Examples of using Successful attack in English and their translations into Russian
{-}
-
Colloquial
-
Official
Successful attack on a military convoy?
In the second round, Fury held the first successful attack.
A successful attack on a barbarian takes away one of his life points half a circle.
The Defiant has returned to Starbase 375 after its successful attack on the Dominion sensor array.
His most successful attack disabled the entire planetary power grid on Cardassia.
Growing on the ruins of Iraq and Syria,the Islamic state has carried out a successful attack last week.
Sidney led a successful attack which drove German troops of the 147th Grenadier Regiment out of a gully.
The seventh round of the Ukrainian began quite actively, having a successful attack, which, however, was not enough to continue.
Each successful attack and victory over a Monster will earn you Dragon Points.
From there he sailed up the coast to Brittany where he led a successful attack on the royal fleet in the Battle of Blavet.
Carrying off a successful attack in prison or any institutional environment is a challenge.
In 1820, Cochrane administered a stunning blow to the remaining royalist forces in a successful attack on a complex of fortifications at Valdivia.
On a successful attack, he deals an additional 1d6 points of damage due to his expertise in combating these creatures.
For every 2 hit points you sacrifice, on your next successful attack you deal +1d6 damage, to a maximum of+ 5d6 on that attack. .
A successful attack on a critical information system could therefore have serious consequences, both human and economic.
After living among the Habiru(Hapiru) for seven years, he led his new friends andHabiru allies in a successful attack by sea on Alalakh, where he became king sometime in 1450 BC.
Nevertheless he made a most successful attack, and then with the greatest skill and coolness withdrew the surviving aircraft without further loss.
On the fifteenth minute of the first half fortune has smiled upon the South Ossetian team player Soslan Dzhidzhoev, who, thanks to a successful attack, sent the ball into the opponent's gate.
From there he sailed up to Brittany,where he led his successful attack on the royal fleet in Blavet, although he could not take the fort after a three-week siege.
The successful attack came on January 16, 1883 and Alfaro arrived on February 2 and the next day was appointed Supreme Commander of Esmeraldas and Manabi.
On 20 December 1795, he led 8,000 Spanish and Portuguese in a successful attack in the Battle of Collioure, capturing Collioure, Fort Saint-Elme and Port-Vendres.
On a successful attack roll vs. AC 0(not a proficiency check), the character can catch small items thrown to harm him(as opposed to items thrown for him to catch).
Appointed admiral in 904, he was unable to prevent the sack of Thessalonica, but he scored a first victory in 905 or 906, and in 910,he led a successful attack on Laodicea in Syria.
In order to carry out the successful attack cybercrime should distribute the files in webarchive format to all potential victims and force them to open the files manually.
While it remains obvious that an attacker must possess at least some knowledge of the database architecture in order to conduct a successful attack, obtaining this information is often very simple.
However, the Swedish position appeared too strong for a successful attack by Brandenburg and the Brandenburg troops were exhausted by having to undertake forced marches in the days beforehand.
On 14 January 1878 he launched torpedoes from a boat(which itself was launched from a tender)sinking the Ottoman Navy vessel Intibakh at Batumi in the world's first successful attack using the self-propelled Whitehead torpedo.
I have never heard of a successful attack on the NXT PoS algorithm using timestamps, not even in the smaller clones that have smaller networks which should be easier to attack. .
If the infected cryptosystem is a black-box implementation such as a hardware security module, a smartcard, ora Trusted Platform Module, a successful attack could go completely unnoticed.
Offenders are also targeting private computers because, after a successful attack, offenders can include the computer in their botnet and use the computer for further criminal activities.