漏碼 的英文怎麼說

中文拼音 [lóu]
漏碼 英文
drop-out
  • : Ⅰ動詞1 (從孔或縫中滴下、透出或掉出) leak; drip 2 (泄漏) divulge; disclose; leak 3 (遺漏) le...
  • : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
  1. We are not allow to divulge our guest ' s room number

    我們不允許?客人的房間號
  2. Faria, the worthy master of the young amelia the name of the genoese tartan knew a smattering of all the tongues spoken on the shores of that large lake called the mediterranean, from the arabic to the proven ? al, and this, while it spared him interpreters, persons always troublesome and frequently indiscreet, gave him great facilities of communication, either with the vessels he met at sea, with the small boats sailing along the coast, or with the people without name, country, or occupation, who are always seen on the quays of seaports, and who live by hidden and mysterious means which we must suppose to be a direct gift of providence, as they have no visible means of support

    少女阿梅麗號這艘熱那亞獨桅船的船名上這位可敬的船長,雖然沒受過法利亞神甫的教導,卻幾乎懂得地中海沿岸的各種語言,從阿拉伯語到普羅旺斯語,都能一知半解地說上幾句,所以他不必僱用翻譯,多一個人總是多一個累贅,而且常常多一個泄秘密的機會。這種語言上的能力,使他和人交換信息非常方便,不論是和他在海上所遇到的帆船,和那些沿著海岸航行的小舟,或和那些來歷不明的人,這種人,沒有姓名,沒有國籍,沒有明白的稱呼,在海口的頭上可以看到他們,他們靠著那種秘密的經濟來源生活,而由於看不出他們經濟的來源,我們只能稱他們是靠天過活的。
  3. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  4. Changing vt byref variants in managed code could lead to a memory leak

    變更managed程式中可能造成記憶體遺memory leak的vt byref變數。
  5. Zero - day attacks are ones that take place between the time of an exploit ' s publication and the release of the initial patch or antivirus / malware signature

    零日攻擊發生於洞公布日到發布補丁或反病毒/惡意軟體特徵日之間。
  6. This paper, combined with the task and based on the thorough analyses of the theories and methods of data compression, realize the data compression of the mfl inspection data using huffman coding and wavelet transform coding

    本文結合課題,在對數據壓縮的原理和方法進行深入分析的基礎上,分別利用霍夫曼編和小波編等方法實現了管道磁檢測數據的壓縮。
  7. Used properly - with a key of sufficient length and an encryption mode that doesn t leak information about the plaintext - most modern algorithms are reasonably safe against cryptanalytic attacks

    如果使用得當使用足夠長的密鑰和不會泄關于明文的信息的加密方式大多數現代演算法在密分析攻擊面向都有一定的安全性。
  8. They never changed things this much before until now, just after they got the leaked source. congratulations again to the leaker, for causing problems to the scene

    在他們得到泄的源代之前,這些從來沒有改變過,祝賀泄者,給破解界帶來了現在的問題。
  9. Thanks to the leaker of the oe code, sony has done several changes in the loadcore module ( the most important that oe / m33 patches ), and done some attacks against the oe / m33 core, such as the change of the nids that they use

    感謝oe源代的?者,新力已經在裝入系統核心的模塊中做了幾處改變(這是對目前的自製系統最關鍵的部分) ,並且加入了對自製系統進行攻擊的部分,比如改變了他們所使用的調用。
  10. The following code demonstrates how the cursor changes appearance when it passes over a text box control at run time, replacing the default arrow with an hourglass cursor

    下面的代演示如何通過將默認箭頭替換為沙光標,在運行時更改光標經由文本框控制項時的外觀。
  11. With jiangmin firewall protection, users do not have to worry about internet account, qq passwords, account numbers game, game equipment, bank account, e - mail passwords, personal privacy and other important personal information leakage

    有了江民防火墻的保護,網民再不必擔心上網帳號、 qq密、游戲賬號、游戲裝備、銀行帳號、郵件密、個人隱私及其他重要個人信息的泄
  12. On the basis of the safety system engineering theory. applying the dow fire & explosion index and the normal stability gauss mathematical diffusion model etc., combining with the practice of mouping port, the hazards during the handling and storage of liquid chemicals in bulk have been analyzed and the risks of fire explosion and leakage ( including water pollution and water pollution ) have been assessed. taking into account of insufficient consideration of the human factor in the dow fire & explosion index, the soft compensation coefficient has been raised

