| 1. | This helps us prevent abuse of this system 这可帮助我们防止恶意使用本联系表功能 |
| 2. | Evidence of registration and use in bad faith B 、注册和恶意使用的证据 |
| 3. | And you with respect to your use of the site 对不遵守本声明或其他违法恶意使用本网站内容者, |
| 4. | Iii your domain name has been registered and is being used in bad faith ( iii )你方的域名已经注册并正被恶意使用。 |
| 5. | Deniad of service 极为服务拒绝用户恶意使用 |
| 6. | By restricting access to these objects , outlook helps to prevent e - mail worms and viruses from using the object model for malicious purposes Outlook通过限制访问这些对象,帮助防止电子邮件蠕虫和病毒恶意使用对象模型。 |
| 7. | The thesis has introduced generally to the classification , development , characteristic and main techniques of intrusion detection system in chapter one 入侵检测系统对网络资源上的恶意使用行为进行识别,并为对抗入侵提供重要信息。 |
| 8. | A malicious uses might also change the contents of a cookie to pretend that he or she is a different user or that the cookie comes from a different server 恶意使用还可能更改cookie的内容以假装他(或她)是其他用户或cookie来自其他服务器。 |
| 9. | If your data store is available to other processes , or is visible on an intranet or the internet , the data can be stolen and used maliciously 如果其他进程可以访问您的数据存储区,或是可以在intranet或internet上看到该数据存储区,数据就可能被窃取,并被恶意使用。 |
| 10. | Eds watch the computer and network traffic for intrusive and suspicious activities , they not only detect the intrusion from the extranet hacker , but also the intranet users 他对计算机和网络资源上的恶意使用行为进行识别和响应,它不仅检测来自外部的入侵行为,同时也监督内部用户的未授权活动。 |