惡意動機 的英文怎麼說

中文拼音 [ědòng]
惡意動機 英文
malicious motive
  • : 惡構詞成分。
  • : Ⅰ名詞1 (意思) meaning; idea 2 (心愿; 願望) wish; desire; intention 3 (人或事物流露的情態)su...
  • : machineengine
  • 惡意 : evil [vicious; ill] intentions; ill will; malice; [拉丁語] mala fide
  1. So security and safeguarding of information on computer networks has become one of the most import problems, because of the diversity of network ' s connection, the asymmetry of terminal ' s distribution, the interconnection of computer and the attack of hacker, cracker and vicious software. it is more important for military ' s automation commanding network and banks whose network communicates sensitive data. thus we should apply sufficient safeguarding to these networks, otherwise the computer network will be useless, even jeopard the national security

    但由於計算網路具有連接形式多樣性、終端分佈不均勻性和網路的開放性、互連性等特徵,致使網路易受黑客、駭客、軟體和其它不軌的攻擊,所以網上信息的安全和保密是一個至關重要的問題。對于軍用的自化指揮網路和銀行等傳輸敏感數據的計算網路系統而言,其網上信息的安全和保密尤為重要。因此,上述的網路必須有足夠強的安全措施,否則該網路將是個無用、甚至會危及國家安全的網路。
  2. Desert and oasis ecosystem are the main ecosystems in arid area. studying the characteristics of decaying process, decaying remainders and soil humic acids can accumulate the first hand data for studying the accumulation and decomposition of soil organic matter, the situation of soil fertility, substance cycling and energy flowing in desert - oasis ecosystem, and has the great significance on desert ecosystem restraint and oasis ecosystem extension

    研究荒漠綠洲生態系統中植物殘體在土壤中的腐解過程及腐解物和腐殖物質的特徵,可為研究荒漠綠洲生態系統中土壤有質的累積和分解、土壤肥力狀況和荒漠綠洲生態系統的物質循環和能量流積累寶貴的第一手資料,對于抑制荒漠生態的化,促進綠洲生態的發展具有重要義。
  3. He says it " thinketh no evil ". it doesn ' t judge others and attach bad motives to their actions

    他說: "愛是不計算人的" 。就是不論斷人,不臆想別人的行為中有
  4. Eds watch the computer and network traffic for intrusive and suspicious activities, they not only detect the intrusion from the extranet hacker, but also the intranet users

    他對計算和網路資源上的使用行為進行識別和響應,它不僅檢測來自外部的入侵行為,同時也監督內部用戶的未授權活
  5. Idss watch the computer and network traffic for intrusive and suspicious activities. they not only detect the intrusion from the extranet hacker, but also the intranet users

    它對計算和網路資源上的使用行為進行識別和響應,它不僅檢測來自外部的入侵行為,同時也監督內部用戶的未授權活
  6. To help protect computer systems from malicious mobile code, to allow code from unknown origins to run with protection, and to help prevent trusted code from intentionally or accidentally compromising security, the. net framework provides a security mechanism called code access security

    為了幫助保護計算系統免受代碼的危害,讓來源不明的代碼安全運行,防止受信任的代碼有或無地危害安全, . net framework提供了一種稱為「代碼訪問安全性」的安全制。
  7. Over the years, lrt technology has been upgraded to counter the negative effects of traffic jams, noise, environmental damage, air pollution, etc. featuring a small radius of curvature, multiple car units, modulated train set, enlarged cars both in transverse and longitudinal directions, low car floors, streamlined car design, advanced control systems, and flexible right of way, modern lrt systems have been successfully adopted to most environmental and social needs. they adequately display their merits as transportation systems ; i. e., the lrt system is able to co - exist with automobiles. the low car floor means that roads can act as station facilities, and passengers can get on and off the cars in the street

    輕軌運輸系統lrt源起於歐洲街道電車street car ,街道電車一度在都市捷運化與私人化的浪潮沖擊下迅速沒落,但隨著都會地區車輛不斷增加,道路交通阻塞噪音環境破壞排放廢氣污染問題嚴重化之際,輕軌車輛技術已不斷提升,具備小轉彎半徑能力的聯結式車廂模組化列車編組車廂斷面長度加大加長低地板車廂流線型車廂設計,搭配先進控制系統及彈性的路權型式,使現代化輕軌系統具備有與生活空間結合重視環境問題與社會情勢並活用進化街車之都市交通工具等特徵與優點,如高性能輕軌列車與汽車共存,低底盤的車廂創造無障礙車站空間,道路即是車站設備,旅客可以在街區上下車,提供沿線居民高度的便利性,消除交通堵塞噪音及空氣污染等,輕軌系統並與街景充分的調和,成為活的都市象。
  8. Davoust gave himself that satisfaction when balashov was brought in. he appeared even more deeply engrossed in his work when the russian general entered, and glancing through his spectacles at the face of balashov, who looked cheerful from the brightness of the morning and his talk with murat, he did not get up, did not stir even, but scowled more than before, and grinned malignantly

    俄國將軍進來時,他卻更專心一地作自己的事,他透過眼鏡掃了一眼巴拉瑟夫那由於美麗早晨和與繆拉談話的美好感受而生勃勃的臉,他沒有站起來,甚至也沒一下,還把眉頭皺得更緊,毒地冷冷一笑。
  9. This vulnerability exists because internet explorer does not handle mime multipurpose internet mail extensions headers in html e - mails correctly. if a malicious user sends an affected html e - mail or hosts an affected e - mail on a web site, and a user opens the e - mail or visits the web site, internet explorer automatically runs the excecutable on the user s computer

