惡意使用 的英文怎麼說
中文拼音 [ěyìshǐyòng]
惡意使用
英文
malicious use- 惡 : 惡構詞成分。
- 意 : Ⅰ名詞1 (意思) meaning; idea 2 (心愿; 願望) wish; desire; intention 3 (人或事物流露的情態)su...
- 使 : Ⅰ動詞1 (派遣; 支使) send; tell sb to do sth : 使人去打聽消息 send sb to make inquiries2 (用; ...
- 用 : Ⅰ動詞1 (使用) use; employ; apply 2 (多用於否定: 需要) need 3 (敬辭: 吃; 喝) eat; drink Ⅱ名...
- 惡意 : evil [vicious; ill] intentions; ill will; malice; [拉丁語] mala fide
-
Too often she betrayed this, by the undue vent she gave to a spiteful antipathy she had conceived against little adele : pushing her away with some contumelious epithet if she happened to approach her ; sometimes ordering her from the room, and always treating her with coldness and acrimony
她對小阿黛勒的心懷惡意,並無端發泄,常常使她在這點上暴露無遺,要是小阿黛勒恰巧走近她,她會用惡言毒語把她攆走,有時命令她離開房間,常常冷淡刻毒地對待她。When the form of aversive stimulation is unpleasant mental imagery the technique is known as covert.
當使用的厭惡性刺激是引起心理上不愉快的意象時,則稱為「隱匿性敏感法」。So security and safeguarding of information on computer networks has become one of the most import problems, because of the diversity of network ' s connection, the asymmetry of terminal ' s distribution, the interconnection of computer and the attack of hacker, cracker and vicious software. it is more important for military ' s automation commanding network and banks whose network communicates sensitive data. thus we should apply sufficient safeguarding to these networks, otherwise the computer network will be useless, even jeopard the national security
但由於計算機網路具有連接形式多樣性、終端分佈不均勻性和網路的開放性、互連性等特徵,致使網路易受黑客、駭客、惡意軟體和其它不軌的攻擊,所以網上信息的安全和保密是一個至關重要的問題。對于軍用的自動化指揮網路和銀行等傳輸敏感數據的計算機網路系統而言,其網上信息的安全和保密尤為重要。因此,上述的網路必須有足夠強的安全措施,否則該網路將是個無用、甚至會危及國家安全的網路。The unique pattern of campus in northwest is formed by custom, regional feature, and requirements of space users. after investigation and analysis based on this principle, the author summarize the character and limitation in campus, and bring up caused by atrocious weather of northwest china
基於這一原則,通過對西北地區高校的調研,筆者總結了校園環境中各部分的特點和使用中不盡人意的地方,並發現一些西北地區惡劣氣候造成的環境使用障礙。The attitudes offered in the article include : recognize respectively the behaviors of counterfeiting and credit card, cheating and usage of credit card on different occasions ; set an individual crime of malicious overdraft of credit card ; add unit criminal subject of guilty of credit card cheating ; recognize the behavior of stealing and usage credit card as guilty of credit card cheating
本文的主要觀點:對偽造信用卡並使用的行為、騙取信用卡並使用的行為應根據不同情況分別認定;惡意透支型信用卡犯罪應獨立成罪;增設信用卡詐騙罪的單位犯罪主體;盜竊信用卡並使用的行為應認定為信用卡詐騙罪。This helps us prevent abuse of this system
這可幫助我們防止惡意使用本聯系表功能Eds watch the computer and network traffic for intrusive and suspicious activities, they not only detect the intrusion from the extranet hacker, but also the intranet users
他對計算機和網路資源上的惡意使用行為進行識別和響應,它不僅檢測來自外部的入侵行為,同時也監督內部用戶的未授權活動。Idss watch the computer and network traffic for intrusive and suspicious activities. they not only detect the intrusion from the extranet hacker, but also the intranet users
它對計算機和網路資源上的惡意使用行為進行識別和響應,它不僅檢測來自外部的入侵行為,同時也監督內部用戶的未授權活動。Deniad of service
極為服務拒絕用戶惡意使用It is no longer possible to use lag as a means to clear the items or isk out of an active trade window, thus robbing your trade partner
現在不能惡意利用機器或服務器延遲,將一項進行中交易的isk或者物品清除,從而使交易對方收損。Evidence of registration and use in bad faith
B 、注冊和惡意使用的證據Iii your domain name has been registered and is being used in bad faith
( iii )你方的域名已經注冊並正被惡意使用。For the purposes of paragraph 4, the following circumstances, in particular but without limitation, if found by the panel to be present, shall be evidence of the registration and use of a domain name in bad faith
為證明章節4 ( a ) ( iii ) ,如果下列特別但不僅限的情況被陪審團發現存在,可作為證明域名注冊和惡意使用的證據:Using dwr. xml to whitelist only those classes and methods you wish to remote avoids accidental exposure of functionality that could be maliciously exploited
使用dwr . xml明確地列出那些想做遠程處理的類和方法,可以避免意外地把那些可能被惡意利用的功能公開出去。Because the mail merge function in word can allow an access database to run macro code automatically - with no macro protection warnings turned on - malicious users could entice you to open a specially constructed mail merge word document from an e - mail attachment or a link on a hostile web site that might cause arbitrary code to run on your machine
因為word的合併列印功能會允許access在沒有開啟巨集保護警告的情況下,自動執行巨集程式碼。惡意使用者可以藉此安全性漏洞引導您從電子郵件附件或網站連結開啟特定架構的word合併列印文件,因而導致某種巨集程式碼在您的機器上不受控制地執行。And you with respect to your use of the site
對不遵守本聲明或其他違法惡意使用本網站內容者,By restricting access to these objects, outlook helps to prevent e - mail worms and viruses from using the object model for malicious purposes
Outlook通過限制訪問這些對象,幫助防止電子郵件蠕蟲和病毒惡意使用對象模型。The thesis has introduced generally to the classification, development, characteristic and main techniques of intrusion detection system in chapter one
入侵檢測系統對網路資源上的惡意使用行為進行識別,並為對抗入侵提供重要信息。A malicious uses might also change the contents of a cookie to pretend that he or she is a different user or that the cookie comes from a different server
惡意使用還可能更改cookie的內容以假裝他(或她)是其他用戶或cookie來自其他服務器。If your data store is available to other processes, or is visible on an intranet or the internet, the data can be stolen and used maliciously
如果其他進程可以訪問您的數據存儲區,或是可以在intranet或internet上看到該數據存儲區,數據就可能被竊取,並被惡意使用。分享友人