obfuscation
美 [ɑbfʌs'keɪʃən]
英 
反义词
同义词
英汉解释
例句
That style of obfuscation was developed, he said in an interview this year, to avoid sensitive questions during congressional testimony.
他今年在接受一次采访时表示,采用这种模糊的措词风格,是为了避免在国会作证期间遇到敏感问题。
What all this indicates is the extent to which magic and mystery and obfuscation are part of the ideology of religion.
这一切表明了魔法、神秘仪式和思想的迷乱在多大程度上成为宗教意识形态的一部分。
But it had shown "breathtaking legal obfuscation" by its efforts to weaken international standards "absolutely prohibiting" torture.
但美国政府弱化“绝对禁止”折磨的国际标准的行为,显示出“令人吃惊的法律困惑”。
But independent analysts have suggested that the panel was particularly concerned about a perceived pattern of obfuscation by the company.
但一些独立分析师暗示,该调查小组认为华为一直在混淆问题。
Sometimes a little linguistic obfuscation might be a good thing.
有时候语言上模糊一点或许是件好事。
It's more complex than minification and thus more likely to generate bugs as a result of the obfuscation step itself.
这是比缩小复杂和因此更容易生成的bug,作为在本身的模糊处理步骤的结果。
The map file can be used to decode obfuscated stack traces as well as for incremental obfuscation.
映射文件可用来解码模糊处理的堆栈跟踪,以及用于增量模糊处理。
Currently, the code obfuscation technology consists of Layout Obfuscation, Control Obfuscation, Data Obfuscation and Preventive Obfuscation.
目前,代码混淆技术主要分为布局混淆、控制流混淆、数据混淆、预防混淆等几种。
Having built such structures, their architects, if they understood them at all, naturally preferred obfuscation to openness.
在建立了这些结构后,它们的建筑师们(如果他们完全了解这些东西的话)自然会倾向于含糊其辞,而非公开透明。
This configuration can protect the servers that are further up the chain, mainly through obfuscation.
这个配置可以保护促进链接的服务器,主要通过混淆技术。
As a powerful means to protect software, object-code obfuscation can obstruct malicious software analysis effectively.
目标代码混淆技术是对软件进行保护的一种有力手段,能够有效地阻挡对软件的恶意分析。
As the example of Japan shows, a short, sharp fall in prices is better than prolonged obfuscation and denial.
日本的例子显示,短期大幅降价比长期的市场低迷和拒绝问题严重性要来得更加明智。
This process is called obfuscation, and the tool is called obfuscator.
这样的一个过程我们称之为混淆,实现混淆的工具成为混淆器。
Love dare not to close to, in alcohol obfuscation and excited, will boldly forward.
爱到不敢靠近,在酒精的迷乱和亢奋之下,才会大胆的向前。
Therefore, you will have to perform the obfuscation outside of the deployment process, perhaps using a post-build step.
因此,您将需要使用生成后步骤在部署过程以外执行模糊处理。
Describes obfuscation and how Dotfuscator provides superior Intellectual Property protection.
介绍模糊处理以及Dotfuscator如何提供出色的知识产权保护。
Value indicating whether the obfuscation tool should remove this attribute after processing.
值,该值指示模糊处理工具是否应在处理后移除此属性。
Instructs obfuscation tools to take the specified actions for an assembly, type, or member.
指示模糊处理工具对程序集、类型或成员采取指定的操作。
Applying the attribute is an alternative to creating a configuration file for the obfuscation tool.
应用此属性是为模糊处理工具创建配置文件的替代方法。
Value indicating whether the obfuscation tool should exclude the type or member from obfuscation.
值,该值指示模糊处理工具是否应将类型或成员从模糊处理中排除。
That increases the likelihood of error, risks rewarding obfuscation, and could leave taxpayers in a hole.
这就增加了发生错误以及风险收益紊乱的可能性,并可能导致纳税人承受损失。
Instructs obfuscation tools to use their standard obfuscation rules for the appropriate assembly type.
指示模糊处理工具对适当的程序集类型使用其标准模糊处理规则。
Obfuscation and deliberate dissembling have complicated this fundamental debate.
混乱不清和蓄意掩饰增加了这场根本辩论的复杂性。
But investigations have uncovered a sorry tale of incompetence, mismanagement, obfuscation and possibly worse.
但调查结果却揭露了一个无能、管理不善、故意混淆及可能更糟的可悲事件。
Explains Control Flow obfuscation and how Dotfuscator Professional Edition uses this technique to foil decompilers.
解释控制流模糊处理以及Dotfuscator专业版如何使用该技术干扰反编译器的使用。
Applying this attribute to an assembly tells the obfuscation tool to use its default rules for the assembly type.
将此属性应用到某一程序集会通知模糊处理工具对该程序集类型使用其默认规则。
A complement to the obfuscation and total timing measurements is a precision between keystrokes requirement.
对密码模糊度和测量总计时的补充是击键需求之间的精度。
The latter remain the obfuscation didn't broad awake, but tore and was bearing what huge of painful common, eyebrows Cu of extra deep.
后者依旧昏迷并没有清醒过来,但撕毁是在承受着什么巨大的痛楚一般,眉头蹙的更加深。
Dotfuscator Professional Edition can handle this step as part of the obfuscation process.
DotfuscatorProfessionalEdition可以将此步骤作为模糊处理过程的一部分进行处理。
The types of obfuscation that you will be exposed to include: renaming; pruning; control flow and string encryption.
您将看到的模糊处理类型包括:重命名、精简、控制流和字符串加密。
Such po-faced obfuscation is standard in corporate jousting around the world.
在世界各地的企业角力中,这种一本正经的否认司空见惯。
Dotfuscator also has configuration settings that interact with the value of the StripAfterObfuscation property at obfuscation time.
Dotfuscator还具有在模糊处理时与StripAfterObfuscation属性的值进行交互的配置设置。
The settings that effect declarative obfuscation attribute stripping and how they interact are summarized in the below table.
下表总结了对去除声明性模糊处理属性产生影响的设置,以及这些设置的交互方式。
Hiding in plain sight is a common tactic for adding obfuscation to a security scheme.
将密码隐藏在视线触及不到的位置是增加安全方案模糊度的常用策略。
It stands to reason that an anti-virus technology may use constant folding to undo the obfuscation created by constant unfolding.
顺理成章地,反病毒技术可以使用常数合并来还原由常数展开造成的混淆。
Microsoft recommends that vendors of obfuscation tools follow the semantics described here.
Microsoft建议模糊处理工具供应商遵循此处描述的语义。
Define the UL_ENABLE_OBFUSCATION compiler directive when compiling the generated database.
在编译生成的数据库时,定义UL_ENABLE_OBFUSCATION编译器指令。
The value passed to this property depends on the obfuscation tool used.
传递给此属性的值取决于使用的模糊处理工具。
However, even if your Web server is using gzip, you will still get a significant boost from GWT obfuscation.
但是,即使您的Web服务器使用gzip,您也能从GWT模糊特性获得明显的速度提升。
and in mental confusion, bewilderment, spiritual obfuscation, or ignorance.
以及困惑、昏沉,精神的蒙昧或无知。