惡意使用 的英文怎麼說

中文拼音 [ěshǐyòng]
惡意使用 英文
malicious use
  • : 惡構詞成分。
  • : Ⅰ名詞1 (意思) meaning; idea 2 (心愿; 願望) wish; desire; intention 3 (人或事物流露的情態)su...
  • 使 : Ⅰ動詞1 (派遣; 支使) send; tell sb to do sth : 使人去打聽消息 send sb to make inquiries2 (用; ...
  • : Ⅰ動詞1 (使用) use; employ; apply 2 (多用於否定: 需要) need 3 (敬辭: 吃; 喝) eat; drink Ⅱ名...
  • 惡意 : evil [vicious; ill] intentions; ill will; malice; [拉丁語] mala fide
  1. Too often she betrayed this, by the undue vent she gave to a spiteful antipathy she had conceived against little adele : pushing her away with some contumelious epithet if she happened to approach her ; sometimes ordering her from the room, and always treating her with coldness and acrimony

    她對小阿黛勒的心懷,並無端發泄,常常使她在這點上暴露無遺,要是小阿黛勒恰巧走近她,她會言毒語把她攆走,有時命令她離開房間,常常冷淡刻毒地對待她。
  2. When the form of aversive stimulation is unpleasant mental imagery the technique is known as covert.

    使的厭性刺激是引起心理上不愉快的象時,則稱為「隱匿性敏感法」。
  3. So security and safeguarding of information on computer networks has become one of the most import problems, because of the diversity of network ' s connection, the asymmetry of terminal ' s distribution, the interconnection of computer and the attack of hacker, cracker and vicious software. it is more important for military ' s automation commanding network and banks whose network communicates sensitive data. thus we should apply sufficient safeguarding to these networks, otherwise the computer network will be useless, even jeopard the national security

    但由於計算機網路具有連接形式多樣性、終端分佈不均勻性和網路的開放性、互連性等特徵,致使網路易受黑客、駭客、軟體和其它不軌的攻擊,所以網上信息的安全和保密是一個至關重要的問題。對于軍的自動化指揮網路和銀行等傳輸敏感數據的計算機網路系統而言,其網上信息的安全和保密尤為重要。因此,上述的網路必須有足夠強的安全措施,否則該網路將是個無、甚至會危及國家安全的網路。
  4. The unique pattern of campus in northwest is formed by custom, regional feature, and requirements of space users. after investigation and analysis based on this principle, the author summarize the character and limitation in campus, and bring up caused by atrocious weather of northwest china

    基於這一原則,通過對西北地區高校的調研,筆者總結了校園環境中各部分的特點和使中不盡人的地方,並發現一些西北地區劣氣候造成的環境使障礙。
  5. The attitudes offered in the article include : recognize respectively the behaviors of counterfeiting and credit card, cheating and usage of credit card on different occasions ; set an individual crime of malicious overdraft of credit card ; add unit criminal subject of guilty of credit card cheating ; recognize the behavior of stealing and usage credit card as guilty of credit card cheating

    本文的主要觀點:對偽造信卡並使的行為、騙取信卡並使的行為應根據不同情況分別認定;透支型信卡犯罪應獨立成罪;增設信卡詐騙罪的單位犯罪主體;盜竊信卡並使的行為應認定為信卡詐騙罪。
  6. This helps us prevent abuse of this system

    這可幫助我們防止惡意使用本聯系表功能
  7. Eds watch the computer and network traffic for intrusive and suspicious activities, they not only detect the intrusion from the extranet hacker, but also the intranet users

    他對計算機和網路資源上的惡意使用行為進行識別和響應,它不僅檢測來自外部的入侵行為,同時也監督內部戶的未授權活動。
  8. Idss watch the computer and network traffic for intrusive and suspicious activities. they not only detect the intrusion from the extranet hacker, but also the intranet users

    它對計算機和網路資源上的惡意使用行為進行識別和響應,它不僅檢測來自外部的入侵行為,同時也監督內部戶的未授權活動。
  9. Deniad of service

    極為服務拒絕惡意使用
  10. It is no longer possible to use lag as a means to clear the items or isk out of an active trade window, thus robbing your trade partner

    現在不能機器或服務器延遲,將一項進行中交易的isk或者物品清除,從而使交易對方收損。
  11. Evidence of registration and use in bad faith

    B 、注冊和惡意使用的證據
  12. Iii your domain name has been registered and is being used in bad faith

    ( iii )你方的域名已經注冊並正被惡意使用
  13. For the purposes of paragraph 4, the following circumstances, in particular but without limitation, if found by the panel to be present, shall be evidence of the registration and use of a domain name in bad faith

    為證明章節4 ( a ) ( iii ) ,如果下列特別但不僅限的情況被陪審團發現存在,可作為證明域名注冊和惡意使用的證據:
  14. Using dwr. xml to whitelist only those classes and methods you wish to remote avoids accidental exposure of functionality that could be maliciously exploited

    使dwr . xml明確地列出那些想做遠程處理的類和方法,可以避免外地把那些可能被的功能公開出去。
  15. Because the mail merge function in word can allow an access database to run macro code automatically - with no macro protection warnings turned on - malicious users could entice you to open a specially constructed mail merge word document from an e - mail attachment or a link on a hostile web site that might cause arbitrary code to run on your machine

    因為word的合併列印功能會允許access在沒有開啟巨集保護警告的情況下,自動執行巨集程式碼。惡意使用者可以藉此安全性漏洞引導您從電子郵件附件或網站連結開啟特定架構的word合併列印文件,因而導致某種巨集程式碼在您的機器上不受控制地執行。
  16. And you with respect to your use of the site

    對不遵守本聲明或其他違法惡意使用本網站內容者,
  17. By restricting access to these objects, outlook helps to prevent e - mail worms and viruses from using the object model for malicious purposes

    Outlook通過限制訪問這些對象,幫助防止電子郵件蠕蟲和病毒惡意使用對象模型。
  18. The thesis has introduced generally to the classification, development, characteristic and main techniques of intrusion detection system in chapter one

    入侵檢測系統對網路資源上的惡意使用行為進行識別,並為對抗入侵提供重要信息。
  19. A malicious uses might also change the contents of a cookie to pretend that he or she is a different user or that the cookie comes from a different server

    惡意使用還可能更改cookie的內容以假裝他(或她)是其他戶或cookie來自其他服務器。
  20. If your data store is available to other processes, or is visible on an intranet or the internet, the data can be stolen and used maliciously

    如果其他進程可以訪問您的數據存儲區,或是可以在intranet或internet上看到該數據存儲區,數據就可能被竊取,並被惡意使用
分享友人