His lip was curled with malicious triumph.
他的嘴唇因恶意的胜利而翘起。
We've performed an exhaustive scan on your computer, but we couldn't find any malicious software.
我们对你的电脑进行了彻底的扫描,但没有发现任何恶意软件。
Some malicious rumours are circulating about his past.
有人别有用心地散布谣言,说他过去如何如何。
The action of malicious or injurious falsehood has similarities to an action for libel.
恶意或有害的谎言的行为与诽谤的行为有相似之处。
Scripting via a malicious link.
借助恶意链接的脚本编制。
Malicious website: 7,971, 7.4 percent.
恶意网站:7971起,7.4%。
Malicious website: 7, 971, 7.4 percent.
恶意网站:7971起,7.4%。
Allocating malicious resource instances.
分配恶意资源实例。
Spreading a rumor with malicious intent.
不怀好意地散播谣言。
Usually hackers didn't have any malicious intent.
通常,黑客并无任何恶意的企图。
The just man frowns, but never smiles with a malicious sneer.
公正的人蹙起眉头,但从不会有那种恶意的微笑。
You need to screen it and discard things that seem malicious.
您需要将其显示在屏幕上,并废弃那些看上去怀有恶意的内容。
The term attacker can be used to describe a malicious hacker.
词汇攻击者可用来描述恶意黑客。
This simple trick helps you fend off malicious script injections.
这种简单的技巧有助于避免恶意的脚本注入。
The lawyer`s malicious emphasis underlined the irony in this truth.
律师带有恶意的腔调增加了他陈述事实的冷嘲热讽。
Trojan horse Malware that masquerades as non-malicious software.
特洛伊木马软件,经常伪装成无害软件。
Some companies adopt malicious marketing methods to beat competitors.
有些公司采取恶意营销手段打击竞争对手。
An attacker can connect users to a malicious server of the attacker's choice.
攻击者可以将用户连接到攻击者选择的恶意服务器上。
The first scenario is preventing malicious content using ACF response filtering.
第一个场景是使用ACF响应过滤阻止恶意内容。
With a malicious crackle the old man held up a small white swaddling garment.
老头啪一声狠狠扯下毯子上的一个白色的小装饰。
For really creative malicious hackers, the sky is the limit if the user trusts them.
对于真正创造性的恶意黑客,若是用户信任他们,那么他们的目的总是会达到。
If I accept a malicious piece of code that wreaks havoc on my computer, whose fault is it?
如果我接受了一段恶意代码,其破坏了我的计算机,那又是谁的错呢?
Changing the state of one application function to subsequent states of malicious functions.
将应用程序功能的状态修改为恶意功能的后续状态。
The attacker injects his malicious inputs to the SQL statement to change the query's logic.
攻击者将其恶意输入注入到sql语句中,以修改查询语句的逻辑。
How many malicious users can a tagging system tolerate before results significantly degrade?
在服务质量明显变坏之前,一个标签系统能忍受多少的恶意用户?
But a spokesman for HSBC said: "There are millions of viruses, and other malicious software."
但汇丰银行发言人说:“有几百万的病毒和其他恶意软件。”
Automation detection - Detecting bots, crawlers, scanners and other surface malicious activity.
自动检测——对机器人、爬虫、扫描及其他恶意行为进行检测。
Without this protection, a malicious web page could compromise the integrity of another web page.
没有这个保护的话,恶意的网页可能危害到另外一个正常的网页。
As we have discussed, the JVM serves to prevent malicious code from entering an enterprise system.
正如我们已经讨论的,JVM提供了防止恶意代码进入企业系统的服务。
As we have discussed, the JVM serves to prevent malicious code from entering an enterprise system.
正如我们已经讨论的,JVM提供了防止恶意代码进入企业系统的服务。
应用推荐