obfuscating信息详情

obfuscating发音

意思翻译

vt.使模糊;使迷乱;弄暗

相似词语短语

obfuscations───n.困惑;模糊;昏迷

obfuscation───n.困惑;模糊;昏迷

confiscating───vt.没收;充公;查抄;adj.被没收的

obtruncating───vt.砍去头部

bifurcating───vt.使分支;使分叉(bifurcate的现在分词);vi.分支;分叉(bifurcate的现在分词)

coruscating───adj.闪光的,闪耀的;生动的;睿智的;惊人的;v.闪光,闪耀;(人)充满活力,风趣幽默(coruscate的现在分词)

furcating───v.分为两个部分,分叉;adj.叉形的,分叉的

obfuscate───vt.使模糊;使迷乱;弄暗

obfuscated───v.(使)模糊;(使)迷惑不解(obfuscate的过去式及过去分词)

双语使用场景

Stop obfuscating the information and embellishing it.───不要再刻意润饰各种一塌糊涂的信息了。

They are obfuscating the issue, as only insurance companies can.───他们在这个问题上混淆视听,也只有保险公司才做得出这种事。

Cryptography is the process of hiding or obfuscating data so prying eyes can't understand it.───加密是隐藏或混淆数据以避免被偷窥的过程。

For a man who dramatised the obfuscating power of language, these poems ring with a remarkable sincerity.───对一个夸大语言混淆力的人来说,这些诗充满了不同寻常的真挚。

The experiment results show that obfuscating transformation can be used to improve the survivability of the malicious code.───试验结果表明模糊变换技术可以有效地提高恶意代码的生存能力。

Have Chinese officials changed their minds again on Green Dam - or was the one quoted today in a local newspaper just obfuscating ?───国官员是否再次改变了有关“绿坝”过滤软件的想法--抑或是当地报纸所作的引述模糊不清?

Seems like a pretty good deal to me, $100 software for free and all you have to do is not have some icon obfuscating image on your desktop?───看起来像一个不错的交易,100美元的软件免费使用,而你所必须付出的代价只是桌面图片被屏蔽而已。

Now obfuscating the Java code is one of the most practical solutions to protect the Java software.───而目前最实用的解决方法就是对Java程序进行混淆。

So how should we respond? First of all, the U. S. Treasury Department must stop fudging and obfuscating.───问题是我们如何应对?首先,美国财政部必须停止回避与模糊的政策。

英语使用场景

In the nighttime version, by contrast, violent white lines cross the image in all directions, obfuscating a washed-out bed of flowers reduced to a symbolic recollection of its previous likeness.

They are obfuscating the issue, as only insurance companies can.

The CFG generation process can also be attacked by obfuscating the assembly code such that one cannot determine the correct target of a jump instruction, such as using a jump through register.

It remains a mystery whether Yeltsin knew about it and was deliberately obfuscating.

What sort of knucklehead uses a word like obfuscating?

We described all kinds of obfuscating methods as viewed from byte code and designed effective method to produce redundant code.

This stage can be attacked by obfuscating the call instruction – say, by using a combination of the push and jump instructions.