英语人>网络例句>攻击者 相关的搜索结果
网络例句

攻击者

与 攻击者 相关的网络例句 [注:此内容来源于网络,仅供参考]

She reached up and tried to gouge her attacker's eyes.

她伸出手,想把攻击者的眼睛抠出来。

The story: New England shore community is terrorized by shark attacks; local cop, ichthyologist and salty shark expert determine to kill the attacker.

故事:新英格兰海岸社区是恐怖的鲨鱼袭击,当地警察,鱼类学家和咸鲨鱼专家确定攻击者杀死。

With growing Internet connectivity, it comes convenience of personal communication and development of social economy as well as growing opportunities for attackers to illicitly access computers over the network.

网络的日益普及在方便人与人之间的交流、推动社会经济发展的同时,也给黑客和恶意攻击者创造了更多的访问网络的机会,结果导致近年来的网络入侵事件的递增,给社会造成了巨大的损害。

This can result in a large overwrite of the heap using attacker controlled data.

这可能导致堆大覆盖控制数据,攻击者使用。

Experiment the result expresses, combining can realize to have no the instauration of Damage.

实验结果表明,该方法简单有效,能对抗被动攻击者,并能够实现无损恢复。

Botnets are typically controlled by an attacker via Internet Relay Chat.

僵尸网络通常由攻击者通过Internet多线交谈控制。

Finally, some of the mass scanning tools recovered from compromised honeypots do not appear to be in popular circulation, which suggests that the attackers had some level of development and tool smith capabilities beyond basic script kiddy activity, or were part of a closed community that did not share their tools in public forums.

最后,一些从攻陷蜜罐上发现的批量扫描工具看起来并没有广泛地传播,这也显示了这些攻击者拥有超越基本的脚本小子的一定水平的开发能力和工具制造能力,或者是一个并没有将他们的工具共享给公开论坛的封闭社团的成员。

The attacker explicitly controls what the name of the library is.

攻击者可以显式的控制库的名字是什么。

In SPVT (security protocol verifying tool), the specification language is the π-like calculus extended with three appendixes, the Dolev-Yao model is described with Horn logic rules, the π-like calculus model of security protocol is transformed into the logic program model by abstract rules, the security properties are verified based on the calculus of the logic program's fixpoint, and the counter-examples on security properties are constructed from the process of the fixpoint calculus and the process of the property verification.

在SPVT中,以扩展附加项的类演算作为安全协议描述语言,以扩展附加项的Horn逻辑规则描述协议攻击者的Dolev-Yao模型,通过一组抽象规则将安全协议的类(演算模型转换为逻辑程序模型,基于安全协议逻辑程序的不动点计算验证安全性质,从安全协议逻辑程序的不动点计算和安全性质的验证过程中构造不满足安全性质的安全协议反例。

Instead they must mangle text in new ways when attackers figure out how to cope with existing distortions.

相反,攻击者们弄明白如何处理现有的变形的时候,设计者们必须采用新的方式将文字变形。

第9/42页 首页 < ... 5 6 7 8 9 10 11 12 13 ... > 尾页
推荐网络例句

Cynanchum Lingtai apricot production in the average weight 65 grams, the brightly-colored fruit, juicy rich, sweet-sour taste, sweet from the nucleolus, when the late Qing Dynasty famous Shaanxi, Gansu provinces, the Qing imperial court Tongzhi tribute for years.

灵台生产的牛心杏平均单果重65克,果实色泽鲜艳,汁多味浓,甜酸适口,离核仁甜,清末时就驰名陕、甘两省,清同治年间曾为朝廷贡品。

Chenopodium album,Solanum nigrum, and Amaranthus retroflexus were very susceptible to the herbicides. Polygonum persicaria and Abutilon theophrasti were relatively less susceptible to the herbicides, and Lycopersicon esculentum was not susceptible to it. The relationship between reduction rates of weed biomass and PPM values of weed leaves 2,4, and 6 days after treatment was established.

供试的6种杂草对该混剂的敏感性存在显著差异:红心藜Chenopodium album、龙葵Solanum nigrum和反枝苋Amaranthus retroflexus对该混剂最敏感,ED90值分别为47.65、71.67和29.17g/hm2;春蓼Polygonum persicaria和苘麻Abutilon theophrasti敏感,ED90值分别为96.91、114.20g/hm2;而番茄不敏感。

However, I have an idea.

不过,我有个主意。