没有盗用者参与我们的投选比赛。
任何人发现有盗用者参与我们的投选比赛,请告诉我们。
Anyone realize faker in our competition, please report to us.
请勿盗用他人作品,如果被发现,我们除了会删除该作品外,还将严惩盗用者。
Please do not steal other people's works, if found out, not only we will delete this work piece, we will also severely punish the 'thief'.
如果创新者担心他们的发明或创意会被人盗用,就只会发生两种情况:要么他们会停止发明创造,要么他们会决定去其它地方实现自己的发明创造。
If innovators fear that their inventions or ideas will be stolen, then one of two things will happen - they'll either stop inventing, or they'll decide to create their inventions elsewhere.
虽然也有可能是绑架者盗用警服或是军服然后化装成警察或是军人,但是,坎佩尔说,墨西哥人有理由对此表示怀疑。
While it is possible that kidnappers have obtained uniforms and can masquerade as police or soldiers, Campbell says Mexicans have good reason to be skeptical.
对所有知识产权侵权及盗用案件始终如一地适用法律,将使司法系统的使用者产生更多的确定感。
Consistent application of the law to intellectual property infringement and misappropriation cases would foster more certainty among users of the legal system.
此类信息提供的越多,你就越容易成为身份盗用、网络骚扰以及其它网络犯罪的受害者。
Offering too much of this information can leave you vulnerable to identity theft, harassment and other crimes.
“安全冻结”信用档案是一种预防及避免身份被盗用的工具﹐它可以阻止诈骗者利用你的个人资料来建立信贷记录。
A credit file "security freeze" is a preventive tool to help you avoid identity theft and to block impostors from using your personal information to establish credit.
此手册能协助你采取行动预防身份被盗用﹐或是如果你已是受害者﹐如何清理身份盗用犯惹出来的麻烦以及减少它对你生活的冲击。
This publication can help you take steps to prevent ID theft, or if you are a victim, to clear up the problems created by ID theft and to lessen its impact on your life.
身份盗用是一个主要的问题,关于这个问题,我们从1999年以来就一直在警告求职者。
Identity theft is a major problem, and we've been warning job seekers about it since 1999.
本文说明何谓身份窃盗、如何防范以及身份盗用受害者如何采取法律措施。
A factsheet explaining what identity theft is, how to prevent it, and what to do if you are a victim of identity theft.
剽窃者总是疑心文字被人盗用。
这本消费者行动最新发行的手册提醒大家认明及避免形形色色有关信用卡之诈骗,例如:仿制信用卡、假冒骗取信用卡、身份盗用、伪造信用卡等等。
This new Consumer Action publication explains how to recognize and avoid many forms of fraud that involve credit CARDS, such as skimming, phishing, id theft and counterfeit CARDS.
盗用他人名义在网上发布信息,造成严重后果者,给予记过以上处分。
After causing grave consequences by releasing information on the network in others' names without permit, students shall be given punishments above demerit recording.
参加者需保证所有提供之资料之真实,且非盗用任何第三者之资料。
Participants are required to ensure that all information provided by the real and non-misappropriation of any third party information.
而且,垃圾邮件发送者还能通过邮件在受害者电脑内植入“木马”,获得受害者的个人信息(比如信用卡号等),然后盗用或者转手卖给他人。
"Moreover, spam mail sent by the victim who can implant computer" Trojan horse "access to the victim's personal information (such as credit card number, etc.") and then sold or Copyright others.
摘要:无线通信领域中,每个无线通信系统都很重视空中接口的安全性,防止非法者监听或是盗用系统的空中无线资源。
Abstract: In wireless telecommunication, in order to protect communication system from monitoring and steal radio resource by illegal intruder, security is a critical issue for any operator.
摘要:无线通信领域中,每个无线通信系统都很重视空中接口的安全性,防止非法者监听或是盗用系统的空中无线资源。
Abstract: In wireless telecommunication, in order to protect communication system from monitoring and steal radio resource by illegal intruder, security is a critical issue for any operator.
应用推荐