Perched on top of the fencing is a network of 900 surveillance cameras to detect intrusions.
围栏顶部是一个由900个监控摄像头组成的网络,用来探测入侵。
Now, for many cases involving governmental intrusions into data, once-lonely privacy advocates find themselves fighting alongside the most powerful company in the world.
如今,就许多涉及政府入侵数据的案例而言,那些曾经单打独斗、为隐私而战的倡导者发现他们与世界上最强大的公司一起并肩作战。
We are much more able to "tune out" chronic background noise, even if it is quite loud, than to work under circumstances with unexpected intrusions of noise.
我们更容易忽略长期存在的背景噪音,即使它非常大声,而不是在有意想不到的噪音干扰的情况下工作。
They openly and wantonly carried out repeated armed intrusions into our country.
他们明目张胆地对我国不断发动武装入侵。
《新英汉大辞典》Most intrusions require action.
大多数入侵都需要操作。
Deploy Monit to detect intrusions.
部署Monit以检测入侵。
None of the intrusions were into classified material, Sedney said.
他还说,这几次入侵都没有涉及到机密资料。
Immedately Alerts you to any online intrusions by visual warnings.
即刻提醒您注意任何外部入侵,由视觉警告。
Anti-virus programs are necessary but don’t always guard against intrusions.
反病毒程序是有必要用的但是仍不能够经常的阻止渗透。
The mind loves to wander, and these intrusions keep you from the precious results you seek.
思想是最爱开小差的,这些干扰会阻止你得到你寻求的宝贵的结果。
Granites of host and complementary intrusions are formed mainly by crystallization in the late stage.
晚阶段是以结晶方式为主形成的,主侵入花岗岩和补充花岗岩。
Having an established and well-informed plan will curtail some of the panic that comes with security intrusions.
拥有确定和周密的计划会减少安全入侵所带来的一些恐慌。
So for each potentially intrusive connection, Snort needs a rule (or rules that cover multiple related intrusions).
因此对于每一个可能的入侵连接,Snort 都需要使用一条规则(或涵盖多个相关入侵的规则)。
Early Yanshanian intrusions are mainly adamellite, biotite K-feldspar granite with small amount of granodiorite.
燕山早期侵入岩以二长花岗岩、黑云钾长花岗岩为主,其次为花岗闪长岩。
From packet sniffing to analysis to alerting you or an admin to possible intrusions, Snort protects your work from attack.
从包嗅探、分析一直到向您或管理员发出可能出现入侵的警报,Snort能够保护您的工作成果,使之免受攻击。
I think saber-rattling and talking about exercises for military intrusions do nothing but escalate the situation," she said.
我认为,军事恐吓或者有关军事入侵的讨论只能让局势更加恶化。
Japan and China have sometimes been at odds after intrusions by military vessels or planes into each other's territory.
中国和日本有时会发生对方军事船舰或飞机进入己方领土、领空的事件。
In computer security, an intrusion detector; a thin rubber or vinyl mat, with pressure sensors, used to detect intrusions.
计算机安全用语,指用以检测入侵行动的一种设备,通常是一块带有压力传感器的薄橡皮,或乙烯垫子,用以检测入侵行动。
In fact, as recently as this March, Blatter himself spoke out against allowing technical intrusions into the beautiful game.
事实上,在今年三月,布拉特本人就亲口反对科技手段介入到美丽的足球比赛当中。
"These intrusions focused on exfiltrating information, some of which could be of strategic or military utility," the report said.
报告说,“这些攻击将目标聚焦在机密信息方面,其中一些可能包括战略或者军事设施的相关资料。”
By setting boundaries, we find the freedom to behave in our best interest, with fewer distractions and fewer unwanted intrusions.
设定好界限后,令人分心的琐事和意想不到的干扰就会少很多,我们就可以自由地从事符合自身最佳利益的事情。
In this article, I'll go well beyond installation and configuration, and talk about how to set up Snort to detect Web-related intrusions.
在本文中,我将越过基本的安装和配置知识,讨论如何设置Snort,以检测与Web相关的入侵。
An FBI spokeswoman said Operation Hackerazzi involved "computer intrusions targeting individuals associated with the entertainment industry."
她表示“黑客队行动”涉嫌“针对娱乐行业个人的电脑入侵”罪名。
Hundreds of intrusions by drones into planes' air space have been reported around the world in the past few years, but this one was close.
最近几年,世界各地出现了数以百计的无人机侵占飞机航道事件,但这次是近距离侵占。
Igneous intrusions such as batholiths, laccoliths, dikes, and sills, push upwards into the overlying rock, and crystallize as they intrude.
岩基、岩盖、岩堤、岩席等火成的侵入物向表层岩石推进,并在入侵过程中结晶。
If the application has XSS holes, the attacker may send a malicious script that can still be executed by the application and lead to XSS intrusions.
如果应用程序有xss漏洞,攻击者就可能会发送能被应用程序执行的恶意脚本,导致XSS侵入。
The horizontal lines across the top half of the image are intrusions of igneous rock, where magma poked up to the surface from deep underground.
照片的上半部是火成岩,由地球深处涌出地面的岩浆形成。
There is certainly evidence that some online intrusions are the result of a very different approach to the random assaults mounted by hacktivists.
已有确切证据表明,一些在线侵闯是有黑客们采用形态各异的方法发起的随机攻击的结果。
-
intrusion detection system
入侵侦测系统