I don't want to be accused of tampering with the evidence.
我不想被指控篡改证据。
Someone has been tampering with the machine.
有人乱动了这台机器。
For them, a better word than "creation" is "tampering".
对于科学家们而言,“篡改”的世界比“创造”的世界更美好。
And man has been tampering with nature for millennia.
而且人类几千年来一直在改造自然。
Sealing also provides a security measure to detect code tampering.
密封还提供了防止代码篡改的手段。
Tampering involves someone intercepting a message and then changing it.
篡改包括某人拦截一条消息并更改它。
He looks over the bare concrete floor, looking for any sign of tampering.
他看着光秃的混凝土地板,寻找任何不寻常的迹象。
All messages in transit should be protected from tampering by untrusted intermediaries.
应该防止传输中的所有消息受到不可靠中介的篡改。
There's no evidence of such tampering, but for climate skeptics, it might not matter.
虽然不存在人为操纵的确凿证据,但是对于气候变化怀疑论者,这也许并不重要。
Other users would then be prevented from tampering with any objects created in the schema.
这样就可以防止其他用户篡改在这个模式中创建的任何对象。
This means that all network traffic is encrypted, and tampering with messages is also detected.
这意味着所有网络传输都是加密的,并且消息篡改也可以检测到。
View state can also be hashed or encrypted to prevent a user from tampering with or decoding it.
还能对ViewState进行哈希或加密,以防止用户篡改或解码。
The codes will match if the image is authentic but will be inconsistent if tampering occurred.
若编码一致则图像是原始的,反之,则发生了伪造的行为。
Tampering with cartons is easily detected. I should say that this rather discourages pilferage.
纸箱弄破是容易检查出来的,我说这恰恰可以防止偷盗。
It also prevents tampering with or intimidation of such witnesses before they testify at trial.
它也保护证人在初审提供证词之前不受行贿的干扰和威胁恐吓。
If there is to be tampering with the laws of succession here, let it be before any babies appear.
要是继承法会有改变,那么最好发生在未来的王子或公主诞生以前。
Unlike his other duplicates, this clone would not undergo growth acceleration or docility tampering.
跟他的其他复制品不同,这名克隆体将不会接受生长加速以及思维驯化。
Could terrorists or hackers cause financial chaos by tampering with Wall Street's computerised trading systems?
恐怖份子与黑客通过篡改华尔街电脑交易系统制造金融混乱,可以吗?
Tampering is addressed by a message digest, which is a fixed size numeric representation of the contents of a message.
消息摘要解决了篡改问题,消息摘要是消息内容的定长数字表示。
The third was abandoned after the judge received information that indicated “a serious attempt at jury tampering”.
当法官收到情报显示存在“严重的贿赂陪审团的企图”后,第三次审理也就嘎然而止。
He says the experts looked to see if there was any tampering of the video and whether the people who were filmed were actors.
海恩斯说,这些专家查看了这段录像是否受到篡改以及被拍摄的人是不是演员。
The certificates used in SSL contain identity information and are encapsulated in a cryptographic envelope to prevent tampering.
SSL中使用的证书包含标识信息,并被压缩在一个加密的信封中以防篡改。
The model minimizes the risk of tampering with the authorization data so that servers do not spend more time in verifying the data.
这个模型将篡改授权数据的风险降至了最低,因此服务器不用花费大量的时间来验证数据了。
Several of these attack types are familiar; these same types of attack occur with any remotely accessible service (for example, message tampering).
其中有些攻击类型是比较常见的,这些相同的攻击类型会出现在任何可以远程访问的服务中(例如,消息篡改)。
WS-Security USES XML signature to ensure that data has not been tampered with in transit, because any tampering would invalidate the signature.
WS - Security使用XMLSignature确保数据不会在传输中被篡改,因为任何窜改都会导致签名失效。
The resulting uncertainty, combined with the problem of proving that tampering did not occur, makes public companies very edgy about their controls.
这导致的不确定性,加上提供没有发生篡改情况的证据的问题,使得公司对于他们的控制非常急躁。
Fiola remained oblivious to the tampering because the bot operators made sure they didn't slow down the computer too much by consuming lots of memory.
由于僵尸网络操作者控制了这一过程的内存消耗,避免使计算机速度降低过多,菲欧拉从来没有注意到计算机被动过手脚。
Data tampering — Exploiting weakness in the access control mechanism that permits the attacker to make unauthorized calls to the Web service to alter data.
数据篡改——利用访问控制机制中允许攻击者对Web服务进行未经授权调用的弱点来更改数据。
The session has explicitly chroot jail configured to avoid malicious activity or tampering with the system. Following are few handy IBM SONAS CLI commands.
这个会话显式地配置了根目录变更限制,从而避免恶意活动或篡改系统的行为。
The session has explicitly chroot jail configured to avoid malicious activity or tampering with the system. Following are few handy IBM SONAS CLI commands.
这个会话显式地配置了根目录变更限制,从而避免恶意活动或篡改系统的行为。
应用推荐