计算机攻击已成为一个非常严重的问题。
盗贼似乎在对全球银行开展广泛的计算机攻击,这起犯罪事件就属其一。
The crime appears to be part of a broad computer attack on global banking.
我们建议,在造访地球前请您先给自己的网路设上密码,并且请安装使用人类的安全软件以预防计算机攻击。
We advise protecting your network with passwords and generally adopting humanity's own security measures against any computer-based attacks before visiting Earth.
JACKBAUER以拯救美国于各式灾难而闻名于世,不论这些灾难是核泄漏,生化危机还是计算机攻击。
JACK BAUER famously does whatever it takes to save America from disaster, be that disaster nuclear, biological or computer attack.
有些病毒是非常致命的,他们自己的计算机攻击除了他们感染上的OS系统文件,使他们也充当病毒。
Some viruses are very deadly, they themselves attack on computer in addition they infect system files on OS and make them also act as virus.
在遭受攻击的情况下,军事顾问说明了能从另一个终端操控一台计算机的优势。
In the case of an attack, military advisers suggested the advantage of being able to operate one computer from another terminal.
然而我们要认识到,这种攻击并不仅仅存在于计算机和数字安全领域。
Realize, though, that this attack is not reserved strictly for the realm of computer and digital security.
但是大多数的这些攻击却来自于全世界成千上万的普通计算机。
But most of them come from many thousands of ordinary computers, all over the world.
不过,一名计算机安全专家称,即使是这样大规模的攻击也不一定来自大型或有势力的组织。
However, one computer security expert said that even an attack of this size did not necessarily have to be the work of a large or powerful group.
这种攻击的比较可行的方案是在购物者计算机或者服务器的附近。
A more practical location for this attack is near the shopper's computer or the server.
这些计算机的用户很可能从没意识到他们也是攻击的一部分。
The owners of those computers are almost never ware they are part of an attack.
通过在适当的时间删除目录,攻击者可以删除计算机中的任何文件。您不应该信任“. .”。
By moving directories at the right time, an attacker could delete every file in the computer.
现代社会越来越依赖于有网络连接的计算机系统,这增加了敌人的攻击途径。
Modern societies are ever more reliant on computer systems linked to the Internet, giving enemies more avenues of attack.
美国,作为最依赖计算机的国家,也是最容易遭受网络攻击的国家。
America, as the country most reliant on computers, is probably most vulnerable to cyber-attack.
如果您负责确保公司的计算机环境的安全,那么,理解黑客攻击的工作原理对您就很重要了。
If you are responsible for securing your company's computer environment, it's important you understand how attacks work.
与之相伴,对网络的各类攻击与破坏也与日俱增,计算机犯罪越来越多,网络安全受到严重威胁。
At the same time, attacks upon networks are increasing very fast, computer criminal events occur quite often, and network securities are seriously threatened.
这就使攻击者可以很容易的扫描客户端计算机的未加密通信。
This allows an attacker to easily scan unencrypted traffic from the user's computer.
他们也利用流氓软件攻击受害商户的计算机系统,将整个系统内的信息全部倒走,同时安装探测程序以寻找财务数据。
They also used malware - malicious software that attacks computer systems and systematically steals data, installing "sniffer" programmes that look for financial information.
提及的恶性程序能很快发现并进入控制世界上工业过程的计算机组,这说明控制系统在面对这种攻击时是多么的不堪一击。
The malicious program quickly found its way into computers controlling industrial processes the world over, demonstrating how vulnerable control systems are to such attacks.
而如果有任何一位无名氏对攻击目标不感兴趣的话,他便可以将自己的计算机从志愿者僵尸网络中脱离出来,以减少这次攻击的效力。
If any anon fails to be inspired by the target, she can remove her own computer from the volunteer botnet, reducing its effect.
大多数计算机安全分析都没有提及针对Twitter的具体攻击来源。
Most computer security analysts did not cite a specific source of the attack on Twitter.
无线hub使攻击购物者计算机网络成为更好的选择,因为大多数无线hub都禁用了安全特性。
Wireless hubs make attacks on the shopper's computer network the better choice because most wireless hubs are shipped with security features disabled.
如果运行非最新插件,你的计算机更容易受安全攻击,因为旧插件没有最新安全补丁。
Your computer iseven more vulnerable to security attacks if you're running plug-ins that aren'tup to date, because out-of-date plug-ins don't contain the latest securityfixes.
在虚拟空间里,这个规则意味着你不能规划一个庞大的计算机网络攻击,即使是一个军事网络,也不能够排除民用网络受到牵连。
In the cyberworld, this rule means you couldn't plan a massive computer attack, even on a military network, without regard for the civilian computer networks that would be affected by that attack.
并非所有攻击者都是黑客-有些攻击者根本不了解计算机。
Not all attackers are hackers — some attackers don't know anything about computers.
媒体公司只关注那些攻击计算机系统的黑客,而往往忽视那些计算机的保卫者,所以有些人就使用术语“黑客”表示只进行攻击的黑客。
Media companies only concentrate on the hackers who attack computer systems rather than the defenders, so some people use the term "hacker" to mean only attacking hackers.
网络内战已经爆发,竞争对手间互相攻击对方的计算机网络,试图去揭发泄露对方现实身份。
Cyber civil wars have broken out, with rivals attacking each others' computers and attempting to discover and reveal their real-world identities.
网络内战已经爆发,竞争对手间互相攻击对方的计算机网络,试图去揭发泄露对方现实身份。
Cyber civil wars have broken out, with rivals attacking each others' computers and attempting to discover and reveal their real-world identities.
应用推荐