obfuscation
美 [ɑbfʌs'keɪʃən]英
- n.昏迷
- 网络混淆;困惑;模糊
obfuscation
obfuscation
混淆
也就是前面提到过的混淆(obfuscation)。 关注此文的读者还看过:·2013-5-18 7:05:00 Hashtable简易数据库程序
困惑
英语新词汇与常用词汇的翻译(O1)|无忧教育 ... obfuscate 模糊 obfuscation 困惑 obiit 卒 ...
模糊
模糊(Obfuscation)处理JAVASCRIP脚本源代码。你需要对ASP.NET的开发基本流程和核心技术有相当的了解,本系列文章 …
模糊处理
网页程式模糊处理(obfuscation)工具 透过程式缩小化,变数无意义化,字串16进制化等方式进行网页程式的馍糊化,美国的前十大 …
昏迷
猴哥2300--7 flashcards | Quizlet ... obfuscate 弄暗,变模糊 obfuscation 昏迷,困惑 obligatory 义务的 ...
混淆加密
.Net开发常用辅助工具集_不一_样_百度空间 ... Compilation( 编译工具) Obfuscation( 混淆加密) Decompilation( 反编译…
模糊化
让骇客无法使用模糊化(obfuscation) 方式,避开IDP 各种侦测功能。 应用感知/ 辨识 使用context、协定资讯,特徵码等,来辨 …
代码混淆
...修改配置文件、填写正确的类名,而且桌面程序通常要做代码混淆(Obfuscation),会导致基于类名的反射失效。
1
That style of obfuscation was developed, he said in an interview this year, to avoid sensitive questions during congressional testimony.
他今年在接受一次采访时表示,采用这种模糊的措词风格,是为了避免在国会作证期间遇到敏感问题。
2
What all this indicates is the extent to which magic and mystery and obfuscation are part of the ideology of religion.
这一切表明了魔法、神秘仪式和思想的迷乱在多大程度上成为宗教意识形态的一部分。
3
But it had shown "breathtaking legal obfuscation" by its efforts to weaken international standards "absolutely prohibiting" torture.
但美国政府弱化“绝对禁止”折磨的国际标准的行为,显示出“令人吃惊的法律困惑”。
4
But independent analysts have suggested that the panel was particularly concerned about a perceived pattern of obfuscation by the company.
但一些独立分析师暗示,该调查小组认为华为一直在混淆问题。
5
Sometimes a little linguistic obfuscation might be a good thing.
有时候语言上模糊一点或许是件好事。
6
It's more complex than minification and thus more likely to generate bugs as a result of the obfuscation step itself.
这是比缩小复杂和因此更容易生成的bug,作为在本身的模糊处理步骤的结果。
7
The map file can be used to decode obfuscated stack traces as well as for incremental obfuscation.
映射文件可用来解码模糊处理的堆栈跟踪,以及用于增量模糊处理。
8
Currently, the code obfuscation technology consists of Layout Obfuscation, Control Obfuscation, Data Obfuscation and Preventive Obfuscation.
目前,代码混淆技术主要分为布局混淆、控制流混淆、数据混淆、预防混淆等几种。
9
Having built such structures, their architects, if they understood them at all, naturally preferred obfuscation to openness.
在建立了这些结构后,它们的建筑师们(如果他们完全了解这些东西的话)自然会倾向于含糊其辞,而非公开透明。
10
This configuration can protect the servers that are further up the chain, mainly through obfuscation.
这个配置可以保护促进链接的服务器,主要通过混淆技术。
11
As a powerful means to protect software, object-code obfuscation can obstruct malicious software analysis effectively.
目标代码混淆技术是对软件进行保护的一种有力手段,能够有效地阻挡对软件的恶意分析。
12
As the example of Japan shows, a short, sharp fall in prices is better than prolonged obfuscation and denial.
日本的例子显示,短期大幅降价比长期的市场低迷和拒绝问题严重性要来得更加明智。
13
This process is called obfuscation, and the tool is called obfuscator.
这样的一个过程我们称之为混淆,实现混淆的工具成为混淆器。
14
Love dare not to close to, in alcohol obfuscation and excited, will boldly forward.
爱到不敢靠近,在酒精的迷乱和亢奋之下,才会大胆的向前。
15
Therefore, you will have to perform the obfuscation outside of the deployment process, perhaps using a post-build step.
因此,您将需要使用生成后步骤在部署过程以外执行模糊处理。
16
Describes obfuscation and how Dotfuscator provides superior Intellectual Property protection.
介绍模糊处理以及Dotfuscator如何提供出色的知识产权保护。
17
Value indicating whether the obfuscation tool should remove this attribute after processing.
值,该值指示模糊处理工具是否应在处理后移除此属性。
18
Instructs obfuscation tools to take the specified actions for an assembly, type, or member.
指示模糊处理工具对程序集、类型或成员采取指定的操作。
19
Applying the attribute is an alternative to creating a configuration file for the obfuscation tool.
应用此属性是为模糊处理工具创建配置文件的替代方法。
20
Value indicating whether the obfuscation tool should exclude the type or member from obfuscation.
值,该值指示模糊处理工具是否应将类型或成员从模糊处理中排除。
21
That increases the likelihood of error, risks rewarding obfuscation, and could leave taxpayers in a hole.
这就增加了发生错误以及风险收益紊乱的可能性,并可能导致纳税人承受损失。
22
Instructs obfuscation tools to use their standard obfuscation rules for the appropriate assembly type.
指示模糊处理工具对适当的程序集类型使用其标准模糊处理规则。
23
Obfuscation and deliberate dissembling have complicated this fundamental debate.
混乱不清和蓄意掩饰增加了这场根本辩论的复杂性。
24
But investigations have uncovered a sorry tale of incompetence, mismanagement, obfuscation and possibly worse.
但调查结果却揭露了一个无能、管理不善、故意混淆及可能更糟的可悲事件。
25
Explains Control Flow obfuscation and how Dotfuscator Professional Edition uses this technique to foil decompilers.
解释控制流模糊处理以及Dotfuscator专业版如何使用该技术干扰反编译器的使用。
26
Applying this attribute to an assembly tells the obfuscation tool to use its default rules for the assembly type.
将此属性应用到某一程序集会通知模糊处理工具对该程序集类型使用其默认规则。
27
A complement to the obfuscation and total timing measurements is a precision between keystrokes requirement.
对密码模糊度和测量总计时的补充是击键需求之间的精度。
28
The latter remain the obfuscation didn't broad awake, but tore and was bearing what huge of painful common, eyebrows Cu of extra deep.
后者依旧昏迷并没有清醒过来,但撕毁是在承受着什么巨大的痛楚一般,眉头蹙的更加深。
29
Dotfuscator Professional Edition can handle this step as part of the obfuscation process.
DotfuscatorProfessionalEdition可以将此步骤作为模糊处理过程的一部分进行处理。
30
The types of obfuscation that you will be exposed to include: renaming; pruning; control flow and string encryption.
您将看到的模糊处理类型包括:重命名、精简、控制流和字符串加密。