受攻击
- 与 受攻击 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
On the Internet, a packet monkey is someone who intentionally inundates a Web site or network with data packets, resulting in a denial-of-service situation for users of the attacked site or network.
包猴 在因特网上,包猴是指一类人,他们故意用数据包淹没网站或网络,对受攻击的网站或网络的用户而言,造成拒绝服务的情景。
-
Packet Monkey On the Internet, a packet monkey is someone who intentionally inundates a Web site or network with data packets, resulting in a denial-of-service situation for users of the attacked site or network.
包猴 在因特网上,包猴是指一类人,他们故意用数据包淹没网站或网络,对受攻击的网站或网络的用户而言,造成拒绝服务的情景。
-
We will be ever vigilant and never vulnerable, and we will fight our wars against poverty, ignorance and injustice, for those are the enemies against which our force can be honorably marshaled
我们将永远保持警惕,永远不会易受攻击,我们将向贫困、愚昧和非正义开战,因为这些是可以光荣地使用我们的力量去对付的敌人。
-
Army types often claim that when most of the Palestinian militant groups declared a ceasefire early last year, in a deal with Mahmoud Abbas, the Palestinian president, it was partly because they wanted to take the heat off themselves—and their ever-vulnerable leaders.
军方宣称,之所以去年大多数的巴勒斯坦武装组织能在巴勒斯坦总统阿巴斯的领导下宣布停火,部分的原因就是希望能防止他们特别是他们那些易受攻击的领导人们引火烧身。
-
Vulnerable to larger fishes, otters, bears, and fish-eating birds.
更多的鱼类、水獭、熊,和吃鱼的鸟易受攻击。
-
Fortresses can take damage during attacks and will need to be repaired.
要塞在受攻击期间会损坏,因此需要进行修补。
-
Every city cataloged its targets; residents looked at their skylines, wondering if they would be different in the morning.
每座城市都列出了可能受攻击的建筑,市民们呆呆地望着地平线上高楼的轮廓,猜测明早是不是会看到完全不同的景象。
-
Anxiety about the vulnerability of oilfields sundered the region into American and Soviet camps, and the cold war's end brought the briefest respites.
阿拉伯人担心油田易受攻击,纷纷加入美苏两大阵营,冷战结束后的缓解也转瞬即逝。(拆成短句稍好点,lz再斟酌。
-
But even in countries without extremist parties on the left or the right, politicians will be tempted to deflect the voters' wrath away from their corporate paymasters and towards an easier target—" foreigners" of all types.
但即使是在无极左或极右党派的国家,政治家亦倾向于将选民的愤怒从公司发薪人员身上移开,而转向一个更易受攻击的目标——所有的&外国人&。
-
This paper starts with latent exposure to attack the network of government organization, combining the experience and the technology of network safety management, discusses the feasibility and correlation for strengthening self guard configuration and utilizing safe reinforcing cover to find the solution scheme that suits the network safety of government organization.
该文从政府机关网络易受攻击的潜在暴露点入手,结合网络安全管理的技术和经验,对强化自身的防范配置、运用安全加固套件的可行性和相关性进行了研究和探讨,以求找到适合于政府机关网络安全的解决方案。
- 推荐网络例句
-
This one mode pays close attention to network credence foundation of the businessman very much.
这一模式非常关注商人的网络信用基础。
-
Cell morphology of bacterial ghost of Pasteurella multocida was observed by scanning electron microscopy and inactivation ratio was estimated by CFU analysi.
扫描电镜观察多杀性巴氏杆菌细菌幽灵和菌落形成单位评价遗传灭活率。
-
There is no differences of cell proliferation vitality between labeled and unlabeled NSCs.
双标记神经干细胞的增殖、分化活力与未标记神经干细胞相比无改变。