    本文以安全系統工程為理論基礎,運用道氏火災爆炸指數法、平均運動方程組以及常穩態高斯數學擴散模型,結合牟平港散化運輸、裝卸的實際,對牟平港散化儲運的火災爆炸危險性和毒物泄危險性(包括水污染性和大氣污染性)進行了定性和定量的分析評價。在評價程序上,針對道氏火災爆炸指數法中對人為因素和管理水平等考慮不足的問題,提出了軟補償系數的概念,找出了散化頭日常監督管理工作的重點。
  13. Microsoft has released a patch that eliminates a security vulnerability affecting customers using microsoft windows 2000. the vulnerability could allow enable a malicious user to potentially run code on another users machine

    如果用心不良用戶在電子郵件中發送某個調用activex控制項的url ,它可以利用此洞並通過緩沖區溢出使代運行。
  14. However, an additional variant of the vulnerability was subsequently identified, and on october 30, 2000, the bulletin was updated to advise customers of the availability of an updated patch. the updated patch eliminates all known variants of the vulnerability

    如果用心不良的用戶成功利用了該洞,則由服務器控制的web站點會被用來運行代,轉發信息,並要在所有訪問用戶的計算機上讀取和寫入cookies 。
  15. In charge of one of major subjects of the national eighth five - year plan, i. e. " study on shotcreting techniques of polyacrylate emulsion cement mortar for impermeability coating of pu ding rcc dam ", the achievement of which has been appraised by the ministry of electric power and evaluated as reaching national leading level. 2. in charge of the major subject aided by the committee of national natural science funds, " study on durability of high bolumes of fly ash concrete ", the first phase achievement of which has been commended by the committee. 3. in charge of one of major subjects of the national ninth five - year plan, i. e. " study on high performance concrete in marine engineering, design and construction ". 4. acting as one of editors - in - chief of " technical specification for abrasion and cavities resistance of concrete in hydraulic structures ", which is issued by the ministry of water resources. 5. by providing the repairing and strengthening schemes on seepage and cracks of the basement of nanjing lukou international airport, the air traffic opening of the airport was ensured as scheduled. 6. consulting services on techniques of high performance and abrasion - erosion resistance concrete for three - gorges project, anti - corrosion of reinforced concrete strutures for the ore port of shanghai baoshan iron and steel works, mass fly ash concrete for jiangyin yangtze river bridge and pumping concrete for nanjing yangtze river second bridge

    主持國家「八五」攻關項目「普定碾壓混凝土壩上游面丙乳砂漿防滲層大面積施工工藝研究」 ,成果通過部級鑒定,評價屬國內領先水平; 2 .主持國家自然科學基金重大項目「高摻量粉煤灰混凝土的長期性能研究「 ,階段成果獲國家自然科學基金委通報表彰與獎勵; 3 .主持國家「九五」攻關項目「海工高性能混凝土成套技術研究」 ; 4 .水利部「水工混凝土抗沖磨防空蝕技術規范」的主編之一; 5 .為南京祿口國際機場地下室修與裂縫補提出技術方案被采納並實施,為機場如期通航作出貢獻; 6 .為三峽工程抗沖磨高性能混凝土技術、上海寶鋼礦石頭鋼筋混凝土防腐蝕技術、江陰長江大橋大體積粉煤灰混凝土技術、南京長江二橋泵送混凝土技術等提供咨詢建議。
  16. Generally, mathematical theory and deduction are used to explore the weakness of cryptographic algorithms, so that the complicated mathematical knowledge and enormous consumption are needed. at the same time, as a result of the design scientifically, there is no practical significance to conquer the cryptographic algorithm by mathematical methods

    長期以來,人們一直專注于使用數學方法尋找密演算法的洞,這不僅需要極高的數學造詣而且會耗費巨大的資源;同時,由於密演算法的科學設計,從數學角度破譯密演算法基本不具有現實意義。
  17. Sometimes a fatal inconsistency or omission is at fault, but more often the overall design is vague and poorly thought out

    有時是因為程式不一致或缺而造成錯誤,但更普遍的情況是整體設計不夠明確或是思慮不周。
  18. The total area of our company is about 50 thousands sq. m, in which there are four workshops. now we have three series of products and mainly serve for petroleum chemical army aviation municipal and other oil gas storage and transportation industry

    公司生產的產品有:頭用輸油臂汽車,火車鶴管大鶴管零泄導軌閥門等,產品遍布全國31個省市,並遠銷至斯里蘭卡蘇丹等國,顧客反映良好。
  19. If the remedy is anticipated to be very long, the alternative is to include information about where the remedy can be downloaded to fix the vulnerability

    如果預先考慮到補救代會很長,那麼也可以包含一些信息來說明在何處可以下載到補救代來修改洞。
  20. Code missing phenomenon

    漏碼現象
分享友人