英语人>网络例句>入侵者 相关的搜索结果
网络例句

入侵者

与 入侵者 相关的网络例句 [注:此内容来源于网络,仅供参考]

These citadels host four easily accessible defensive cannons set on the ramparts, capable of unleashing hot fury onto oncoming attackers. Additional explosives sit safely stowed in the base of the keep along the back wall. At least, they're safe as long as they don't fall into enemy hands.

这些要塞城墙上拥有4个可以轻松获得的防御大炮,向来到的入侵者倾泄着灼热愤怒的炮弹,在要塞的后墙安全地放置着更多的军火,至少它们在没有落入敌人手里面时是安全的。

No one will enter your room without the Aerostat sending an immediate alert - so you can terminate all intruders!

如果有人进入你的房间,Aerosta会立即发出警报,这样就可以终止一切入侵者的入侵!

Shoots ground intruders only and does not attack on air.

芽地面入侵者只和不攻击的空气。

As the invaders are Moslems, while suppressing militarily, they pushed their Islamic law, and Alcoran was considered canon.

由于入侵者是伊斯兰教徒,在军事镇压的同时,穆斯林在北印度全力推行伊斯兰法,《古兰经》被尊为圣典。

The gateway to the mind of America did not have to be rammed open by alien philosophy, the Enemy Without, for it was swung open to the invader by our inchoate longing for the beyond, the Enemy Within.

美国精神的大门并不一定要由"外部敌人",即外国哲学冲撞开,也可以由"内部敌人",即我们自己刚刚萌发的超越的渴望,主动为入侵者打开。

WE ARE NOT INVADERS AND WE ARE SAVING YOUR LITTLE ARSES AT THIS POINT, FOR A TIME ANYWAY.

我们不是入侵者,我们此时是正在挽救你们的小小的想法?

That hole allowed him to upload an attack file the hacker hadn't asked for, and even write it into the server's autostart directory.

该小BUG可以不经入侵者同意而上传攻击代码,甚至可以写入到他的自动运行的文件目录中。

In order to make the honeypot system to collect attackers information, NAT Router is introduced.

对于一个单独的蜜罐来说,如果没有入侵者对其进行攻击,那么它就不可能获得入侵者的相关信息。

For example you can use smart wonder usage, or you can use the crutch of warmongering, altough I've noticed the AI is certainly capable of bogging down an invasion under sheer weight of units (and now I've made them chop during wars, yikes...).

你可以做的事情:比如,你可以更聪明的利用奇迹,你利用战神。AI当然可以用各种单位让入侵者陷入苦战。现在我让他们会在战争期间砍树(或者意思是:更加主动的攻击入侵者)。

It allures attacker by some obvious security holes, at the same time, monitors the hackers behavior and records all the information for further analysis.

它通过构造一个有着明显安全漏洞的系统来引诱入侵者对其进行攻击,并在攻击的过程中对入侵者的入侵动机、入侵手段、使用工具等信息进行详细地记录。

第1/26页 1 2 3 4 5 6 7 8 9 ... > 尾页
推荐网络例句

The absorption and distribution of chromium were studied in ryeusing nutrient culture technique and pot experiment.

采用不同浓度K2CrO4(0,0.4,0.8和1.2 mmol/L)的Hoagland营养液处理黑麦幼苗,测定铬在黑麦体内的亚细胞分布、铬化学形态及不同部位的积累。

By analyzing theory foundation of mathematical morphology in the digital image processing, researching morphology arithmetic of the binary Image, discussing two basic forms for the least structure element: dilation and erosion.

通过分析数学形态学在图像中的理论基础,研究二值图像的形态分析算法,探讨最小结构元素的两种基本形态:膨胀和腐蚀;分析了数学形态学复杂算法的基本原理,把数学形态学的部分并行处理理念引入到家实际应用中。

Have a good policy environment, real estate, secondary and tertiary markets can develop more rapidly and improved.

有一个良好的政策环境,房地产,二级和三级市场的发展更加迅速改善。