obfuscated

英 [ˈɒbfʌskeɪtɪd] 美 [ˈɑːbfʌskeɪtɪd]

v.  (故意地)混淆,使困惑,使模糊不清
obfuscate的过去分词和过去式



柯林斯词典

  1. VERB (故意地)混淆,使混乱,使困惑
    To obfuscate something means to deliberately make it seem confusing and difficult to understand.
    1. They are obfuscating the issue, as only insurance companies can...
      他们在此问题上混淆视听,这事只有保险公司才做得出来。
    2. Macdonald accepted that such information could be used to manipulate, to obfuscate, and to mislead.
      麦克唐纳相信这样的信息可以用来操纵舆论,蒙蔽误导。

双语例句

  1. The JavaBeans specification isn't doing you any favors if it forces you to write obfuscated code!
    如果JavaBeans规范强制您编写混淆代码,那么它不会给您带来任何帮助。
  2. Notice the obfuscated names of the form fields.
    注意,表单字段的名称很古怪。
  3. Obfuscated HTML will also not be read by search engines.
    混淆HTML也不会被搜索引擎读取。
  4. The actual password "systempassword" is encoded using the XOR API described earlier so that it is obfuscated; it can't be read by another user who views the config file.
    如前面所述,已利用XORAPI对真实密码“systempassword”进行编码,实现了模糊处理;查看配置文件的其他用户无法读取该密码。
  5. Trying to debug an application that has scripts that have been shuffled and obfuscated is not for the faint of heart.
    尝试调试一个应用程序,脚本已经洗牌和模糊的,是不是为胆小。
  6. Obfuscated code or scripts are designed to be hidden within the normal code for your site, so they can be hard to detect.
    伪装代码或脚本的目的是隐藏在正常的代码为您的网站,以便他们能够就很难发现。
  7. We'd expect you to write now or perhaps ever since this program was written as part of an obfuscated C contest.
    我希望你们现在就开始写程序,否则你们将会在C语言比赛中,写得非常糟糕。
  8. This approach won't work if the application to fool is protected in such a way that its import table is obfuscated.
    这种方法不起作用如果应用程序是在欺骗的方式保护,它的导入表的模糊。
  9. It is better to distribute obfuscated version of your Web content and to keep your original source code for yourself.
    发行经过混淆的网页内容让您最大限度的保护您自己和您客户的利益并使您的源代码得到最大的保护。
  10. Then she was criticized for using arguments that obfuscated the main issue.
    于是她被批评采用了使主要问题变得模糊起来的论点。
  11. The first task is an original type name search using an obfuscated name.
    第一项任务是一个原始类型名称搜索使用一个模糊的名称。
  12. Attributes should not be stripped if your library will be included as part of another application, and obfuscated as part of that application.
    如果您的库将包括在其他应用程序中作为应用程序的一部分,并作为该应用程序的一部分进行模糊处理,则不应去除属性。
  13. Checksumming code is obfuscated, hard to find, and the use of checksum results is also hidden.
    校验和代码常与其他代码混淆,难于发现,其结果的效用也是隐藏的。
  14. See Decoding Obfuscated Stack Traces for more information.
    更多信息,查看解码混淆过的堆栈跟踪信息。
  15. Provides no other protection; the contents of the text box are not encrypted or otherwise obfuscated, and the information is sent to the server as clear text.
    不提供任何其他保护;文本框的内容不进行加密,也不进行模糊处理,这些信息会以明文形式发送到服务器。
  16. However, if you write the code on your site and you do not intentionally obfuscate, a block of obfuscated code on your site may indicate an injection attack.
    不过,如果你写的代码在您的网站上,你这样做不是故意混淆,块伪装的代码在您的网站上可以表明注入攻击。
  17. The two most common ways code is obfuscated are through encoding and encrypting.
    这两个最常见的方式是伪装的代码是通过编码和加密。
  18. If we put brevity too high on our list of priorities, we will end up with code that is hopelessly obfuscated.
    如果我们赋予简洁太高的优先级,我们终将无可奈何地陷入令人困惑的代码之中。
  19. In a well obfuscated application, the names of all types, methods, and fields are changed from their carefully thought out, informative names into meaningless, semi-random names.
    在经过很好的模糊处理的应用程序中,所有类型、方法和字段的名称都从经过深思熟虑想出的富有含义的名称变为无意义的半随机名称。
  20. From the start, market contagion spread in step with each declaration that obfuscated more than it clarified.
    从始至终,每当欧盟出台一项搅乱局势而非理清局势的政策时,市场灾难就随之蔓延。
  21. Now view the obfuscated version, and try to find the above string.
    现在查看模糊处理的版本,并尝试查找上面的字符串。
  22. A-this is, definitely, a search request for the obfuscated type "a".
    这是的,当然,一个模糊型“搜索请求”。
  23. A protection scheme of mobile agents based on obfuscated agent data variables and time checking technology is presented in this paper.
    提出一种基于迷乱代理数据变量和时间核查技术的移动代理保护方案,同时给出获得时间核查技术中主要数据的方法。
  24. Using traditional proxy properties does not limit your ability to obfuscate the Model because the properties are referenced directly and would be obfuscated with the rest of the application.
    使用传统代理属性不会限制您打乱Model的能力,这是因为属性是直接引用的,会与应用程序的其余部分一起打乱。
  25. Lists the mapping between the original and obfuscated class, method, and field names.
    列出了源代码与混淆后的类,方法和属性名字之间的映射。
  26. In the solving process due to the introduction of proper evaluation upon the boundary given by the author the constrained boundary is being obfuscated thus lets the programming issue be able to reflect reality more accurately.
    由于在求解过程中,引入了设计者对边界的恰当评价,将约束边界模糊化,从而使问题更准确地反映实际。
  27. It uses identity to create the watermarks, which are embedded into the opaque predicates after they are encoded. The Java program is obfuscated by taking the opaque predicates with the watermarks as the threads of the Java program, and the watermark is verified by zero-knowledge proof.
    该方案把用身份标识产生的数字水印信息编码后嵌入到混淆的勒让德符号构造的不透明谓词中,将有水印的不透明谓词作为Java程序的线程来混淆Java程序,用零知识证明验证水印信息。
  28. We propose a method for quantitatively evaluating the robustness of the obfuscated software.
    本文提出了一种量化评价迷惑变换鲁棒性的方法,方便程序员选择不同的迷惑方案。