TO THE ATTACKER - 翻译成中文

[tə ðə ə'tækər]
[tə ðə ə'tækər]
攻击者
attackers

在 英语 中使用 To the attacker 的示例及其翻译为 中文

{-}
  • Political category close
  • Ecclesiastic category close
  • Programming category close
The principle behind it is very simple: Reply the correct response to the attacker exploiting the web application.
其背后的原理非常简单:回复利用Web应用程序的攻击者的正确响应。
After replacing the data, the user voluntarily transfers funds to the attacker's wallet address.
在更换地址后,用户“自愿”将资金转移到攻击者的钱包地址。
While the private key remains only in memory, the public keys' modulus n is sent to the attacker's server.
尽管私钥仅保留在内存中,但公钥的模数n被发送到了攻击者的服务器。
After replacing the data, the user voluntarily transfers funds to the attacker's wallet address.
在替换数据之后,用户自愿将资金转移到攻击者的钱包地址。
The request changed the DNS-settings so that requests to a Mexico-based banking site would be mapped to the attacker's site.
这个请求修改了DNS设置,如果用户访问墨西哥的银行网站,会被带到攻击者的网站。
If your computer is infected with a keystroke virus, the password may become known to the attacker.
如果您的计算机感染了按键记录病毒,您的密码可能会被攻击者所知道。
These attacks could allow a remote attacker to redirect network traffic intended for systems on the Internet to the attacker's system.
这些漏洞可能会允许远程攻击者将Internet上针对系统的网络通信重定向至攻击者自己的系统。
Io, has admitted it wasn't so lucky, losing around $200,000 to the attacker(who, strangely, returned half of it days later).
Io称其并没有那么幸运,损失了约20万美元(奇怪的是几天以后攻击者又归还了一半)。
All neighboring switches will then update their mapping tables and begin transmitting data destined to the attacked system's IP address to the attacker's MAC address.
所有的附近的交换机接下来会更新他们的映射表并且开始将发送数据的目的地址设置为攻击系统的IP地址对应的MAC地址。
The payload will spawn a/bin/sh shell, create a TCP connection to the attacker and attach the shell standard streams to it.
这个payload将会生成一个/bin/sh的shell,创建一个TCP连接到攻击者的服务器,并且在通信数据流中绑定shell命令。
Subverted random numbers can be created using a cryptographically secure pseudorandom number generator with a seed value known to the attacker but concealed in the software.
颠覆随机数可以在密码学安全伪随机数生成器中使用随机数种子值来生成,种子值虽然隐藏在软件中,但是对攻击者已知。
Only the data on the payment card would have been accessible to the attackers.
只是付款卡的信息被攻击者访问。
Kadyrov later said he was grateful to the attackers.
卡德罗夫后来说他很感激袭击者
Some of the sites scanned may have been of interest to the attackers as candidates for waterhole.
部分被扫描的网站可能是攻击者感兴趣的候选主水坑资源。
I would even consider giving them to the attackers if they would ask nicely.
我甚至会考虑把它们直接交给攻击者,如果他们的态度好一点的话。
The two phones linked to the attackers are still encrypted and investigators cannot access the data.
攻击者相关的两部手机仍处于加密状态,调查人员无法访问数据。
Part of the sites scanned may have been of interest to the attackers as candidates for hosting waterhole resources.
部分被扫描的网站可能是攻击者感兴趣的候选主水坑资源。
In further investigations, the researchers concluded that this string is related to the original source of these files and did not belong to the attackers.
我们进行了调查并得出结论,这个字符串与这些文件的原始来源有关,并且不属于攻击者
There seemed to have been one or more leaders giving orders to the attackers.
好象有一个或几个头头在向攻击者发号施令。
Local resident and witness John Waweru, 28, said he lost two of his brothers to the attackers.
岁的当地居民和目击者JohnWaweru说,他向攻击者失去了他的两个兄弟。
结果: 45, 时间: 0.0351

单词翻译

顶级字典查询

英语 - 中文