The male riflebird exploits both of these modes of signaling simultaneously in his courtship display.
雄性雷射鸟在求爱时会同时利用这两种信号模式。
In the second variation, called the "vertical archipelago", the village exploits resources in widely dispersed locations, constituting a series of independent production "islands".
第二种变异称为“垂直群岛”,村庄在广泛分散的地点开发资源,构成一系列独立生产的“岛屿”。
She fully exploits the humour of her role in the play.
她在剧中把她那个角色的幽默发挥得淋漓尽致。
His wartime exploits were later made into a film and a television series.
他战时的英勇事迹后来被改编成了电影和电视剧。
Christine, who doesn't even own a computer and has been keeping up with her son's exploits through the media, said her son was a "seeker of truth".
克莉丝汀,甚至没有电脑,她一直通过媒体获得他儿子的最新消息,她说她儿子是一个“探求真相的人”。
As a result of his brazenfaced exploits, Ben has received generous praise from supporters.
由于他厚颜无耻的行为,本得到了支持者们的慷慨赞扬。
Now you need two bugs and two exploits.
现在你需要2个bug,并进行两种漏洞的利用。
俄罗斯正好利用了这一点。
Their exploits were known nationwide.
他们的事迹尽人皆知。
Using threat models to prevent exploits.
使用威胁模型来避免被破坏。
A potential ranking of the seriousness of exploits.
对漏洞的严重性进行分级。
The Tofte experimental power station exploits this pressure.
托夫特的这个实验电厂就利用了这种压力。
The final query is the query that exploits the extended index.
最后的查询是利用扩展的索引的查询。
This is just one example of the innumerable exploits of this type.
这只是无数的这类利用中的一个实例。
Note: The pool of exploits is specific to an operating system.
注意:攻击池是特定于操作系统的。
But the attack, and the vulnerability it exploits, are all too common.
但是这类攻击,以及它所利用的缺陷,都极其常见。
The lightweight client simply exploits this information in novel ways.
这种轻量级客户机只不过是以新颖的方式利用这些信息。
With a bit of work and research, you can develop your own exploits.
通过一些工作和研究,您可以研发自己的漏洞攻击。
Keep an eye on the news about exploits with resources that you use.
关注有关所使用资源被攻击的新闻。
This software exploits the relentless logic of combinatorial statistics.
这种软件的开发思想完全遵照了组合统计的逻辑思维。
Such a treatment exploits the complementary action of two or more antibiotics.
这种疗法利用两种或两种以上的抗生素的互补作用。
This process should apply to running most exploits and payload deliveries.
这个过程应该适用于大多数攻击和工作负载。
These target points and their exploits are explored later in this article.
这些目标点和他们攻击方法稍后会介绍。
So far, all our examples of buffer overflow exploits have been for UNIX systems.
目前,我们举的所有利用缓冲区溢位的范例都是针对UNIX系统的。
With any new technology, there are bound to be exploits we haven’t thought of.
只要是新技术,肯定有我们未曾想到的弱点。
He merely exploits existing tools to construct something seemingly new for clients.
他只会利用现成的工具为客户构造看似新奇的东西。
His exploits eventually lead to his arrest, trial in London, and, in 1701, execution.
这笔横财最终让他被逮捕,在伦敦审判后于1701年被绞死。
There are loads of different methods for hacking which can be done with many exploits.
目前有很多入侵的方法,可以利用许多肉机实现。
What if someone exploits some unknown limitations of the security mechanism to break through?
如果有人利用安全机制的某些未知的限制破解了它,那么会怎么样?
What if someone exploits some unknown limitations of the security mechanism to break through?
如果有人利用安全机制的某些未知的限制破解了它,那么会怎么样?
应用推荐