查询词典 malicious
- 与 malicious 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
O The Malicious - This type of intruder is out to either bring down your systems, or deface your web page, or otherwise force you to spend time and money recovering from the damage he has caused.
恶意 -这类入侵者主要是宕掉您的系统,或篡改您的网页,或其它迫使您花费时间或金钱来恢复他所造成的破坏。
-
A configuration file can contain database passwords and other information that could be used by malicious users to penetrate or deface your site; never allow these files to be accessed by remote users.
一个配置文件可以保存数据库密码或者其他可以让恶意用户入侵或修改网站的重要信息;绝对不要让这些文件可以被远程用户访问到。
-
Their actions are mostly non-malicious, at most, is too conceited and never really set out to defraud.
他们的行动大多不具恶意,顶多是太过自负,绝不是真的存心欺骗。
-
This is extremely devious and malicious software, and in many cases, it's used by criminals for online identity theft.
这是非常狡猾和恶意软件,并在很多情况下,它的网上身份盗窃犯罪分子利用。
-
It estimated the reliability of received route-table making use of positions information, so the diffuseness of hostile packets was confined to a limited area, thus the influence of malicious nodes was severely restrained.
该策略利用节点的位置信息判断所接收路由表的可信度,避免了虚假路由信息在网络中的扩散,从而有效的降低了攻击节点对网络性能的影响。
-
No source code is a violation of the GPL and users should be wary of what may be a malicious client and I consider references to a pre-release a discourtesy to the programmers trying to prepare something for the community.
不提供代源码是违反了GPL的违法行为同时用户应该注意由此产生的恶意软件,但我个人认为对一个预览版下定义对于一个想为社团做点什么的程序员来说是非常无理的。
-
In this dissertation, two new proxy signature schemes from bilinear pairing are proposed, which are all based on discrete logarithm problem on GDH group. In the first scheme, the proxy signing ability can be revoked during the period of validity. Then, the malicious signer can not sign messages any more. Moreover, in this scheme secure channels are not needed.
本文基于GDH群的离散对数问题结合短签名的特点设计了两个代理签名体制,第一个体制可以在证书的有效期内撤销代理签名权,从而防止不诚实的代理签名者继续签名,而且无需安全信道。
-
From then on they lived a life of displacement, the original calm and happy life has thus been broken, on this piece of land, so it was real estate development companies for their own malicious dispossession!
从此他们一家就过着流离失所的生活,原本平静、幸福的生活就这样被打破了,这块地皮就这样被实华房地产开发公司恶意强占为己有!
-
Indeed, it is a Double Dutch, and people with ulterior motives have to be willing to footer.php in the document insert malicious code, have to find out more at this time inside the content.
的确是天书吧,而且别有用心的人有肯能会在footer.php文件里插入恶意代码,这个时候就更得弄明白里面的内容了。
-
Otherwise, a malicious eavesdropper on any router between your server and the end user can very easily sniff the sensitive information out of the network packets.
否则,恶意的监听者就可以在你的应用程序与最终用户之间的任何路由器上通过数据包探嗅到那些敏感的信息。
- 推荐网络例句
-
Do you know, i need you to come back
你知道吗,我需要你回来
-
Yang yinshu、Wang xiangsheng、Li decang,The first discovery of haemaphysalis conicinna.
1〕 杨银书,王祥生,李德昌。安徽省首次发现嗜群血蜱。
-
Chapter Three: Type classification of DE structure in Sino-Tibetan languages.
第三章汉藏语&的&字结构的类型划分。