| 1. | The troops had to withdraw to a less exposed position . 部队已经撤到不易受攻击的地点。 |
| 2. | The instauration of attacked ie browser and the prevention methods 浏览器受攻击的恢复和预防 |
| 3. | The country is well - prepared to protect against the attack 这个国家已作好了免受攻击的充分准备。 |
| 4. | It only updates vulnerable files 它只更新易受攻击的文件。 |
| 5. | Also protects against vulnerable parameters passed into a function 还可以防止向函数传入易受攻击的参数。 |
| 6. | A vulnerable parameter is allocated before the cookie and local variables 易受攻击的参数在cookie和局部变量之前分配。 |
| 7. | That ' s right . we got rights to be protected against assault under any circumstances 没错,我们有在任何情况下受到保护免受攻击的权利 |
| 8. | Intrusion detection is a network security technology which protected oneself from attack 入侵检测技术是一种主动保护自己免受攻击的一种网络安全技术。 |
| 9. | Sql check also identifies vulnerable sql server 2000 clusters , but does not disable them Sql检查程序也能识别易受攻击的sql server群集,但不会禁用他们。 |
| 10. | The vulnerability could allow an attacker to prevent an affected machine from providing useful service 此漏洞允许攻击者阻止受攻击的计算机提供有用的服务。 |