易受攻擊的 的英文怎麼說

中文拼音 [shòugōngde]
易受攻擊的 英文
vulnerable
  • : Ⅰ形容詞1. (容易) easy 2. (平和) amiable Ⅱ動詞1. (改變; 變換) change 2. (交換) exchange Ⅲ名詞(姓氏) a surname
  • : Ⅰ動詞1 (攻打) attack; assault; take the offensive 2 (指責別人的過錯; 駁斥別人的議論) accuse; ...
  • : 4次方是 The fourth power of 2 is direction
  • 易受 : liable to
  • 攻擊 : 1 (進攻) attack; assault; launch an offensive 2 (惡意指責) attack; accuse; charge; slander; v...
  1. The troops had to withdraw to a less exposed position.

    部隊已經撤到不易受攻擊的地點。
  2. In the research of secure communication, the thesis analyzes some shortcomings of diffie - hellman ' s crypt key exchanging protocol, presenting a new exchanging method based on the " station to station " protocol and cookie mechanism, realizing the software of crypt key exchanging and secure communication of ip datagram on router

    在對安全通信研究中,本文分析了diffie - hellman密鑰交換協議中易受攻擊的地方,提出了基於端對端協議及cookie機制密鑰交換新方法,並在路由器上實現了密鑰交換和ip報文安全通信。
  3. But even in countries ( like america ) without extremist parties on the left or the right, politicians will be tempted to deflect the voters ' wrath away from their corporate paymasters and towards an easier target ? “ foreigners ” of all types

    但即使是在無極左或極右黨派國家(像美國)內,政治家亦傾向于將選民憤怒從公司發薪人員身上移開,而轉向一個更易受攻擊的目標? ?所有「外國人」 。
  4. Parts easy to attack in the system are lan and communication link, which need to take link encrypting and point - to - point encrypting

    系統易受攻擊的環節是局域網與通信鏈路,需採取鏈路加密和端到端加密措施。
  5. But, the patient if because age is old, or it is to contract the disease with meeting immunize low function ( be like : diabetic, aids ) when, will make hepatic defence function is reduced, and the condition that makes liver exposeds to the open air wu yi suffers attack

    但是,病人假如因為年紀大,或是患有會使免疫功能低下疾病(如:糖尿病、 aids等)時,將會使肝臟防禦功能降低,而使肝臟曝露于易受攻擊的狀態。
  6. It only updates vulnerable files

    它只更新易受攻擊的文件。
  7. Also protects against vulnerable parameters passed into a function

    還可以防止向函數傳入易受攻擊的參數。
  8. A vulnerable parameter is allocated before the cookie and local variables

    易受攻擊的參數在cookie和局部變量之前分配。
  9. Sql check also identifies vulnerable sql server 2000 clusters, but does not disable them

    Sql檢查程序也能識別易受攻擊的sql server群集,但不會禁用他們。
  10. Describes how to minimize the vulnerable surface area of an installation of sql server 2005

    介紹了如何最大程度地減小sql server 2005安裝易受攻擊的外圍應用。
  11. All wireless communication is vulnerable to dos as someone can deliberately jam the frequency

    所有無線通信對于dos都是易受攻擊的,因為有人可以故意干擾該頻率。
  12. The compiler does not provide security protection for vulnerable parameters in the following situations

    在以下情況中,編譯器不會對易受攻擊的參數提供安全保護:
  13. But vulnerability doesn ' t suit the yankees, and as a team, they look shockingly fragile

    但這易受攻擊的弱點不適合洋基,而且以一個球隊而言,他們看起來是令人震驚脆弱。
  14. Sql scan identifies vulnerable sql server instances on clustered machines, but does not disable them

    Sql掃描程序可以識別出群集計算機上易受攻擊的sql server實例,但是不會禁用這些實例。
  15. These missiles are capable of posing strategic threats to countries in asia, such as india or japan, but represent a lesser threat to russia, and are only a threat to the united states through the vulnerability of us military bases in japan and south korea

    這些導彈足以對諸如日本和印度等亞洲國家形成戰略威懾,但對于俄羅斯所構成威脅要小一些,對美國所構成威脅則主要是其在日本和南韓易受攻擊的海外基地。
  16. The water - cooled " alien spacesuits " are being handed out to turret gunners in their notoriously vulnerable humvee vehicles. the protective suit, based on those worn by bomb disposal officers, was intended to cut spiralling casualties for one of the most dangerous jobs in modern warfare

    據每日電訊報5月9日報道,這款具有水冷卻功能「外太空服」裝甲衣主要為易受攻擊的裝甲車炮兵提供保護,防止他們遭到路邊炸彈,最終降低炮兵高死亡率。
  17. Secondly, because the system is vulnerable in the process of key producing and signing, we apply a distributed rsa algorithm to the key producing process and adopt a structure of two - level secret shares storing the private key to improve its security

    其次,根據系統在私鑰產生和簽名階段易受攻擊的特性,將分散式rsa演算法應用到私鑰產生過程,並在簽名過程中採用雙層共享結構存儲私鑰,以提高私鑰安全性。
  18. This provides the enemy with a smaller target, protects the more vulnerable parts of the vehicle from enemy fire, and allows the vehicle to fire more or less unhindered

    這樣敵人就只能獲取一個很小目標,以保護其他易受攻擊的部位,同時載具可以掩體後面敵軍。
  19. On rail security, still cited by lawmakers as the most vulnerable part of the transportation system, 13. 2 million dollars goes for inspectors and explosive detection

    在鐵路安全方面,立法者將其稱為交通運輸最易受攻擊的部分, 1320萬美圓將用於增設檢查人員及對爆物品檢查。
  20. To reduce the attackable surface area of a system, sql server 2005 selectively installs and activates key services and features

    - -為了減小系統易受攻擊的外圍應用, sql server 2005有選擇地安裝和激活關鍵服務和功能。
分享友人