open attack 中文意思是什麼

open attack 解釋
拉開進攻
  • open : adj 1 開著的,開放的;可進入的,可分享的 (to); 無蓋的,敞口的;敞開的;展開的;開的;開闊的,開...
  • attack : vt 1 攻擊 (opp defend)。2 非難,抨擊。3 著手,動手,投入。4 (疾病)侵襲。5 【化學】腐蝕。n 1 ...
  1. Iron rusts at its exposure to the open air on account of the corrosion made by the destructive chemical attack of a l coming into contact with such media as air , water and moisture

    金屬在接觸空氣、水和濕氣等介質時會受到破壞性的化學侵蝕,由於這種腐蝕,鐵暴露在露天時要生銹。
  2. Iron rusts at its exposure to the open air on account of the corrosion made by the destructive chemical attack of a metal coming into contact with such media as air , water and moisture

    金屬在接觸空氣、水和濕氣等介質時會受到破壞性的化學侵蝕,由於這種腐蝕,鐵暴露在露天時要生銹。
  3. The piecemeal engineer can attack his problem with an open mind as to the scope of the reform.

    漸進工程師可以在改革的范圍中不抱成見地提出自己的問題。
  4. She was as open as the day, and this attack from the people who skulked in darkness make her ill.

    她象白晝一樣光明磊落,但躲在陰暗角落裡的人們的攻擊使她病倒了。
  5. To capture a heart unused to attack is like walking into an open, undefended city

    贏得一顆沒有談過戀愛的心,這就等於進入一個沒有設防的城市。
  6. The more name variations that are allowed, the more open the web site is to a dictionary attack

    允許使用的名稱形式越多, web站點受到字典攻擊的可能性就越大。
  7. Being a widely utilized public ip platform, it is susceptible to security attacks of all nature, as outlined in the following areas : the open nature of the ip internet systems - increase of foreign attacks, for example dos / ddos attacks ; the current weakness of the existing operating system ' s internet protocol ; mainframe, and lack of an evaluation standard for back office systems, the inevitable problem of illegal internal access, the lack of guidelines for record keeping and post attack documentation processes, hi addition, still in existence, are managerial problems including the lack of securit y knowledge amongst the workforce and the inexistence of a complete set of security guidelines. to guarantee china telecom ' s 163 / 169 system ' s reliable functions, to protect the user ' s interests, at the same time, insuring quality service, it is necessary to adapt p2dr model as a solution to the current security issues. supported by the modern secure theory and made the secure implementation abundant project practices, this paper gives the general secure design for the chongqing public ip network using p2dr secure model

    中國電信建設的公眾ip網對我國internet的發展起著決定性作用,重慶電信163 / 169網際網路是國家骨幹網在本地的延伸,擁有7個核心節點(採用cisco12012 、 2 * 2 . 5gdpt環) ,三十八個匯接節點,能提供寬帶,窄帶多種接入方式的公眾ip網,現擁有近20萬用戶,佔全市網際網路用戶四分之三以上,作為這樣一個擁有眾多用戶,開放的ip平臺,會受到各種各樣的安全威脅,主要表現在ip網路的開放性,來自外部的攻擊增多,如dos / ddos攻擊;所使用的操作系統運行的網路協議自身的脆弱性;主機、網路設備的配置是否缺乏評估手段;不可避免的內部非法訪問;缺乏必要的攻擊審計作為犯罪取證,出此之外,還有管理上的一些問題,如人員安全意識不強,安全制度不夠健全等多方面原因。
  8. Open mouth - shaped float resists water attack

    敞口形的浮子抗水擊。
  9. This might break the response but should not open attack vectors against the client

    這可能會破壞響應,但不應讓從客戶端發起的攻擊有機可乘。
  10. Attack in open order

    疏開突擊
  11. Internet worms are difficult to eliminate because internet is an open and complex scale - free system, and there are a mass of vulnerable nodes, which are absent of managing and defending. if these nodes are infected with worms, worms will be left on them and may attack the other nodes on internet

    網路蠕蟲之所以難于控制主要是由於internet本質上是一個開放的復雜巨系統,其結構復雜,缺乏中心控制能力以及其開放性的特徵導致存在大量網管層面上的不可控節點。
  12. Open to the objection common to all forms of attack with the raised arm, in that they leave the attacker wide open

    手臂輪起時,對所有形式的攻擊都露出破綻,使得攻擊者門戶大開。
  13. All the following, good as some of them are, are open to the objection that while attempting to apply them, you make yourself vulnerable to attack

    所有下面這些技術,有些很不錯,但在嘗試使用它們時會露出破綻,你會使自己易於被攻擊。
  14. The rockets, which had been struggling to knock down open jumpers, blasted the memphis grizzlies 105 - 92 on wednesday night, riding a balanced scoring attack and a triple - double from mcgrady

    火箭最近一直在為空位投籃而掙扎,但星期三晚對灰熊一戰,他們105 92把對方打爆。不但攻守平衡,而且麥迪搶下3雙。
  15. Maloude played wide left of the attack and won the penalty that was converted by zinedine zidane to open the scoring although his side would ultimately lose on a shoot - out

    馬盧達在作為左邊鋒出場並贏得了最後由齊達內打入的那個點球,盡管他的隊伍最後在點球決勝中輸掉了比賽。
  16. But, the patient if because age is old, or it is to contract the disease with meeting immunize low function ( be like : diabetic, aids ) when, will make hepatic defence function is reduced, and the condition that makes liver exposeds to the open air wu yi suffers attack

    但是,病人假如因為年紀大,或是患有會使免疫功能低下的疾病(如:糖尿病、 aids等)時,將會使肝臟的防禦功能降低,而使肝臟曝露于易受攻擊的狀態。
  17. And introduces the authentication centre ( ca ) for allocation and conservation of the secret key. the authentication centre uses a time - stamp, which proves the watermark embedded time and resists the interpretation attack effectively. at the same time, a trusted third party ( ttp ) is introduced to the open watermark, which brings out a feasible standard watermark model for the author, user and the authentication

    最後,提出了一個完整的版權保護的水印框架,其中引入了分配和保存密鑰的認證中心,該認證中心還有提供時戳的能力,有力地證明了水印嵌入時間,能有效地抵抗解釋攻擊;同時為水印的公開化引入了可信任第三方,為商家、用戶和認證之間提出了一個可行的規范的水印模型;並從理論上分析了該模型的抗攻擊能力。
  18. If iran agreed to halt its uranium and plutonium activities, and america agreed not to attack, might that open the way to direct talks that could help finesse the nuclear problem for good

    如果伊朗同意停止提煉鈾和鈈的活動,而美國也同意不發動攻擊,或是打開直接談判的大門,也許會把這個核問題化害為利。
  19. According to a scientific report, planet earth ' s computers are wide open to a virus attack from little green men

    根據科學報告,地球的電腦對小綠人的病毒攻擊鄭敞開大門。
  20. In this position, our ships lie open to attack

    在這個位置,我們的船易受攻擊。
分享友人