英语人>网络例句>malicious-looking 相关的网络例句
malicious-looking相关的网络例句

查询词典 malicious-looking

与 malicious-looking 相关的网络例句 [注:此内容来源于网络,仅供参考]

"Rats!" Olney looked at Ruth, and his expression was malicious. I suppose you'll be telling me next that you read Spencer on her recommendation - only you didn't.

"废话!"奥尔尼阴沉了脸望了望露丝,我怕你还要告诉我是她推荐你读斯宾塞的呢——好在你并没这么说。

Some more "bull" that in the parent folder is also the site with some advertising. Ini text files and other folders, this all right, you open the folder to see if those are what, sometimes you can find these . ini file written harassment on a malicious Web site or your website address to other advertisers.

有的更"牛"一点,在父文件夹里还带着一些广告网站的。ini 文本文件和其它文件夹,这个没事,你打开看看那些文件夹里都是啥,有时候你能发现这些。ini 文件里就写着骚扰你的恶意网站或者其它广告网站的地址。

In PC Magazine 's testing, Sana's Primary Response SafeConnect was very effective at keeping malicious software from installing on a clean system.

在PC杂志的测试,SANA的 PrimaryResponseSafeconnect反应是非常有效的保存在恶意软件安装到干净的制度。

Tommy piously intoned, but his accent was not entirely malicious.

汤米很虔诚的吟颂着,不过他的腔调不完全是那麽幸灾乐祸。

In addition, the defendant also announced in the media that the plaintiff's software is malicious.

另外,被告还在媒体上宣传原告软件是恶意软件。

The behavioral method is based on the analysis of what specifically applications do in the system: some actions may be legitimate and harmless, but their combination in a certain sequence can explicitly point to malicious intentions.

行为的方法进行分析的基础上做什么具体的应用系统中的:某些行为可能是合法的和无害的,但他们的结合在一定序列可以明确指向恶意意图。

5 Security 安全 As far as practicably possible, the medium of information provision shall be protected from corruption, degradation and deliberate change by those other than the manufacturer, whether malicious or not.

至于实际可能,信息规定的媒介必须受到保护以免腐败,退化,以及被除厂家以外的人进行恶意或非恶意的故意修改。

It provides an excellent way to prevent unwanted or malicious changes from being made to a PC.

它提供一种完美的保护方式,可以预防对你的电脑所进行的不必要的或恶意的操作。

Can also be said to be malicious protracted.

也可以说是恶意久拖不决。

The protocols are efficient and provable secure and can tolerate the malicious behavior of up to half of the proxies.

该协议是有效的、可证安全的,并且可以容忍至多一半代理的恶意行为。

第17/34页 首页 < ... 13 14 15 16 17 18 19 20 21 ... > 尾页
推荐网络例句

The concept of equivalent rotationally rigidity is offered and the formula of rotationally rigidity is obtained.

主要做了如下几个方面的工作:对伸臂位于顶部的单层框架—筒体模型进行分析,提出了等效转动约束的概念和转动约束刚度的表达式。

Male cats normally do not need aftercare with the exception of the night after the anesthetic.

男猫通常不需要善后除了晚上的麻醉。

Its advantage is that it can be used in smaller units.

其优点在于可以在较小的单位中应用。