tampering
英[ˈtæmpərɪŋ]
美[ˈtæmpərɪŋ]
- n. 干预;贿赂
- v. 干预(tamper 的现在分词)
双语例句
- 1. I don't want to be accused of tampering with the evidence.
- 我不想被指控篡改证据。
《柯林斯英汉双解大词典》
- 2. Someone has been tampering with the machine.
- 有人乱动了这台机器。
youdao
- 3. For them, a better word than "creation" is "tampering".
- 对于科学家们而言,“篡改”的世界比“创造”的世界更美好。
youdao
- 4. And man has been tampering with nature for millennia.
- 而且人类几千年来一直在改造自然。
youdao
- 5. Sealing also provides a security measure to detect code tampering.
- 密封还提供了防止代码篡改的手段。
youdao
- 6. Tampering involves someone intercepting a message and then changing it.
- 篡改包括某人拦截一条消息并更改它。
youdao
- 7. He looks over the bare concrete floor, looking for any sign of tampering.
- 他看着光秃的混凝土地板,寻找任何不寻常的迹象。
youdao
- 8. All messages in transit should be protected from tampering by untrusted intermediaries.
- 应该防止传输中的所有消息受到不可靠中介的篡改。
youdao
- 9. There's no evidence of such tampering, but for climate skeptics, it might not matter.
- 虽然不存在人为操纵的确凿证据,但是对于气候变化怀疑论者,这也许并不重要。
youdao
- 10. Other users would then be prevented from tampering with any objects created in the schema.
- 这样就可以防止其他用户篡改在这个模式中创建的任何对象。
youdao
- 11. This means that all network traffic is encrypted, and tampering with messages is also detected.
- 这意味着所有网络传输都是加密的,并且消息篡改也可以检测到。
youdao
- 12. View state can also be hashed or encrypted to prevent a user from tampering with or decoding it.
- 还能对ViewState进行哈希或加密,以防止用户篡改或解码。
youdao
- 13. The codes will match if the image is authentic but will be inconsistent if tampering occurred.
- 若编码一致则图像是原始的,反之,则发生了伪造的行为。
youdao
- 14. Tampering with cartons is easily detected. I should say that this rather discourages pilferage.
- 纸箱弄破是容易检查出来的,我说这恰恰可以防止偷盗。
youdao
- 15. It also prevents tampering with or intimidation of such witnesses before they testify at trial.
- 它也保护证人在初审提供证词之前不受行贿的干扰和威胁恐吓。
youdao
- 16. If there is to be tampering with the laws of succession here, let it be before any babies appear.
- 要是继承法会有改变,那么最好发生在未来的王子或公主诞生以前。
youdao
- 17. Unlike his other duplicates, this clone would not undergo growth acceleration or docility tampering.
- 跟他的其他复制品不同,这名克隆体将不会接受生长加速以及思维驯化。
youdao
- 18. Could terrorists or hackers cause financial chaos by tampering with Wall Street's computerised trading systems?
- 恐怖份子与黑客通过篡改华尔街电脑交易系统制造金融混乱,可以吗?
youdao
- 19. Tampering is addressed by a message digest, which is a fixed size numeric representation of the contents of a message.
- 消息摘要解决了篡改问题,消息摘要是消息内容的定长数字表示。
youdao
- 20. The third was abandoned after the judge received information that indicated “a serious attempt at jury tampering”.
- 当法官收到情报显示存在“严重的贿赂陪审团的企图”后,第三次审理也就嘎然而止。
youdao
- 21. He says the experts looked to see if there was any tampering of the video and whether the people who were filmed were actors.
- 海恩斯说,这些专家查看了这段录像是否受到篡改以及被拍摄的人是不是演员。
youdao
- 22. The certificates used in SSL contain identity information and are encapsulated in a cryptographic envelope to prevent tampering.
- SSL中使用的证书包含标识信息,并被压缩在一个加密的信封中以防篡改。
youdao
- 23. The model minimizes the risk of tampering with the authorization data so that servers do not spend more time in verifying the data.
- 这个模型将篡改授权数据的风险降至了最低,因此服务器不用花费大量的时间来验证数据了。
youdao
- 24. Several of these attack types are familiar; these same types of attack occur with any remotely accessible service (for example, message tampering).
- 其中有些攻击类型是比较常见的,这些相同的攻击类型会出现在任何可以远程访问的服务中(例如,消息篡改)。
youdao
- 25. WS-Security USES XML signature to ensure that data has not been tampered with in transit, because any tampering would invalidate the signature.
- WS - Security使用XMLSignature确保数据不会在传输中被篡改,因为任何窜改都会导致签名失效。
youdao
- 26. The resulting uncertainty, combined with the problem of proving that tampering did not occur, makes public companies very edgy about their controls.
- 这导致的不确定性,加上提供没有发生篡改情况的证据的问题,使得公司对于他们的控制非常急躁。
youdao
- 27. Fiola remained oblivious to the tampering because the bot operators made sure they didn't slow down the computer too much by consuming lots of memory.
- 由于僵尸网络操作者控制了这一过程的内存消耗,避免使计算机速度降低过多,菲欧拉从来没有注意到计算机被动过手脚。
youdao
- 28. Data tampering — Exploiting weakness in the access control mechanism that permits the attacker to make unauthorized calls to the Web service to alter data.
- 数据篡改——利用访问控制机制中允许攻击者对Web服务进行未经授权调用的弱点来更改数据。
youdao
- 29. The session has explicitly chroot jail configured to avoid malicious activity or tampering with the system. Following are few handy IBM SONAS CLI commands.
- 这个会话显式地配置了根目录变更限制,从而避免恶意活动或篡改系统的行为。
youdao
- 30. The session has explicitly chroot jail configured to avoid malicious activity or tampering with the system. Following are few handy IBM SONAS CLI commands.
- 这个会话显式地配置了根目录变更限制,从而避免恶意活动或篡改系统的行为。
youdao
百度翻译
有道翻译