你是否试图追回被窃取的继承权?
被窃取的不仅仅包括研究开发的信息,还有管理技术和营销策略。
Information being gathered was not just related to research and development but also management techniques and marketing strategies.
任何标识都应该有一个合理的期限——可再次将它被窃取的损坏程度降到最低。
Any token should have a reasonable expiration period — again, to minimize the damage of it being stolen.
收集信息并不是软件开发者的失误,因为是有米在隐瞒事实,这些被窃取的数据实际上都是传回到了它自己的服务器里。
The data collection does not appear to be the developers' fault, since Youmi was disguising the fact that its software was sending that data to its servers.
泰国警察星期天表示,由于利用被窃取的欧洲护照订购飞机票的详情情况逐步浮出水面,他们正对一个“护照团伙”展开调查。
Thai police said they were investigating a "passport ring," as details emerged of bookings for the flight made in Thailand with stolen European passports.
幸运的是,目前为止,RSA组织表示他们只目击到一次类似的攻击,而且也没有证据表明有犯罪分子使用这种被窃取的信用卡帐号登录过网银系统。
So far, RSA said it has only witnessed one instance of the attack and has seen no evidence that stolen credentials are being used to log in to compromised accounts in real time.
宾夕法尼亚州立大学说他们开展新的调查是因为被窃取的电子邮件可能会影响公众对曼恩博士的总体科研成果、特别是对气候科学方面的科研成果的信心。
Penn State said it is undertaking the new inquiry because the purloined emails may be undermining public confidence in Dr. Mann's findings, 'in science in general and climate science specifically.'
宾夕法尼亚州立大学说他们开展新的调查是因为被窃取的电子邮件可能会影响公众对曼恩博士的总体科研成果、特别是对气候科学方面的科研成果的信心。
Penn State said it is undertaking the new inquiry because the purloined emails may be undermining public confidence in Dr. Mann's findings, 'in science in general and climate science specifically.
但公众舆论和近来一连串饱受争议的事件——从英吉利大学被窃取的争议性电子邮件到喜马拉雅冰川被错估的融化速率都为气候变化这一报纸头条抹上阴影。
But public opinion and a string of recent controversies-from East Anglia's controversial stolen e-mails to the mistaken rate of Himalayan glacier melt-have clouded climate change headlines.
他们否认拥有任何被窃取信息的记录或者摘要。
They denied keeping any recording or notes of intercepted messages.
还有很多是建立在他是否能确保这次大选的结果不会被窃取(选举是否公正)。
Much will also depend on whether he can ensure that the election is not stolen.
即使该ID被窃取,所造成的损害也不会很严重。
Even if the ID is compromised, little serious harm can result.
几名足球圈内的著名人士也被窃取了信息。
Several famous figures in football are among those whose messages were intercepted.
因为用户控制自己的私钥,所以私钥有可能被窃取。
Since users control their private key, there is always the risk that it could be compromised.
你的长远目标和路径是不能被窃取走的。
Your long term vision and the path that gets you there cannot be stolen.
2008年,一位土耳其男子在科索沃的普里斯·蒂娜机场突然晕倒,之后的报道说此人的肾脏已被窃取,国际刑警组织自此开始搜捕桑麦资。
Interpol had been looking for Sonmez since 2008, when a Turkish man collapsed in the airport in Pristina, Kosovo, and reported that his kidney had been stolen.
以明文方式传输消息、传输加密的但以明文方式存储的消息、或者由于密钥被窃取或通过密码分析获取后对消息进行解密,在以上几种情况下都可能发生这种攻击。
This can happen to messages being transmitted in the clear, transmitted encrypted but stored in the clear, or decryption of messages due to stolen key or cryptoanalysis.
如果cookies被窃取了,您的相应账号很可能被破坏甚至被他人利用。
If you get your cookies stolen, your corresponding account can be easily compromised and even taken over.
下面是一些加强路由器安全的具体措施,用以阻止对路由器本身的攻击,并防范网络信息被窃取。
Here are some strengthen router security measures, to prevent the attack on the router itself, and prevent the network information from eavesdroppers.
我的计算机一会儿前被窃取了。
“这些事是乱编的,是(别人)故意制造的假象,它来自第三方服务器的过时材料,被窃取和篡改的私人邮件内容又被断章取义,”她在一份声明中表示。
"This story is based on outdated material taken out of context from hacked and doctored private emails from a third party server and gives a deliberately inaccurate picture," she said in a statement.
文件加密存储是保证机密数据不被窃取或篡改的有效方法。
The file cryptographic storage is an effective method to guarantee secret data from being stolen or tampered.
密钥管理技术的主要任务是如何在公用数据网上安全地传递密钥而不被窃取。
The job of the Key Management is to deliver the key on the network save.
如何保证网络上的私有信息不被窃取或破坏已成为一个急需解决的问题。
How to guarantee that the privately owned information on the network is not stolen or destroyed and already become a problem badly in need of solution.
因此,要保证这些在网上传送的敏感信息不被窃取、假冒和篡改。
Therefore, we have to keep the transformed messages in the network from being stolen, spoofed and changed by the hacker.
因此,要保证这些在网上传送的敏感信息不被窃取、假冒和篡改。
Therefore, we have to keep the transformed messages in the network from being stolen, spoofed and changed by the hacker.
应用推荐