    如果用戶發送被侵襲的html電子郵件或在web站點上寄放被侵襲的電子郵件,而某個用戶打開了該電子郵件或訪問了該web站點,則internet explorer將自在此用戶的計算上運行該可執行文件。
  10. An account of the basic concept, position and function of production management in an enterprise is given, the significance of production management when a company make efforts to create a good environment for it ’ s existence and development is shown ; through introducing the environment and situation faced by our country ’ s private enterprises, analyzing the problems on gao long ’ s production management, the opportunities and challenges faced by gao long company when it intends to improve it ’ s management level and to get itself developed forward are revealed. the nice future created by rapid development of our country ’ s economy for special vehicle components manufacturers which include gao long company is estimated, the threat

    本章先闡述生產管理在企業中的地位和作用?生產管理對于企業獲取競爭優勢,贏得良好生存和發展空間的重要義,在對我國專用車生產現狀?市場發展前景及公司生產管理中存在的問題進行歸納和總結的過程中,揭示出高龍公司提高生產管理水平?推自身向前發展所面臨的困難,展現因我國經濟快速發展給包括高龍公司在內的專用車生產企業所創造的良好市場前景,同時也指出由於競爭環境的化?生產技術及管理水平落後而導致競爭力削弱給高龍公司所帶來的遇和挑戰,以此強調生產管理模式改進的必要性和緊迫性。
  11. The initial patch updated jet 3. 51 and associated odbc database drivers which eliminated the vulnerability that could be exploited using an excel 97 query to do malicious acts, such as deleting files or updating text files on a user s machine

    本修補程序對jet 3 . 51及相關的數據庫驅程序進行了更新,從而消除了能利用這一缺陷在excel 97查詢功能中進行諸如刪除用戶器上文件或更新文本文件等操作的隱患。
  12. It is not only discerns and responds to computer and network hostile behavior of resource but also measure external invasion behavior and supervise inside mandate activity of user at the same time, before network resource is endangered and intercepted

    它對計算和網路資源上的行為進行識別和響應。它不僅檢測來自外部的入侵行為,同時也監督內部用戶的未授權活,並在網路資源受到危害之前通過對防禦體系自配置進行攔截和響應。
  13. Malicious code executing on the same computer could use this as the basis of a denial - of - service attack

    在同一計算上執行的代碼可能以此作為一個切入點來發拒絕服務攻擊。
  14. When people are accessing corporate resources in a different way than they usually do, malicious hackers may try to piggyback on the unusual situation and seize that moment to launch attacks against corporate networks and computers

    當人們使用和平時不一樣的方法訪問企業資源的時候,黑客可能試圖藉助不尋常的情況,並抓住這一時對企業網路和計算的攻擊。
  15. Jan volzke, an executive at mcafee, says some mobile - phone companies now implant virus protection directly in handsets but adds that the vast majority of users remain vulnerable

    公司和服務提供商正在努力堵截手軟體。麥卡菲公司的一名執行官詹瓦爾扎克說,有些移
  16. We should, according to the ways of takeover, define the role and actions of the controlling shareholders of target company to stipulate the concrete content of the fiduciary duty of the controlling shareholders of target company : trust duty consists of proper investigation duty and information disclosure duty ; faithful duty mainly includes restriction of interrelated deal and forbidding the cooperate action with impure motives in takeover by agreement, forbidding squeeze ? out takeover with evil will and forbidding the controlling right in unfairly high price. stipulating the corresponding civil law regulation to the controlling shareholders ’ violation to the fiduciary duty is the valid legal guarantee to the cooperation ’ s interests and other minor shareholders ’ interests and rights, mainly in two ways : precautionary system and the system after violation

    我國上市公司收購類型主要是協議收購和要約收購,其中以協議收購為主,應以此鎖定目標公司控股股東的角色和行為,設定其對公司和少數股東的誠信義務內容:注義務在公司收購中主要表現為合理調查義務和信息披露義務;忠實義務在協議收購中主要表現為限制關聯交易和禁止不純的公司行為,在要約收購中主要表現為禁止排擠式收購和禁止不正當溢價出讓控制權。
  17. But madoka felt from this man s voice that he would never do something with such malice

    但是阿圓卻感到了這個男人的聲音並沒有什麼什麼惡意動機存在。
  18. Because the mail merge function in word can allow an access database to run macro code automatically - with no macro protection warnings turned on - malicious users could entice you to open a specially constructed mail merge word document from an e - mail attachment or a link on a hostile web site that might cause arbitrary code to run on your machine

    因為word的合併列印功能會允許access在沒有開啟巨集保護警告的情況下,自執行巨集程式碼。使用者可以藉此安全性漏洞引導您從電子郵件附件或網站連結開啟特定架構的word合併列印文件,因而導致某種巨集程式碼在您的器上不受控制地執行。
  19. They expect another rate cut next week when the federal open market committee - which sets u. s. monetary policy - meets again

    一些股市分析人士說,美聯儲星期二出人料地干涉行顯示,房貸危對美國經濟的劣影響可能比預期嚴重。
分享友人