读知识>英语词典>intercepts翻译和用法

intercepts

英 [ˌɪntəˈsepts]

美 [ˌɪntərˈsepts]

v.  拦截; 拦阻; 截住
intercept的第三人称单数和复数

柯林斯词典

  • VERB 拦截;截住;截击
    If youinterceptsomeone or something that is travelling from one place to another, you stop them before they get to their destination.
    1. Gunmen intercepted him on his way to the airport...
      持枪歹徒在他去机场的路上截击了他。
    2. Dodd intercepted a ball intended for Smith...
      多德拦截了给史密斯的球。
    3. His letter was intercepted by the Secret Service.
      他的信被特工处截获了。

双语例句

  • This type of virus intercepts entered data and transmits it to a remote server.
    这种类型的病毒截取输入的数据传送到一台远程服务器。
  • An iRule uses an easy-to-learn scripting syntax that enables the BIG-IP LTM to customize how it intercepts, inspects, transforms, and directs inbound or outbound application traffic.
    每个iRule使用一个容易学习的脚本语法,来定制BIG-IPLTM如何截获、检查、转换和指示入站或出站应用传输。
  • In this kind of festival, it is the best opportunity that intercepts and capture discharge to stationmaster.
    在这种节日里,对站长来说是截获流量的最好时机。
  • The LEC also intercepts broadcast packets and sends them to the BUS's ATM addresses.
    LEC也能截获广播包,并把它们发送给BUS的ATM地址。
  • A third party, Isabel, intercepts the connection attempt, acting as a proxy between them.
    Isabel是一个第三方,她截获了这个连接请求,并在他们两个之前充当代理。
  • The message interceptor intercepts the messages that are sent from a service requestor to a Web service and from a Web service back to the service requestor.
    消息拦截器拦截从服务请求者发送到Web服务和从返回到服务请求者的消息。
  • An API exit intercepts bindings-mode calls.
    一个API出口拦截绑定模式调用。
  • This module literally intercepts the incoming Web ( HTTP) request and performs a login, similar to what a login module would do.
    这个模块完全截获传入的Web(HTTP)请求并执行登录,完成与登录模块类似的工作。
  • The Intercepting Filter pattern wraps existing application resources with a filter that intercepts the reception of a request and the transmission of a response.
    拦截过滤器模式用一个过滤器封装了已有应用资源,这个过滤器拦截了请求的接收及响应的传递。
  • By installing a third-party application firewall, which intercepts XSS attacks before they reach the Web server and the vulnerable scripts, and blocks them.
    通过安装第三方应用程序防火墙,防火墙在XSS攻击到达Web服务器和易受攻击的脚本之前拦截它们,并阻塞它们。