Armed guards wrestled with the intruder.
武装警卫和闯入者扭打起来。
The dog growled at the intruder.
狗向闯入者狺狺狂吠。
He trained his gun on the intruder.
他举枪瞄准入侵者。
Who are you? he asked of the intruder.
“你是谁?”他问那个入侵者。
It was he, the intruder, who interrogated.
他是不速之客,反而盘问个不停。
He addressed the intruder with indignation.
他愤怒地谴责入侵者。
Responses are then returned to the intruder site.
然后响应被返回到入侵者站点。
The intruder in Minnesota turned out to be a bear.
明尼苏达的侵入者证明是一头熊。
The intruder can also scan the hard drive to detect any stored passwords.
入侵者也可以检测硬件驱动器来搜索任何存储的密码。
Responses are then transmitted unknowingly back to the intruder site.
然后,服务器在不知情的情况下将响应传输回入侵者站点。
By the time Hoffman finds him the intruder is in the kitchen sharpening knives.
等霍夫曼发现他时这位闯入者正在厨房里磨刀。
It took a week to winkle out the intruder. Nobody knows what, if any, damage was caused.
足足一个星期之后入侵者才被剔除,如果有损失的话,没有人知道这次入侵导致的损失是什么。
It was not the intruder that "caused" the break, but the lack of a real relationship.
并不是不速之客“导致了”决裂,而是缺乏真实的关系。
You essentially deny the intruder the ability to see or access things they should not see.
这样可以拒绝入侵者查看或访问他们不应该看到的内容。
If even one program goes undetected, the intruder might have a way back into your system.
如果连一个程序在不知不觉中,入侵者可能会重新找到你的系统。
When it found that the deer would be around to look at the first, and see what the intruder.
当它发现鹿时,先会向四周观察一下,看看有什么不速之客。
If a male bobolink hears another male calling in his territory, he'll chase the intruder away.
如果一只雄性食米鸟听见另一只雄性在自己的地盘鸣叫,它会把入侵者赶走。
“It's a marten, not a weasel, ” the intruder reportedly replied, then punched the victim in the nose.
“这是一只貂,而不黄鼠狼,”入侵者满嘴官腔,然后他就猛击了受害人的鼻子。
Any hacking or improper wireless connectivity to it means that the intruder is deeply in the network.
任何对该节点的攻击或者与该节点不适当的无线连接都意味着入侵者已深入到网络内部。
The intruder uses this access to try to circumvent the normal application usage and to do inappropriate things.
入侵者使用这种访问方式来试图超越应用程序的正常使用,做一些不正当的事情。
The intruder is not necessarily outside the company, but he is executing code from outside of the application itself.
入侵者并不一定是在公司外部,但他是从应用程序自身的外部执行代码的。
The intruder is not necessarily outside the company, but rather is executing code from outside of the application itself.
入侵者并不一定在公司外部,但他们是从应用程序自身的外部执行代码的。
Machine-based attacks: in this case, the intruder has access to a machine on which WebSphere Application Server is running.
基于计算机的攻击:在这种情况中,入侵者已经可以访问运行WebSphereApplicationServer的计算机。
Machine-based attacks: in this case, the intruder has access to a machine on which WebSphere Application Server is running.
基于计算机的攻击:在这种情况中,入侵者已经可以访问运行WebSphereApplicationServer的计算机。
应用推荐