请输入您要查询的英文单词或汉字:

 

单词 attacker
释义 at·tack·er 美ə'tækɚ ★★☆☆☆高COCA¹²⁰⁹⁹BNC⁸⁸⁰¹iWeb⁵⁸³⁵Economist²⁴¹⁰⁶⁺
基本英英搭配记法近义反义例句Thesaurus例句
n.攻击者⁹⁹;抨击者¹复数attackers
Noun:
someone who attackspotential air attacker可能的空中敌人,可能…close up on an attacker紧逼进攻队员…aerial attacker空中目标lead attacker发动进攻者mock attacker假想敌机double attacker两手都能扣球的队员…main attacker主攻队员
attack-er名人|物⇒n.攻击者⁹⁹;抨击者¹近义词 foe敌人enemy敌人accuser原告invader侵略者aggressor侵略者assailant攻击者assaulter攻击者

名词100%
用作名词He turned to face hisattackers.他转过身来对付那些攻击者。
Hisattackermade at him with a knife.那人持刀袭击他。noun.aggressor
同义词 assailant,mugger,raiderassaulter,traducer
adversariesnoun opponent
antagonists,attackers,bad persons,bandits,competitors,contestants,enemies,foes,matches,opposers,opposite numbers,oppugners,rivals
adversarynoun opponent
antagonist,bad person,bandit,competitor,contestant,enemy,foe,match,opposer,opposite number,oppugner,rival
combatantnoun fighter
adversary,antagonist,assailant,attacker,battler,belligerent,contender,enemy,foe,serviceman,soldier,warrior
criticnoun faultfinder, detractor
aristarch,attacker,backseat driver,belittler,blamer,carper,caviler,censor,censurer,complainant,complainer,defamer,disapprover,disparager,disputer,doubter,fretter,hypercritic,maligner,muckraker,mud-slinger,nagger,nit-picker,panner,quibbler,reviler,scolder,sidewalk superintendent,slanderer,vilifier,worrier,zapper
criticsnoun faultfinder, detractor
aristarches,attackers,backseat drivers,belittlers,blamers,carpers,cavilers,censors,censurers,complainants,complainers,defamers,disapprovers,disparagers,disputers,doubters,fretters,hypercritics,maligners,muckrakers,mud-slingers,naggers,nit-pickers,panners,quibblers,revilers,scolders,sidewalk superintendents,slanderers,vilifiers,worriers,zappers
enemiesnoun someone hated or competed against
adversaries,agents,antagonists,archenemies,aspersers,assailants,assassins,attackers,backbiters,bad persons,bandits,betrayers,calumniators,competitors,contenders,criminals,defamers,defilers,detractors,disputants,emulators,falsifiers,fifth columns,foes,guerrillas,informers,inquisitors,invaders,murderers,opponents,oppositions,other sides,prosecutors,rebels,revolutionaries,rivals,saboteurs,seditionists,slanderers,spies,terrorists,traducers,traitors,vilifiers,villains The attacker can then analyze the recorded data to retrieve confidential information, such as passwords and confidential messages.
然后,攻击者能够通过分析记录数据检索出凭证信息,比如说密码和凭证信息。 ibm

The attacker cannot access all the packets of a request and cannot decipher what message was sent.
攻击者不能访问一个请求中所有的包,也就不能破译发送的消息。 ibm

A common scenario is that the attacker calls the shopper, pretending to be a representative from a site visited, and extracts information.
一个常见的场景是攻击者打电话给购物者,假装是购物者所访问站点的代表,并且提取信息。 ibm

After you get all the assets for assessment identified, the next step is to identify and assess the vulnerabilities of each asset that a hacker or attacker could maliciously exploit.
识别了所有要评估的资产之后,下一个步骤就是识别并评估每种资产可能被黑客或攻击者利用的漏洞。 ibm

Again, you can see that this attack can be performed with frighteningly few resources on the part of the attacker.
您可以再次发现,对攻击者一方而言,只需少得惊人的资源就可以执行这种攻击。 ibm

