攻击
- 与 攻击 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
The protocol can effectively prevent against the collusion attacking by buyer and the third party, the collusion attacking by seller and the third party, and the intermediate personate attacking.(3) A new buyer-reseller watermarking protocol is proposed in the thesis.
提出了一种新的交互式买方—卖方数字水印协定,通过采取新的水印嵌入和加密计划,有效地阻止了买方与第三方、卖方和第三方的合谋攻击,以及中间人攻击。
-
Some program language have pestilent bug, for example, C program language doesn't check the border of the array of number is apt to cause the buffer overflow, and therefore possibly cause the failure of program processing and paralysis of computer.
缓冲区溢出指的是一种常见且危害很大的系统攻击手段,通过向程序的缓冲区写入超出其长度的内容,造成缓冲区的溢出,从而破坏程序的堆栈,使程序转而执行其他的指令,以达到攻击的目的。
-
In the orient young bulls are tested for the fight arena in a certain manner. Each is brought to the ring and allowed to attack a picador who pricks them with a lance. The bravery of each bull is then rated with care according to the number of times he demonstrates his willingness to charge in spite of the blade.
在古老的东方,挑选用于格斗的小公牛时,它们被带进场地,向手持长矛的斗牛士攻击,裁判以它受到攻击后再向斗牛士进攻的次数多寡来评定这只公牛的勇敢程度。
-
On account of his severity in dealing with the half Christian Humanists of the Curia he has been attacked with savage bitterness by Platina, one of the dismissed officials, in his Lives of the Popes ,2 but nobody is likely to be deceived by scurrilous libels, the motives of which are only too apparent.
出于对他对于元老院半天主教人文主义者的铁腕手段的不满,一位被解雇的官员普纳提拿在他的著作《教皇生活》中,对教皇作出了恶毒攻击,但这种恶毒攻击并不能混淆视,因为作者的动机实在太明显了。
-
When the victim of this spell attacks others with a ranged attack, her targets gain their Defense (even if the attack is not at pointblank range).
当这个法术的受害者用远程攻击别人时,她的目标能够获得防御(就算这个攻击不在近程射击的范围内)。
-
Grand Cross is influenced by both the physical attack power and magical attack power of the user.
Dr.eye:壮丽的十字架受用户的物理攻击权力和魔术的攻击能力的影响。
-
Using a limited form of precognition, zealots can even predict enemy movements striking, with deadly accuracy and dodging attack***y inches.
狂热者还会运用他们有限的预知能力判断敌人的移动和攻击,从而给予致命的精确的近距离攻击。
-
This may potentially allow attackers to preform a cross site scripting attack.
这样会潜在的让攻击者构造一个跨站脚本攻击。
-
Otherwise, thoughts of attack and counter-attack will preoccupy him and people his entire world.
否则,攻击与反攻击的念头便会盘踞他及他整个周遭世界。
-
The exaggerations of a few Probabilists who went too far in their laxity, gave an opportunity to the Jansenists to attack the system, and soon a number of scholars, notably among the Dominicans abandoned Probabilism, which they had defended till then, attacked it and stood up for Probabiliorism; some Jesuits also opposed Probabilism.
的夸张少数Probabilists谁走的太远的松懈,给了一个机会向詹森主义者攻击的系统,不久的一些学者,特别是在被遗弃的或然论道明,他们到了捍卫然后,攻击,并站起来为Probabiliorism ;一些耶稣也反对或然论。
- 推荐网络例句
-
However, as the name(read-only memory)implies, CD disks cannot be written onorchanged in any way.
然而,正如其名字所指出的那样,CD盘不能写,也不能用任何方式改变其内容。
-
Galvanizes steel pallet is mainly export which suits standard packing of European Union, the North America. galvanizes steel pallet is suitable to heavy rack. Pallet surface can design plate type, corrugated and the gap form, satisfies the different requirements.
镀锌钢托盘多用于出口,替代木托盘,免薰蒸,符合欧盟、北美各国对出口货物包装材料的法令要求;喷涂钢托盘适用于重载上货架之用,托盘表面根据需要制作成平板状、波纹状及间隔形式,满足不同的使用要求。
-
A single payment file can be uploaded from an ERP system to effect all pan-China RMB payments and overseas payments in all currencies.
付款指令文件可从您的 ERP 系统上传到我们的电子银行系统来只是国内及对海外各种币种付款。