当这些智能手机和笔记本电脑登录到不真实的网络上时,黑客可以很容易地窃取他们的私人信息。
When these smartphones and laptops log on to the networks which are not real, hackers can easily steal their private information.
他的主要武器便是他所开发的一种方法,该方法可以将社交网络如Facebook与LinkedLn中发现的真实身份与黑客的匿名资料关联起来。
His principal weapon was a method he developed to associate the real identities found in social networks such as Facebook and LinkedIn with the anonymous profiles of hackers.
假设你,亲爱的读着们,你的所有感觉器官被连到了一个模拟系统就像“黑客帝国”里那样,你怎么会察觉出来真实还是虚幻呢?
If you, dear reader, were a brain in a jar with all your sensory inputs mapped into mapped into a simulation program a la "The Matrix," how would you know?
在今年发布的新机中,超级黑客手机诺记N900,最能真实体现Linux这个系统的本身及其哲学了。
The ultimate hacker phone, the Nokia N900 is the truest expression of Linux—the OS and the philosophy—that you'll find on mobile this year.
黑客相对比较容易掩盖真实身份,摆下迷魂阵破坏“反黑行动”。
The hacker is relatively apter to conceal the true identity, Put and make the ' black action ' instead of trap destruction.
以一则真实的入侵实例分析黑客人侵过程、常用手段、特征及图书馆数据安全存在的隐患、危害及防范措施。
This article analyses the process and the character of the hacker attacking the computer and the hidden troubles in the library computer data, in order to protect computer 's security.
除了提供一个真实世界的选举黑客潜力令人不寒而栗的例子,该研究还探讨的投票机的安全长寿一些重要问题。
In addition to providing a chilling example of the potential for real-world election hacking, the study also explores some important questions about the longevity of voting machine security.
除了提供一个真实世界的选举黑客潜力令人不寒而栗的例子,该研究还探讨的投票机的安全长寿一些重要问题。
In addition to providing a chilling example of the potential for real-world election hacking, the study also explores some important questions about the longevity of voting machine security.
应用推荐