英语人>网络例句>malicious-looking 相关的网络例句
malicious-looking相关的网络例句

查询词典 malicious-looking

与 malicious-looking 相关的网络例句 [注:此内容来源于网络,仅供参考]

A configuration file can contain database passwords and other information that could be used by malicious users to penetrate or deface your site; never allow these files to be accessed by remote users.

一个配置文件可以保存数据库密码或者其他可以让恶意用户入侵或修改网站的重要信息;绝对不要让这些文件可以被远程用户访问到。

Their actions are mostly non-malicious, at most, is too conceited and never really set out to defraud.

他们的行动大多不具恶意,顶多是太过自负,绝不是真的存心欺骗。

This is extremely devious and malicious software, and in many cases, it's used by criminals for online identity theft.

这是非常狡猾和恶意软件,并在很多情况下,它的网上身份盗窃犯罪分子利用。

It estimated the reliability of received route-table making use of positions information, so the diffuseness of hostile packets was confined to a limited area, thus the influence of malicious nodes was severely restrained.

该策略利用节点的位置信息判断所接收路由表的可信度,避免了虚假路由信息在网络中的扩散,从而有效的降低了攻击节点对网络性能的影响。

No source code is a violation of the GPL and users should be wary of what may be a malicious client and I consider references to a pre-release a discourtesy to the programmers trying to prepare something for the community.

不提供代源码是违反了GPL的违法行为同时用户应该注意由此产生的恶意软件,但我个人认为对一个预览版下定义对于一个想为社团做点什么的程序员来说是非常无理的。

In this dissertation, two new proxy signature schemes from bilinear pairing are proposed, which are all based on discrete logarithm problem on GDH group. In the first scheme, the proxy signing ability can be revoked during the period of validity. Then, the malicious signer can not sign messages any more. Moreover, in this scheme secure channels are not needed.

本文基于GDH群的离散对数问题结合短签名的特点设计了两个代理签名体制,第一个体制可以在证书的有效期内撤销代理签名权,从而防止不诚实的代理签名者继续签名,而且无需安全信道。

From then on they lived a life of displacement, the original calm and happy life has thus been broken, on this piece of land, so it was real estate development companies for their own malicious dispossession!

从此他们一家就过着流离失所的生活,原本平静、幸福的生活就这样被打破了,这块地皮就这样被实华房地产开发公司恶意强占为己有!

Indeed, it is a Double Dutch, and people with ulterior motives have to be willing to footer.php in the document insert malicious code, have to find out more at this time inside the content.

的确是天书吧,而且别有用心的人有肯能会在footer.php文件里插入恶意代码,这个时候就更得弄明白里面的内容了。

Otherwise, a malicious eavesdropper on any router between your server and the end user can very easily sniff the sensitive information out of the network packets.

否则,恶意的监听者就可以在你的应用程序与最终用户之间的任何路由器上通过数据包探嗅到那些敏感的信息。

Any people with sane brains will not put such malicious rubbish; especially, they should not evilly assault Chinese people and China.

任何有健全脑子的人都不会放出这些恶毒的废话;他们更不应该邪恶地攻击中国以及中国人民。

第6/34页 首页 < ... 2 3 4 5 6 7 8 9 10 ... > 尾页
推荐网络例句

I am accused of being overreligious," she said in her quiet, frank manner,"but that does not prevent me thinking the children very cruel who obstinately commit such suicide.""

客人们在卡罗利娜·埃凯家里,举止就文雅一些,因为卡罗利娜的母亲治家很严厉。

Designed by French fashion house Herm è s, this elegant uniform was manufactured in our home, Hong Kong, and was the first without a hat.

由著名品牌 Herm è s 设计,这件高贵的制服是香港本土制造,是我们第一套不配帽子的制服。

Do not 'inflate' your achievements and/or qualifications or skills .

不要 '夸大' 你的业绩或成果,条件或者技能。