她表示“黑客队行动”涉嫌“针对娱乐行业个人的电脑入侵”罪名。
An FBI spokeswoman said Operation Hackerazzi involved "computer intrusions targeting individuals associated with the entertainment industry."
但是,这并没有阻止苹果公司一直以来的竞争对手——微软公司——对平板电脑入侵其统治多年的商业计算领域感到焦虑。
But that hasn't stopped Apple's perennial rival, Microsoft, from fretting over the tablet's intrusion into the world of business computing, which it has dominated.
一名入侵者闯入作战指挥部,设法删除了电脑文件中的17000个名字。
An intruder broke into the campaign headquarters and managed to erase 17,000 names from computer files.
更为糟糕的是,操作系统供应商可以通过互联网入侵个人电脑。
In a worse case, operating system providers could invade a personal computer through the Internet.
就像黑客那样,入侵个人电脑及数据。
It acted like a hacker, invading personal computers and data.
电脑病毒在复制、改编、入侵以及传播模式上几乎与生物病毒相同,“似乎”它们就是生物病毒。
Computer viruses replicated, adapt, infiltrate, and spread in patterns nearly identical to biological viruses, "as if" they were biological themselves.
哈德曼和其他电脑专家说黑客入侵凸显了网上投票的缺陷,而且这些缺陷目前无法弥补。
Halderman and other computer experts say the penetration highlights flaws in online voting that cannot be fixed at present.
有人可能会问为什么人要入侵别人的大脑,研究人员却说,使用电脑造成神经损害已有先例。
Some might question why anyone would want to hack into someone else’s brain, but the researchers say there’s a precedent for using computers to cause neurological harm.
奈特入侵了哈德森老师的电脑,他可以帮他们拿到一份期末考题。
Nate has hacked into Mr. Hudson's computer. He can get a copy of the final exam for them.
使用这一法案进行的诉讼,较为典型的起诉对象是入侵他人电脑系统的黑客。
More typically, prosecutions under the act have involved people who hack into computer systems.
受过大学教育的“河湾”在2003年3月20日美军入侵伊拉克前曾是一名电脑程序师。 她在博客中说,她失去了工作,因为那时伊拉克妇女单独出门上班已经是很危险的事情。
University-educated Riverbend worked as a computer programmer before the invasion which began on March 20, 2003.
这次的袭击直到上周三才被证实,很快一家加拿大广播公司报道了这一事件,有迹象表明电脑已经被入侵了有一段时间了。
While the attack was not confirmed until late Wednesday, shortly before a Canadian Broadcasting Corporation report about it, signs that something was wrong have been evident for some time.
邮件包含了一份PDF文件企图安装一个名为“有毒常春藤”的恶意程序以便入侵者能完全控制受害人的电脑。
The e-mail contained a PDF file that was intended to install a malicious software program known as Poison Ivy, which was meant to give an intruder complete control of the victim's computer.
你不需要成为深入了解诸如超频CPU或者是入侵注册表之类问题的专家;但是因为你从事IT行业,所以人们会期待你能够解决一般的电脑故障。 (如果你手下的IT技术人员没有达到这样的水准,那么开除他们。
You don\\\'t need to be an expert and understand how to overclock a CPU or hack the registry, but if you work in IT, people expect you to be able to do some things.
当我们网上购物的时候,我们需要支付商品的电子支付,但黑客入侵我们的电脑和窃取我们的信息,这是对网上购物不安全。
When we shop online, we need pay for the commodities by electronic payments, but hackers can invade our computers and steal our information, this is not safe for online shopping.
因为它们有着相同的漏洞,如果你能入侵一台电脑,那么所有的电脑都可以入侵。
Because they share the same flaws, if you can hack into one, you can hack into them all.
需要自己安装,而且需要将服务端上传到入侵的电脑并运行服务,才能达到控制的目的。
The need to install, and need to upload the server to the invasion of computer and run the service, to achieve the goal of control.
通过跟踪这个恶意程序并获得对入侵者使用的服务器电脑的访问权限,McAfee识别出了72个受危害的公司和组织。
Through tracing this malware and also gaining access to a "command and control" computer server used by the intruders, McAfee identified 72 compromised companies and organisations.
他们入侵电脑,破坏电话系统。
对于大众传媒来说,“黑客”(hacker)是指入侵电脑的人。
To the popular press, "hacker" means someone who breaks into computers.
恶意软件正与日俱增(间图二),其典型用途是偷盗密码和其他数据,或者打开电脑的“后门[注4]”以便入侵者控制。
Malware is exploding (see chart 2). It is typically used to steal passwords and other data, or to open a "back door" to a computer so that it can be taken over by outsiders.
安全专家称,当用户点击网络钓鱼(phishing)邮件——设计用来获取敏感信息,访问入侵网站——时电脑便会遭受病毒感染。
Machines become infected when users click on phishing e-mails, designed to try to gain sensitive information, or visit compromised websites, according to security experts.
通过大型广告活动进行宣传,让其他Windows电脑制造商抢占封面,如果他们害怕苹果在今后十年大肆入侵市场的话。
Introduce it with a mammoth AD campaign that shows the makers of other Windows PCs running for cover, as if they've been fearing Apple's monstrous entry into their market for decades.
然而,它却不把新进入网络的电脑报告为潜在入侵者,熊猫互联网安全2008却报告。
It doesn't, however, report new computers on the network as possible intruders, as Panda Internet Security 2008 does.
保罗,我应该保守这个秘密,但我一定要找个人谈谈。奈特入侵了哈德森老师的电脑。
Paul, I'm supposed to keep this a secret, but I have to talk to someone. Nate hacked into Mr. Hudson's computer.
由于怀疑被黑客入侵,一些西方公司的老板在去中国之后便扔掉了自己的手机和笔记本电脑。
The bosses of some Western firms throw away phones and laptops after they have been to China assuming they have been hacked.
由于怀疑被黑客入侵,一些西方公司的老板在去中国之后便扔掉了自己的手机和笔记本电脑。
The bosses of some Western firms throw away phones and laptops after they have been to China assuming they have been hacked.
应用推荐