惡意 evil [vicious; ill] intentions; ill will; malice; [拉丁語] mala fide 對某人心懷惡意 bear malice to [towards; against] sb.; 惡意攻擊 malicious attack; 惡意誹謗 spread vicious gossip; 惡意行為 malicious act; 惡意中傷 malicious calumniation; viciously slander; calumniate; 并無惡意 bear no ill will; 惡意歪曲地報道這條新聞 report the news mala fide; 我對你毫無惡意。 i bear you no malice. 他做此事是出于惡意。 he did it of [out of; through] malice
攻擊 1.(進攻) attack; assault; launch an offensive 發起總攻擊 launch a general offensive2.(惡意指責) attack; accuse; charge; slander; vilify 人身攻擊 personal attack; 攻擊別人 character assassination; 他們的無端攻擊是別有用心的。 their groundless accusation is made with ulterior motives.3.[免疫學] challenge; 攻擊波 attack echelons; 攻擊導彈 offensive missile; 攻擊點 a point chosen for attack; point of attack; 攻擊隊形 assault formation; 攻擊反應 aggressive reaction; 攻擊航線 [航空] target pattern; 攻擊航向 [航空] attack heading; 攻擊機 attack plane; attacker; strike aircraft; 攻擊距離 attack distance; 攻擊聲納 attack sonar; 攻擊素 aggressin; 攻擊行為 aggressive behaviour; 攻擊者 attacker
出其不意攻其無備 should do what they don't expect and strike when they're unprepared
No any argue and attack is allow in this forum 不得于論壇內張貼惡意攻擊、漫罵。
The second step is to identify vulnerabilities that a hacker or attacker could maliciously exploit 第二步是確定電腦黑客或攻擊者可能惡意攻擊的漏洞。
At the same time , the draw back of tcp / ip protocol is a main source of unfair flow and vicious attack 另一方面, tcp ip的缺陷也成為不公平數據流或惡意攻擊數據流產生的重要原因。
To prevent buffer overruns and malicious attacks , your code should always verify user input content and length 為防止緩沖區溢出和惡意攻擊,代碼應該始終驗證用戶輸入的內容和長度。
The protocol uses hmac to guarantee the client being active , then protects leasing from attacks 該協議靈活運用hmac ,確保代理每次租借時客戶總是“激活的” ,從而盡量避免惡意攻擊。
The first step is to identify critical system assets - intangible or tangible - that are vulnerable to malicious attacks 第一步是確定易遭到惡意攻擊的關鍵系統資產無形的或者有形的。
For example , during the summit , the apec mirror site recorded 330 , 000 visits in total and suffered 295 , 000 malicious attacks 如apec鏡像網站會議期間總訪問量33萬次,受到各類惡意攻擊就達到了29
Or , if your organization isn ' t that large , but it is a " rich " target in other respects , you have to expect malicious attacks 或者,如果你的組織不大,但是在其它方面它是一個值得攻擊的目標,你只能預料惡意攻擊。
Comments : very erotic and very violence ' s vulgar news and pornographic pictures , malicious attacks female college students , induces crime 上榜原因:很黃很暴力的低級新聞與黃色圖片,惡意攻擊女大學生,誘使犯罪。
Sql server browser should be run in the security context of a low - privileged user to minimize exposure to a malicious attack Sql server瀏覽器應該在低特權用戶的安全上下文中運行,以將受到惡意攻擊的幾率降到最低。