obfuscation

obfuscation

1. Dotfuscator Professional Edition employs advanced control flow obfuscation.

Dotfuscator专业版使用高级控制流模糊处理。

2. Dotfuscator now allows you to specify a program to run before and after obfuscation.

Dotfuscator现在允许您指定要在模糊处理之前和之后运行的程序。

3. Your complete guide to the decompilation and obfuscation of Java code

Java代码反编译和模糊处理的完全指南

4. NET assemblies.It has all common obfuscation features to secure your code.

NET 程序集中所有的元数据名称重命名为难以理解的名称。

5. One-liners are a delicate balance between usefulness and obfuscation, and you have to be prepared to rewrite them as real scripts if necessary instead of keeping baby Frankenstein programs around.

一行程序巧妙地平衡了有用性和复杂性,您必须准备好在需要时将它们重写成实际脚本,而不应让程序过于麻烦而无法控制。

6. The settings that effect declarative obfuscation attribute stripping and how they interact are summarized in the below table.

下表总结了对去除声明性模糊处理属性产生影响的设置,以及这些设置的交互方式。

7. Unfortunately, such obfuscation means China's real economic health is difficult to assess.

不幸的是,这种混淆手段使得中国的实际经济状况难以评估。

8. Any differences? compared with the Protocol Obfuscation version?

与其它版本有何区别?

9. That style of obfuscation was developed, he said in an interview this year, to avoid sensitive questions during congressional testimony.

他今年在接受一次采访时表示,采用这种模糊的措词风格,是为了避免在国会作证期间遇到敏感问题。

10. Their obfuscation made things much worse.

他们的迷惑使得情况更加糟糕。

11. He gave a more lucid exposition of the party's strategy than Bush has managed in months of obfuscation.

他对该党的策略提出一个比布希几个月来的模糊焦点更能清楚易懂的解释。

12. Code obfuscation is literally the act of obscuring your code.

代码模糊处理字面上的意思就是模糊处理您代码的行为。

13. On Code Obfuscation Security Technology

代码混淆技术研究

14. code obfuscation

代码迷惑

15. But investigations have uncovered a sorry tale of incompetence, mismanagement, obfuscation and possibly worse.

但调查结果却揭露了一个无能、管理不善、故意混淆及可能更糟的可悲事件。

16. It provides obfuscation features like Name, String and Control Flow Obfuscation.

使用模糊特性后,反编译后的代码将无法再次进行编译,因为模糊后的名称无法在任何 .

17. The sections of code which perform the checksumming operations may be further hidden using code obfuscation techniques to prevent static analysis.

利用代码混淆技术深藏执行校验和计算的代码区,将会防止对程序进行静态分析。

18. Variable Renaming The renaming obfuscation transformation replaces a given identifier with another. The replacement can occur throughout a given live range of the variable, or throughout the whole program.

变量重命名变量重命名采用其他的变量命称来替代原来的变量。这种替换可以在一个给定的生存期范围或是整个程序。

19. Only pedants believe in the advantage of obfuscation.

只有书呆子才相信使人困惑会有好处。

20. Another reason for obfuscation is to mask differences among rate-setters.

困惑的另一个原因是掩饰利率制定者之间的不同意见。

21. The House's climate bill is a masterpiece of obfuscation.

国会的气候变化法案让人困惑不已。

22. On Wall Street, this obfuscation of actual performance is an art form.

在华尔街,这种对实际回报大搞混淆视听的做法已是一种惯例。

23. Technique of Code Obfuscation Based on Function Pointer Array

基于函数指针数组的代码迷惑技术

24. Technique of Code Obfuscation Based on Function Recursion

基于多分支语句的控制流迷惑技术

25. Incremental obfuscation is an advanced feature of particular interest to enterprise development teams maintaining an integrated application environment.

增量模糊处理这一高级功能专门针对维护集成应用程序环境的企业开发小组。

26. For new comer of network programming, there is a big obfuscation, "how to make my own protocol to encode package sends to peer network application?

对于很多网络编程的新手来说,如何设计自己的通信协议是一个比较迷惑的问题。

27. 's embassy was downplayed, while the seriousness of irrelevant incidents was exaggerated. Their deliberate obfuscation of the issue and shameless spouting of nonsense show up their malevolence.

将自己炸别人写得轻淡几笔,却将不相干的事情写得严重无比,因果倒置,胡扯耍赖,其邪恶由此可见。

28. Despite all the controversy, decompilation and obfuscation techniques are here to stay, and they re only going to get more sophisticated over the next several years.

尽管有许多争议,反汇编和模糊处理的技术如今依然存在,并且在今后的几年中只会变得更加成熟和完善。

29. Attributes provide a way for assembly authors to annotate their binaries so that obfuscation tools can process them correctly with minimal external configuration.

属性为程序集作者提供一种批注二进制文件的方法,以便模糊处理工具能够使用最少的外部配置正确处理这些二进制文件。

30. Applying the attribute is an alternative to creating a configuration file for the obfuscation tool.

应用此属性是为模糊处理工具创建配置文件的替代方法。

31. when such obfuscation compounds the tragedy.

当这种混淆事实的做法更加速悲剧的发生的时候。

32. The types of obfuscation that you will be exposed to include: renaming; pruning; control flow and string encryption.

您将看到的模糊处理类型包括:重命名、精简、控制流和字符串加密。

33. Our primary concern should be to avoid such obfuscation and make diagnosis as easy as possible.

我们首要关注的应该是避免这种困惑,使诊断尽可能容易。

34. what all this indicates is the extent to which magic and mystery and obfuscation are part of the ideology of religion.

