筑上。

I want anti-ballistic missile systems to protect ourselves and our allies from a rogue nation.

我要用反弹道导弹系统来保卫我们自己和盟国免受诬赖国家的攻击。

The purpose of these MRLs remains unknown but is thought to be used to launch antisubmarine rockets, ground- attack rockets and/or decoys/chaffs.

MRLS的目的仍不得而知,但据信这将用来发射反潜火箭、地面火箭攻击/或诱饵/金属箔片

Was to bombard him even more with whatever item she could find.

就是用手边能找到的东西更狠地攻击他。

Log records are often a number of clues and attacks, hackers, of course not leave the "evidence of a crime," he will cut it or cover it with fake logs, to date not been aware of the back to re-enter the system, hackers will change some system settings, placed in the system, Trojan horses or remote manipulation of a number of other procedures.

日志往往会记录上一些黑攻击的蛛丝马迹,黑客当然不会留下这些"犯罪证据",他会把它删了或用假日志覆盖它,为了日后面以不被觉察地再次进入系统,黑客会更改某些系统设置、在系统中置入、特洛伊木马或其他一些远程操纵程序。

The work came naturally to them, as members of a large family of ethnic Albanian immigrants who own more than a dozen roofing companies in New York and New Jersey. They fixed the roof free of charge, encouraged by their imam to do good deeds. One congregant said the men were storing up credit for "the afterlife."

美国新泽西州加姆登地区联邦法院8日审理了一起惊人的案件,六名男子被控同谋实施恐怖主义活动,他们准备用冲锋枪、枪榴弹等武器攻击当地军事基地,并扬言要"尽可能多杀点士兵"。

The Renegade is a fast attack copter designed to provide ground support.

变节者时一个快速攻击的飞机,被设计用来进行对地支援。

To insert the mobile computer hard drive before hand as much as possible not to come into direct contact with the mobile hard disk interface of metal, because the electrostatic people will inadvertently move the metal interface as a hard disk electrostatic induction current transmission channel to the formation of the main board for computer attacks; To prevent accidents from occurring, we plug the mobile hard disk before you should touch the metal frame or a variety of channels even though, to people out early release of static electricity, after the plug mobile Even if the hard disk when the hands are not careful when the mobile hard disk interface of the metal parts will not move the hard disk interface, or how much harm a computer motherboard.

在向电脑中插入移动硬盘之前,尽可能地不要用手直接接触到移动硬盘接口处的金属,因为人身上的静电会在不经意间把移动硬盘的金属接口当作静电感应电流的传输通道,来对电脑主板形成攻击;为防止意外发生,我们在插拔移动硬盘之前,先应该用手摸一下金属门框或各种尽管管道,以便将人身上的静电提前释放掉,以后在插拔移动硬盘时即使手不小心碰到了移动硬盘接口处的金属部位,也不会对移动硬盘接口或电脑主板造成多大危害。

第10/32页 首页 < ... 6 7 8 9 10 11 12 13 14 ... > 尾页
推荐网络例句

Since historical times,England ,where the early inhabitants were Celts, has been conquered three times .

从有历史以来,英国,在此地早期居住的是凯尔特人,已经被征服了三次。

Bluetooth OBEX File Transfer Enables the sending and receiving of files on your phone via Bluetooth.

蓝牙OBEX文件移动允许经过蓝牙传送和接受文件。。。。

The almost sure central limit theorem is a pop topic of the probability research in recent years,because it has many actual applications in the random analogue.

中文摘要:几乎处处中心极限定理是近几十年概率论研究的一个热门话题。它之所以引起人们的注意是由于它在随机模拟方面的实际应用参见Fisher