• His lip was curled with malicious triumph.

    嘴唇恶意的胜利而翘起。

    youdao

  • We've performed an exhaustive scan on your computer, but we couldn't find any malicious software.

    我们电脑进行彻底扫描没有发现任何恶意软件。

    youdao

  • Some malicious rumours are circulating about his past.

    有人别有用心地散布谣言,说过去如何如何。

    《牛津词典》

  • The action of malicious or injurious falsehood has similarities to an action for libel.

    恶意有害谎言行为与诽谤行为相似之处

    youdao

  • Scripting via a malicious link.

    借助恶意链接脚本编制

    youdao

  • Malicious website: 7,971, 7.4 percent.

    恶意网站:7971起,7.4%。

    youdao

  • Malicious website: 7, 971, 7.4 percent.

    恶意网站:7971起,7.4%。

    youdao

  • Allocating malicious resource instances.

    分配恶意资源实例

    youdao

  • Spreading a rumor with malicious intent.

    不怀好意散播谣言

    youdao

  • Usually hackers didn't have any malicious intent.

    通常黑客任何恶意企图

    youdao

  • The just man frowns, but never smiles with a malicious sneer.

    公正蹙起眉头从不会那种恶意微笑

    youdao

  • You need to screen it and discard things that seem malicious.

    需要将其显示在屏幕上废弃那些看上去怀有恶意的内容。

    youdao

  • The term attacker can be used to describe a malicious hacker.

    词汇攻击者可用描述恶意黑客

    youdao

  • This simple trick helps you fend off malicious script injections.

    这种简单技巧有助于避免恶意脚本注入

    youdao

  • The lawyer`s malicious emphasis underlined the irony in this truth.

    律师带有恶意的腔调增加他陈述事实冷嘲热讽

    youdao

  • Trojan horse Malware that masquerades as non-malicious software.

    特洛伊木马软件,经常伪装无害软件。

    youdao

  • Some companies adopt malicious marketing methods to beat competitors.

    有些公司采取恶意营销手段打击竞争对手

    youdao

  • An attacker can connect users to a malicious server of the attacker's choice.

    攻击可以用户连接攻击者选择恶意服务器上。

    youdao

  • The first scenario is preventing malicious content using ACF response filtering.

    第一场景使用ACF响应过滤阻止恶意内容

    youdao

  • With a malicious crackle the old man held up a small white swaddling garment.

    老头啪一声狠狠扯下毯子上白色装饰。

    youdao

  • For really creative malicious hackers, the sky is the limit if the user trusts them.

    对于真正创造性恶意黑客若是用户信任他们,那么他们目的总是会达到。

    youdao

  • If I accept a malicious piece of code that wreaks havoc on my computer, whose fault is it?

    如果接受了一段恶意代码,其破坏计算机那又是谁的呢?

    youdao

  • Changing the state of one application function to subsequent states of malicious functions.

    应用程序功能状态修改恶意功能后续状态

    youdao

  • The attacker injects his malicious inputs to the SQL statement to change the query's logic.

    攻击者将其恶意输入注入sql语句中,修改查询语句逻辑。

    youdao

  • How many malicious users can a tagging system tolerate before results significantly degrade?

    在服务质量明显变坏之前,一个标签系统忍受多少恶意用户

    youdao

  • But a spokesman for HSBC said: "There are millions of viruses, and other malicious software."

    汇丰银行发言人:“几百万病毒其他恶意软件。”

    youdao

  • Automation detection - Detecting bots, crawlers, scanners and other surface malicious activity.

    自动检测——对机器人爬虫扫描其他恶意行为进行检测

    youdao

  • Without this protection, a malicious web page could compromise the integrity of another web page.

    没有这个保护的话,恶意网页可能危害到另外一个正常的网页。

    youdao

  • As we have discussed, the JVM serves to prevent malicious code from entering an enterprise system.

    正如我们已经讨论的,JVM提供防止恶意代码进入企业系统的服务。

    youdao

  • As we have discussed, the JVM serves to prevent malicious code from entering an enterprise system.

    正如我们已经讨论的,JVM提供防止恶意代码进入企业系统的服务。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定