在 英语 中使用 Can bypass 的示例及其翻译为 中文
{-}
-
Political
-
Ecclesiastic
-
Programming
SSTP(Secure Socket Tunneling Protocol) is a suitable alternative to standard protocols in areas where VPNs are restricted because it can bypass most firewalls.
By using analogy and metaphor we can bypass direct description that can be time-consuming, and use a common idea instead.
You can bypass filters and firewalls set by yournetwork administrator to gain access to your favorite content.
Also, you can bypass some of C's regular features to get direct access to low-level capabilities.
Taking a Chinese partner, as was done in the case of Kung Fu Panda 3, can bypass the quota.
Hackers look for poor protection that they can bypass to steal valuable details like Social Security numbers, birth dates, email addresses and credit card numbers.
Having undergone a background check, von Badinski can bypass the main terminal, skip any usual security procedures and board the plane within minutes of parking.
They could bypass the Afghan government".
In doing so, we could bypass her family, at least initially.
I believe the Blonde was saying that he could bypass psion waves.
An attacker who successfully exploited this vulnerability could bypass impersonation-level security checks and gain elevated privileges on a targeted system.
By inducing the Poles to conduct direct negotiations he could bypass the League of Nations and then weaken its authority.
LRH warned that no one could bypass any level to get to this ultimate mystery and said proper preparation was imperative.
An attacker who successfully exploited this vulnerability could bypass access restrictions to add or remove files.
Prior to disengagement, north-south traffic could bypass Nablus, but during the withdrawal, that section of the road was closed and has remained closed since then.
Additionally, the team found they could bypass iron and use glucose supplementation instead and achieve all the same results.”.
She did not ask if he could bypass Sabul or go over his head.
An attacker who successfully exploited this vulnerability could bypass some, but not all, of the authentication factors.
One of them could bypass detection by professional anti-virus software in South Korea- AhnLab's V3 Lite, AhnLab's V3 365 Clinic and ESTsoft's ALYac.
An attacker could bypass Kerberos authentication on a target machine and decrypt drives protected by BitLocker.