入侵

rù qīn
  • intrusion;invade;incursion;intrude;make an incursion;make inroads
入侵入侵
入侵 [rù qīn]
  • (1) [invade]∶以征服或虏掠为目的的窜犯

  • 消灭一切敢于入侵的敌人

  • (2) [intrude]∶未经邀请、允许或欢迎而入;强行进入

  • 入侵飞机

入侵[rù qīn]
  1. 他命令军队在拂晓入侵。

    He ordered the army to invade at dawn .

  2. SQLInjection和CSSHole入侵解决方案研究

    The Solution Study of SQL Injection and CSS Hole Invade

  3. 他们召集士兵对抗入侵的军队。

    They gathered soldiers to fight the invading army .

  4. 这些训练是为了准备入侵而进行的演习。

    These training exercises are designed to be a rehearsal for the invasion .

  5. 自美国入侵以来,总统的声望一落千丈。

    Since the US invasion the president 's reputation has nosedived .

  6. 美国海军舰队参加了入侵行动。

    An armada of U.S. Navy ships participated in the invasion .

  7. 外敌入侵时,他作为占领者的傀儡行使统治。

    When the invasion occurred he ruled as a puppet of the occupiers

  8. 入侵行动因遭遇到了出乎意料的顽强抵抗而受阻。

    The invasion was held up by unexpectedly stout resistance .

  9. 罗马人以及诺曼人通过军事入侵来到英国。

    The Romans and the Normans came to Britain as invading armies .

  10. 即使是有强烈安全意识的计算机用户也时刻处于计算机病毒入侵的威胁下。

    Even the most security-conscious computer user is under constant threat from computer viruses .

  11. 奥森·韦尔斯使得许多美国人相信他们正遭到火星人的入侵。

    Orson Welles managed to convince many Americans that they were being invaded by Martians .

  12. 1935年国际联盟在意大利入侵埃塞俄比亚之后对其实施了制裁。

    In 1935 the League of Nations imposed sanctions against Italy following its invasion of Ethiopia .

  13. 他提醒某些更为狂热的将军要考虑入侵带来的后果。

    He has warned some of his more gung ho generals about the consequences of an invasion

  14. 开始返航了,但是在这之前一架入侵的飞机曾反复在轮船上空盘旋。

    The voyage home began , but not before an intruding aeroplane had repeatedly circled the ship .

  15. 盟军明日演习,来展示一旦发生新的入侵,其集结速度之快。

    Allied troops begin maneuvers tomorrow to show how quickly forces could be mobilized in case of a new invasion

  16. 战士们守卫边疆,防止外敌入侵。

    Soldiers guard the frontier against invasion .

  17. 3艘入侵军舰被一举击沉。

    Three invading battleships were sunk at one stroke .

  18. 他们明目张胆地对我国不断发动武装入侵。

    They openly and wantonly carried out repeated armed intrusions into our country .

  19. 有军队入侵该国。

    Soldiers invaded the country .

  20. 那些部队对邻国领土发动了入侵。

    Those forces launched an invasion of a neighbor 's territory .

  21. 防沙林阻止流沙入侵。

    A sand-break forest stops the encroachment of drifting sand .

  22. 入侵部队正在国际监督下撤出占领区。

    The invading troops are pulling out of the occupied area under international supervision .

  23. 城市沦陷之后,军纪混乱,入侵士兵(四处)抢夺掠杀。

    Discipline quickly broke down after the city fell , and the invading soldiers were found to be looting and sometimes killing .

  24. 需要注意的是,苹果公开拒绝政府的要求,本身就是对政府大规模入侵的一种阻碍。

    Note that Apple 's public opposition to the government 's request is itself a hindrance to mass government intrusion .

  25. 苹果及其他科技公司还有另一个优势:拥有使设备越来越难以被入侵的技术手段。

    Apple and other tech companies hold another ace : the technical means to keep making their devices more and more inaccessible

  26. 所以,目前就许多涉及政府入侵数据的案子而言,那些曾经单打独斗、为隐私而战的倡导者发现现在与世界上最强大的公司一起并肩作战。

    So now , for many cases involving governmental intrusions into data , once-lonely privacy advocates find themselves fighting alongside the most powerful company in the world .

  27. 美国大自然保护协会还向众多入侵物种发起了宣战,从羊群到植物再到具有攻击性的阿根廷蚁。

    The Nature Conservancy has    declared   war on a multitude of invasive species here , from sheep to plants to the   aggressive   Argentine ant .

  28. “没有什么方法能百分之百防止入侵,”兹阿尔斯基说,但他指出法官在这起案件中下令要求苹果提供“合理的安全协助”,破解法鲁克的手机。

    " Nothing is 100 percent hacker-proof , " Mr. Zdziarski said , but he pointed out that the judge 's order in this case required Apple to provide " reasonable security assistance " to unlock Mr. Farook 's phone .

  29. 这项命令本质上是要求苹果公司入侵自己的设备,一旦这样做了,那么在那些并未涉及国家安全威胁的调查中,这个先例就会绕过加密技术的执法行动提供正当理由。

    The order essentially asks Apple to hack its own devices , and once it is in place , the precedent could be used to justify law enforcement efforts to get around encryption technologies in other investigations far removed from national security threats .

  30. 如果苹果公司被迫编写代码让联邦调查局进入圣贝纳迪诺袭击者赛义德·里兹万·法鲁克用过的iPhone5c的话,如果某个黑客获取了这些代码、用来入侵其他设备,那谁来负责呢?

    If Apple is forced to write code that lets the F.B.I. get into the Phone 5c used by Syed Rizwan Farook , the male attacker in the San Bernardino attack , who would be responsible if some hacker got hold of that code and broke into its other devices ?