intercepts
英 [ˌɪntəˈsepts]
美 [ˌɪntərˈsepts]
v. 拦截; 拦阻; 截住
intercept的第三人称单数和复数
柯林斯词典
- VERB 拦截;截住;截击
If youinterceptsomeone or something that is travelling from one place to another, you stop them before they get to their destination.- Gunmen intercepted him on his way to the airport...
持枪歹徒在他去机场的路上截击了他。 - Dodd intercepted a ball intended for Smith...
多德拦截了给史密斯的球。 - His letter was intercepted by the Secret Service.
他的信被特工处截获了。
- Gunmen intercepted him on his way to the airport...
双语例句
- This includes the data collector component that intercepts request and response messages for the Web services to monitor.
这包括数据收集器组件,该组件用于拦截针对要监控的Web服务的请求和响应消息。 - Intermediation requires the intermediating system to understand at least some of the semantics of the messages it intercepts.
“仲裁要求仲裁系统对于它所拦截的消息的语义至少有些理解”。 - The program, which he called Mail Goggles, intercepts e-mails sent using Google's e-mail service, Gmail, after a certain time in the evening.
他把这个程序称为“邮件眼镜”,在晚上某个时间段后,它可以拦截通过谷歌电子邮件服务系统(即Gmail)发送的邮件。 - The Intercepting Filter pattern wraps existing application resources with a filter that intercepts the reception of a request and the transmission of a response.
拦截过滤器模式用一个过滤器封装了已有应用资源,这个过滤器拦截了请求的接收及响应的传递。 - The LEC also intercepts broadcast packets and sends them to the BUS's ATM addresses.
LEC也能截获广播包,并把它们发送给BUS的ATM地址。 - An API exit intercepts bindings-mode calls.
一个API出口拦截绑定模式调用。 - An iRule uses an easy-to-learn scripting syntax that enables the BIG-IP LTM to customize how it intercepts, inspects, transforms, and directs inbound or outbound application traffic.
每个iRule使用一个容易学习的脚本语法,来定制BIG-IPLTM如何截获、检查、转换和指示入站或出站应用传输。 - RRD intercepts the response contents and checks whether the response can be cached locally before sending the result back to the client.
RRD会截取响应内容,并检查是否可以在将结果发送回客户端之前进行本地缓存响应。 - The interceptor above intercepts the call to the target EJB method, then calls the proceed() method on the InvocationContext.
上面的拦截器拦截对目标EJB方法的调用,然后调用InvocationContext上的proceed()方法。 - That way, he said, even if an attacker intercepts a password, they cannot use it to log into a site without the second password.
他说,通过这种方式,即便攻击者截获了某个密码,他们也无法在没有第二个密码的情况下用其登录网站。