所有这一切都表明,宗教意思的范畴,莫过于迷幻、神奇、困惑等。

35. Extended options are designed to allow for basic obfuscation from the command line, without requiring you to first create a configuration file.

扩展选项旨在允许从命令行进行基本模糊处理,而无需先创建配置文件。

36. Instructs obfuscation tools to take the specified actions for an assembly, type, or member.

指示模糊处理工具对程序集、类型或成员采取指定的操作。

37. Instructs obfuscation tools to use their standard obfuscation rules for the appropriate assembly type.

指示模糊处理工具对适当的程序集类型使用其标准模糊处理规则。

38. Library Mode By Assembly Declarative Obfuscation By Assembly

按程序集选择库模式

39. Control Flow Obfuscation exclusion rules.

控制流模糊处理排除规则。

40. control flow obfuscation

控制流混乱

41. control obfuscation

控制迷惑

42. Tip: In the build cycle, always perform obfuscation before divverification.

提示:在编译周期中,应当在预校验之前进行混淆。

43. “Please use eMule 0.47c and enable protocol obfuscation to get results from this server (62.241.53.2)”

搜索任何东西都是出现80条一样的提示必须使用迷惑协议?

44. Keywords DRM;model for DRM;protocols for DRM;software obfuscation;opaque predicates;

数字版权保护;版权保护模式;版权保护协议;软件混淆;不透明谓词;

45. data obfuscation

数据混淆

46. From the point of reverse analysis,this article introduces classification of object-code obfuscation and some typical technologies of object-code obfuscation.

文中从逆向分析的角度出发介绍了目标代码混淆技术的分类及几种典型的目标代码混淆技术的实现及混淆效果。

47. The map file can be used to decode obfuscated stack traces as well as for incremental obfuscation.

映射文件可用来解码模糊处理的堆栈跟踪,以及用于增量模糊处理。

48. Original Source Code Before Obfuscation

模糊处理之前的原始源代码

49. One major drawback of obfuscation is that the task of maintaining and troubleshooting an obfuscated application becomes more difficult.

模糊处理的一个主要缺点是维护经模糊处理的程序以及对其进行故障排除的工作变得更加困难。

50. Goal of Obfuscation The goal of

模糊处理的目的

51. The solution proposed will be based on different obfuscation techniques used to protect a single sample of location information.

此开发中的解决方案会使用各种不同扰乱数据的方式来保护每一份地理资料。

52. Mr Porter has an ear for the politician's forked tongue and the language of obfuscation.

波特先生对政治家的假话连篇和欺世之言有着超高的领悟力。

53. object - code obfuscation

目标代码混淆

54. As a powerful means to protect software, object-code obfuscation can obstruct malicious software analysis effectively.

目标代码混淆技术是对软件进行保护的一种有力手段,能够有效地阻挡对软件的恶意分析。

55. An Overview of Object - Code Obfuscation Technologies

目标代码混淆技术综述

56. An automated way to get shorter names is to use obfuscation tools.

自动获取短名字的办法就是使用混淆工具。

57. Formed in 1979, the Plain English Campaign is an independent group that campaigns against cliches, jargon and obfuscation, particularly in official and public documents.

英国简明英语组织成立于1979年,是一个独立机构,专门从事反对使用陈词滥调、行话和含糊不清的词语的活动,特别是那些在官方和公共文件中出现的词语。

58. Since using structural character and prime product, the model would not be confused by common methods of code obfuscation and could identify that some polymorphic codes were equivalent.

该模型采用了结构化特征及素数乘积等方法,可以较好地对抗一些常见的代码迷惑手段,从而识别出一些变形的代码是等价的。

59. An Important Step in Software Development--Obfuscation

软件开发中的一个重要环节--混淆

60. Software Obfuscation

软件迷乱

61. "What all these reificaitions have in common is their obfuscation of marriage as an ongoing human production."

这些具体化都具有的共同点是,对婚姻作为持续的人类生产而言,它们的观点十分混乱。

62. That increases the likelihood of error, risks rewarding obfuscation, and could leave taxpayers in a hole.

这就增加了发生错误以及风险收益紊乱的可能性,并可能导致纳税人承受损失。

63. The attack was notable for its level of sophistication, using obfuscation techniques not typically seen in attacks on corporations, he said.

这次袭击是其显着的复杂程度,一般不使用对公司的攻击,在看到模糊手法,他说。

64. This mode of bass reinforcement by resonance often causes boomy obfuscation of the true musical pitch-something akin to singing into a barrel(New York Times)

这种通过回响加强低音的方式常常使人听不清真正的音调而听到隆隆的响声,好象对着一个桶唱歌(纽约时报)

65. The water bead which wipes stem to long for on the face iciness, the man who is longed for in the obfuscation to regard as the 卓 king's, heart-broken voice, response in his heart, bomb 鸣 .

那个心疼地擦干相思脸上冰冷的水珠,那个被相思在昏迷中当作卓王孙的男子,心碎的声音,在他心中回响,轰鸣。

66. 8.It stands to reason that an anti-virus technology may use constant folding to undo the obfuscation created by constant unfolding.

顺理成章地,反病毒技术可以使用常数合并来还原由常数展开造成的混淆。

67. (1) Obfuscation (scrambling) of JavaScript, JScript standalone files;

( 1 )迷惑(抢)的JavaScript , JScript的独立档案;

英语宝典
考试词汇表