obfuscated
推荐文章

v.
使模糊,使混乱( obfuscate的过去式和过去分词 );使糊涂;
英英释义
obfuscate[ ɔb'fʌskeit, 'ɔbfʌskeit ]
v.make obscure or unclear
双语例句
用作动词(v.)
This message might appear if you obfuscate the solution code.
如果您对解决方案代码进行模糊处理,可能显示此消息。
He delighted in his ability to obfuscate.
他对自己有本事把别人搞得晕头转向感到得意。
The writer often obfuscates the real issues with petty details.
那作家常以细枝末节来混淆实质问题。
权威例句
Reverse Engineering Obfuscated CodeStatic disassembly of obfuscated binaries
Attacking an Obfuscated Cipher By Injecting Faults
Attacking an Obfuscated Cipher by Injecting Faults
Static Disassembly of Obfuscated Binaries.
Obfuscated malicious javascript detection using classification techniques
Deobfuscation: Reverse Engineering Obfuscated Code
Deobfuscation: reverse engineering obfuscated code
Deobfuscation: Reverse Engineering Obfuscated Code
Detection of injected, dynamically generated, and obfuscated malicious code
1. He obfuscated the problem we argued.
他把我们争论的问题搞得模糊不清了。
youdao
2. Notice the obfuscated names of the form fields.
注意,表单字段的名称很古怪。
youdao
3. Deliberately obfuscated source code is not allowed.
故意模糊的源代码是不允许的。
youdao
4. Deliberately obfuscated source code is not allowed.
故意地使源代码变得含混晦涩是不允许的。
youdao
5. Lists the classes and members that are not obfuscated.
列出那些未混淆的类和成员。
youdao
6. Obfuscated HTML will also not be read by search engines.
混淆html也不会被搜索引擎读取。
youdao
7. See Decoding Obfuscated Stack Traces for more information.
更多信息,查看解码混淆过的堆栈跟踪信息。
youdao
8. To use it, we just need to provide the obfuscated type name.
要使用它,我们只需要提供类型名称混淆。
youdao
9. As we can see, all of the strings have been obfuscated, but still all the.
正如我们可以看到,字符串都被混淆,但仍然所有。
youdao
10. It is obfuscated, or condensed, to improve the runtime performance of the application.
该代码含义模糊(即简短),从而可提高应用程序的运行时性能。
youdao
11. The file names are obfuscated containing about 30 alphanumeric digits, bit still this does not feel good.
文件名被混淆,包含约30个字母数字数字,位仍然感觉不好。
youdao
12. If we put brevity too high on our list of priorities, we will end up with code that is hopelessly obfuscated.
如果我们赋予简洁太高的优先级,我们终将无可奈何地陷入令人困惑的代码之中。
youdao
13. We'd expect you to write now or perhaps ever since this program was written as part of an obfuscated C contest.
我希望你们现在就开始写程序,否则你们将会在C语言比赛中,写得非常糟糕。
youdao
14. However, another team started later but successfully obfuscated all nine samples of malicious code in 2 hours 25 minutes.
然而,另一个稍晚开始比赛的小组用了两小时二十五分成功的完成了所有九个病毒代码样本的伪装。
youdao
15. This fact may be obfuscated by our simple example earlier in which the polymorphic recursion occurs as a simple, direct self-reference.
我们先前的简单示例(其中,多态递归作为一个简单直接的自引用发生)会使这一事实变得模糊。
youdao
16. A protection scheme of mobile agents based on obfuscated agent data variables and time checking technology is presented in this paper.
提出一种基于迷乱代理数据变量和时间核查技术的移动代理保护方案,同时给出获得时间核查技术中主要数据的方法。
youdao
17. Is there a way in ASP to convert this string to UTF-8 after reading it from the database to pass it to the third party component (obfuscated)?
是否有asp的方式来这个字符串为utf- 8转换从数据库读取它它传递给第三方组件(模糊)后?
youdao
18. Note that "uw" is the obfuscated variable h_isBeingEdited, which would be true if the current document is being displayed as part of a ?EditDocument request.
注意,"uw"是模糊变量 h_isBeingEdited,如果当前文档正作为 ?EditDocument请求的一部分显示,它将为真。
youdao
19. The password is stored in an obfuscated format, but should not be considered secure from decryption efforts if access to the configuration file is obtained.
密码会以乱数格式保存,但如果其他人获得了对此配置文件的访问权,在充足的解密尝试下它依然是不安全的。
youdao
20. Residual coding is even more difficult to understand than motion vector coding, as the only full reference is a bunch of highly optimized, highly obfuscated C code.
剩下的编码甚至比运动矢量编码更难理解,因为唯一的完整参考是一堆高度优化的,高度混淆的C代码。
youdao
21. The actual password "systempassword" is encoded using the XOR API described earlier so that it is obfuscated; it can't be read by another user who views the config file.
如前面所述,已利用XORAPI对真实密码“systempassword”进行编码,实现了模糊处理;查看配置文件的其他用户无法读取该密码。
youdao
22. By retaining a copy of the mapping.txt file for each release build, you ensure that you can debug a problem if a user encounters a bug and submits an obfuscated stack trace.
通过保存发布构建版本的mapping .txt文件拷贝,确保当用户碰到bug,并把混淆后的堆栈调试跟踪信息提交给你时,你可以进行调试从而修复问题。
youdao
23. In a well obfuscated application, the names of all types, methods, and fields are changed from their carefully thought out, informative names into meaningless, semi-random names.
在经过很好的模糊处理的应用程序中,所有类型、方法和字段的名称都从经过深思熟虑想出的富有含义的名称变为无意义的半随机名称。
youdao
24. This produces the effect of a bright highlight on the edge of a surface that faces away from lights in the scene, while edges that face lights directly have their highlights obfuscated.
这产生了一个在表面的边缘上一个高亮的效果,当在场景里远离灯光的面上,当边缘面对灯光时有它自己的模糊的高光。
youdao
25. Fortunately, whenever ProGuard runs, it outputs a /bin/proguard/mapping.txt file, which shows you the original class, method, and field names mapped to their obfuscated names.
幸运的是,每当混淆器运行时候,它都会输出到文件/bin/proguard/mapping.txt中,该文件包含了从原始类,方法和属性名字到混淆后名字的映射。
youdao
26. Fortunately, whenever ProGuard runs, it outputs a /bin/proguard/mapping.txt file, which shows you the original class, method, and field names mapped to their obfuscated names.
幸运的是,每当混淆器运行时候,它都会输出到文件/bin/proguard/mapping.txt中,该文件包含了从原始类,方法和属性名字到混淆后名字的映射。
youdao
obfuscated