Although this example demonstrates an SQL injection in its simplest form, you can see just how easy it is for an attacker to use.
尽管本例以最简单的形式演示了一个 SQL注入,但是您可以看出攻击者利用 SQL注入有多么容易。 ibm

An attacker sophisticated enough to download and use a tool can cause the client to report a lie by modifying packets traversing the network.
一个非常老练的攻击者可以下载然后使用一种工具,通过修改经过网络的信息包使客户机报告虚假信息。 ibm

Anger at your attacker or others for not protecting you.
对攻击你的和没能保护你的人生气。 yeeyan

For example, using embedded file: URLs to return UNIX password files or other privileged data to the attacker.
例如,使用嵌入的文件:向攻击者返回 UNIX密码文件或其他特权数据的 URL。 ibm

However, if the format is a constant in the program, there's nothing for the attacker to control.
然而,如果字符串的格式在程序中是一个常量,那么攻击者就无法控制了。 ibm

I know of one victim of crime who testified against her attacker in court.
我知道一位受害者,她在法庭上指证攻击她的人。 yeeyan

In most cases, if you create a list of“ illegal” characters, an attacker will find a way to exploit your program.
在绝大多数情况下,如果您创建了一个“非法”字符的列表,攻击者还是可以找到利用您的程序的方法。 ibm

In this case, nothing terrible happens, and the attacker simply sees an error message in the client.
在这个示例中,没有发生什么可怕的事情,攻击者只是在客户机上看到了一条错误消息。 ibm

In this example, the attacker needs to wait until the user clicks the submit button before he receives his data.
在本例中,攻击者需要等待一段时间,直到用户单击提交按钮之后才能接收到他的数据。 ibm

In this scenario, the user unknowingly executes scripts written by an attacker when they follow a malicious link in a mail message.
在本方案中,当用户执行邮件消息中的恶意链接时,就会不知不觉地执行攻击者编写的脚本。 ibm

It is particularly dangerous because the attacker does not need a powerful machine or a powerful network connection to perform this attack.
因为攻击者不需要功能强大的机器或高速的网络连接来执行这种攻击,所以它特别危险。 ibm

Often, it's best to check in both places; that way, if an attacker manages to slip around one defense, they'll still encounter the other.
通常,最好在这两处都对其进行检查;这样,即使一个攻击者成功地突破了一道防线,他们还会遇到另一条。 ibm

Often, an attacker or predator just wants your money.
通常,一个攻击者或抢劫犯只是想要你的钱。 yeeyan

That means the attacker can set up the entire attack in essentially one operation!
这意味着攻击者本质上能够在一个操作中完成整个攻击! ibm

The only requirement is that the attacker must have authentication and authorization privileges over Bluetooth.
唯一需要的就是攻击者必须介由蓝牙系统拥有授权和验证权限。 yeeyan

The attacker just inserts HTML in this fashion.
而攻击者正是以这种方式插入 HTML。 ibm

They hastened the development of a new attacker.
他们加紧了新型攻击机的研制。《21世纪大英汉词典》

Think of the problem from two perspectives: the server, and the attacker.
请从两方面来考虑这个问题:服务器和攻击者。 infoq

This kind of attack allows the attacker to update, insert or delete data, and perhaps also reveal arbitrary information from your database.
这种攻击使攻击者可以更新、插入或删除数据,甚至可能可以看到数据库中的任意信息。 ibm

This team uses the information to build a thorough understanding of the attacker’s behaviours and develops methods to prevent further attacks.
该团队使用这些信息来建立一个完善的攻击者行为认知,研发方案以防止进一步的攻击。 www.etiri.com.cn

Victims must also be protected if the accused attacker is still in school with them.
如果被控攻击者仍与受害者在同一学校,受害人还必须得到保护。 ebigear

Yet again, I tried moving forward. My attacker charged me again.
我再次尝试向前移动,我的袭击者也再次向我攻击。 ebigear
随便看

 

英汉汉英双解词典包含9999994条英汉翻译词条,涵盖了常用英语单词及词组短语的翻译及用法,是英语学习的必备工具。

 

Copyright © 2000-2023 Tbdmj.com All Rights Reserved
京ICP备2021023879号 更新时间:2024/11/3 22:27:12