英语人>网络例句>malicious-looking 相关的网络例句
malicious-looking相关的网络例句

查询词典 malicious-looking

与 malicious-looking 相关的网络例句 [注:此内容来源于网络,仅供参考]

Pharming is a scamming practice in which malicious code is installed on a personal computer or server,misdirecting users to 1 Web sites without their knowledge or consent ,Pharming has been called"phishing without a lure".

无诱饵钓鱼欺骗是一种诡秘的做法,其中,恶意代码装入个人计算机或服务器,在不知不觉中或未经用户同意将用户错误地引向骗人的网站,这就称为&无诱饵钓鱼&。

Pharmingis a scamming practice in which malicious code is installed on apersonal computer or server, misdirecting users to fraudulent Web siteswithout their knowledge or consent.

无诱饵钓鱼欺骗是一种诡秘的做法,其中恶意代码装入个人计算机或服务器,在不知不觉中或者未经用户同意将用户错误地引向骗人的网站。

Note that this does not prevent a poorly written program from being downloaded or run on your computer, but it does reduce the chance of someone misrepresenting a program that is intended to be malicious or intentionally harmful.

注意,这样并不能阻止某些蓄意破坏的程序下载到计算机上并在本地运行,但这样可减少某些人通过伪造的程序蓄意破坏的机会。

Vindication and malicious intents have never been more rapturous than in director Robert Wilson's Quartett .

辩护和恶意的意向也从来没有像雷鸣般的导演罗伯特比威尔逊的四重奏。

"In most situations, if people are honest and explain what they did, and it had no true malicious intent, then most organizations will acquiesce and like that," he says.

&在大多数情况下,如果人们诚实并且解释清楚他们所做的,而且确实没有恶意,大多数组织会默认并容忍。&他说。

"In most situations, if people are honest and explain what they did, and it had no true malicious intent, then most organizations will acquiesce and like that," he says.

汤尼·西蒙,《诚实红利》的作者,称承担集体性的责任是一种聪明的做法。&如果你能够让所有人都围坐在桌边说,'我们都搞糟了。'那就太好了。&他说

The most tenacious. They say that all good things come to an end. It's a shame that the creators of the Spamta worms haven't heard the saying. Otherwise, they might have stopped sending wave after wave of almost identical variants of this malicious code.

最顽强奖。人们总说再好的东西吃多了也会腻,不过很显然蠕虫Spamta家族的作者们从没听过这句话,否则他们早就应该停止一波又一波的散发他们那些代码基本相同的变种蠕虫了。

The algorithms above are implemented. Some analyses compared with Paul et al. [6] are drawn out. Experimental results indicate that the present algorithms are robust against JPEG compressing but extremely sensitive to other malicious manipulation such as filtering and random noising.

本文实现了上述的数字水印算法,并与文献[6]进行比较,实验结果表明本文所提出的算法对JPEG压缩具有很好的鲁棒性,但对其他攻击如滤波和加噪等是比较敏感的。

However, another team started later but successfully obfuscated all nine samples of malicious code in 2 hours 25 minutes.

然而,另一个稍晚开始比赛的小组用了两小时二十五分成功的完成了所有九个病毒代码样本的伪装。

The experimental results proof that, DrTrust outstands the current trust models in accurate trust computation and the inhibition to the malicious peers.

仿真结果表明,DrTrust在准确计算节点信任值和抑制恶意节点行为等问题上较已有的信任模型有一定的改进。

第27/34页 首页 < ... 23 24 25 26 27 28 29 30 31 ... > 尾页
推荐网络例句

The concept of equivalent rotationally rigidity is offered and the formula of rotationally rigidity is obtained.

主要做了如下几个方面的工作:对伸臂位于顶部的单层框架—筒体模型进行分析,提出了等效转动约束的概念和转动约束刚度的表达式。

Male cats normally do not need aftercare with the exception of the night after the anesthetic.

男猫通常不需要善后除了晚上的麻醉。

Its advantage is that it can be used in smaller units.

其优点在于可以在较小的单位中应用。