受攻击
- 与 受攻击 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
Attack Dog IVFs are not effective due to a short stun time and high vulnerability to most units.
攻击狗IFV由于很短的晕眩时间和易受大多数单位的攻击特性,没有那么有效。
-
Stave Crasher is influenced by both the users physical attack power and magical attack power.
Dr.eye:应急窄板受那些用户物理攻击权力和魔术的攻击权力的影响。
-
If attack is aimed at IP, want you to be on lead plane of a physics only, what atttack without giving thought to is you which IP, bear so actually those who atttack discharge is same a net card, handling those who atttack a request is same a CPU, same a memory, to fictitious lead plane, the resource of physical lead plane can be eroded certainly, how the likelihood is insusceptible.
攻击如果是针对IP的,只要你在一台物理主机上,不管攻击的是你哪个IP,那么实际承受攻击流量的是同一个网卡,处理攻击请求的是同一个CPU,同一条内存,对于虚拟主机来说,物理主机的资源一定会遭到侵蚀,怎么可能不受影响呢。
-
Grand Cross is influenced by both the physical attack power and magical attack power of the user.
Dr.eye:壮丽的十字架受用户的物理攻击权力和魔术的攻击能力的影响。
-
This is a problem as it a means that from the start of a technique the nage is being re-active to the uke and b if the attacker chooses to utilize less than fully committed techniques such as feints, the uke can cause the nage to move as he wishes and then suddenly change the attack, thereby making the nage's attempted technique incorrect.
这是一个很大的问题,它代表著 a 从一开始取方的技法就只能受制於受方做反应,以及 b 受方可以不尽全力用假攻击来骗取方,在取方被落进受方的圈套之后改变攻击方式,这样会让取方想做的技法变失效
-
Techniques against information obscurity Disassemble, decompile, or reverse engineering Fault injection – the technique of providing a program input that it does not expect. Fuzzing – the attacker's process of systematically trying various input string that may result in an exploit. Blackmail or buy off insiders. If you want your systems to be more secure, you may want to assume that the attacker knows exactly how the target system works.
用来对付资讯隐匿的技术反组译、反编译、或逆向工程错误注入–提供程式不受预期的输入模糊化–攻击者透过系统化的方式尝试各种输入的组合,其结果可能导致成功的攻击威胁或是收买内部人员如果你希望系统更加安全,你必须假设攻击者针对系统的了解跟你一样深入。
-
Itll fight if it has to, but its vulnerable out in the open.
在必须的时候它会发威,但它在野外易受攻击。
-
But some technophiles have accused Cisco of trying to suppress news of its routers' vulnerabilities, a charge that led to an ugly scene at a recent Internet security conference sponsored by an organization known as Black Hat.
但有些技术爱好者指责Cisco企图压制对其路由器易受攻击的报道。在最近由Black Hat组织的互联网安全会议上,这一指控造成了非常不愉快的一幕。
-
The alliance developed contingency plans to defend Poland, and is extending them to protect the vulnerable Baltic states.
北约制定了各种应急方案来保卫波兰,并扩大这些方案来保护易受攻击的波罗的海各国。
-
This also is a place which in the Holy Bible most receives attacks.
这也是圣经中最受攻击的一个地方。
- 推荐网络例句
-
This one mode pays close attention to network credence foundation of the businessman very much.
这一模式非常关注商人的网络信用基础。
-
Cell morphology of bacterial ghost of Pasteurella multocida was observed by scanning electron microscopy and inactivation ratio was estimated by CFU analysi.
扫描电镜观察多杀性巴氏杆菌细菌幽灵和菌落形成单位评价遗传灭活率。
-
There is no differences of cell proliferation vitality between labeled and unlabeled NSCs.
双标记神经干细胞的增殖、分化活力与未标记神经干细胞相比无改变。