• Intruders might invade your systems for one of two reasons: to gain access to information that they should not have or to alter the behavior of a system.

    入侵者入侵系统可能是出于这两个原因之一为了获取他们应该拥有信息或者为了改变系统行为

    youdao

  • Intruders may be after your systems for one of two reasons: to gain access to information that they should not have, or to alter the behavior of a system in some way.

    入侵者可能为了两个原因之一而入侵系统为了获取他们应该拥有信息或者为了某种方式改变系统的正常运行状况。

    youdao

  • Anyone familiar with the necessary procedure can gain access to information stored in the computer, no matter how confidential, and use it for his own purposes.

    无论保密程度有多么高,任何熟悉必要程序的人都获取贮存电脑中的信息利用达到自己目的

    youdao

  • Intruders might be after your systems for one of two reasons: to gain access to information that they should not have, or to alter the behavior of a system in some way.

    入侵者可能出于两个原因之一入侵系统为了获取他们应该拥有信息或者为了某种方式改变系统的正常行为

    youdao

  • And this one, the scam artist tries to gain access to information like your bank account or social security number, and you may be ask to pay a fee, even to be considered for a job.

    这个骗子试图获得银行卡账号或者社保号码信息可能考虑支付费用甚至可能会考虑你提供份工作。

    youdao

  • Decisions are based on both private and public information, but as access to information becomes easier, the opportunity to gain a competitive advantage from that data diminishes.

    人们做出决策往往是以个人公共信息为基础的,但是如果便捷得到信息渠道的话,那么从资料中得到竞争力信息机会减小了。

    youdao

  • That is, by tricking the human beings that work for your organization, attackers are able to gain access to systems and information to which they should not have access.

    就是说通过欺骗在组织工作人员攻击可以获得权限访问他们应该访问的系统信息

    youdao

  • After discovery of the data source, the next step is to gain access to the information.

    发现数据源以后,下一步获得信息访问权限

    youdao

  • That is, attackers are often able to gain access to systems and information to which they should not have access by tricking the human beings that work for an organization.

    就是说通过欺骗在组织中工作人员攻击可以获得权限访问他们应该访问的系统信息

    youdao

  • The application's ultimate goal is for the user to gain access to personal information hosted in different locations, all displayed using a calendar-based interface.

    这个应用程序最终目标用户可以访问不同位置上个人信息,这些信息使用基于日历的界面显示的。

    youdao

  • It's an ideal target for identity thieves, who could use it to obtain more information about you and potentially gain access to your bank or credit card account.

    如果留下真实的出生年月日,帐户盗贼就有可能根据那个掌握更多你的个人信息还有可能侵入银行帐户信用卡帐户。

    youdao

  • He said "no one has been able to take control of the iPhone to gain access to personal information using this exploit."

    说,目前为止还没有利用漏洞控制iPhone,获知用户个人信息

    youdao

  • It allows end users and applications to gain secure access to any information source, regardless of where it resides.

    使最终用户应用程序可以获得任何信息源安全访问不管在什么地方

    youdao

  • When they return, they must re-enter their password to re-gain access to your information.

    他们返回后,只有在重新输入账号和密码才能再次访问相关信息。

    youdao

  • If your site serves tons of information you will want your users to gain access to it at the most fastest and fewest clicks.

    如果网站提供大量信息,确保用户最快方式获得信息,不能立即呈现的信息就是无用的信息。

    youdao

  • A unique string of characters input by an authorized user in order to gain access to a system or to protected information in the system.

    授权用户取得系统系统中被保护信息存取权输入系统的专门字符串

    youdao

  • What do you thinkshould we continue trying so hard to gain more access to information?

    怎么——我们是否应该继续获取更多信息上下这么大力气

    youdao

  • Information that is confidential in nature or is subject to any form of legal protection requires the compulsive nature of the mutual legal assistance process to gain access to it.

    一些本身列为机密,又不同形式法律保护而须保密的资料,便需借助相互法律协助程序强制特性才可取得。

    youdao

  • Confidentiality -unauthorized entities can seek to gain access to confidential information within a message.

    保密未经授权的实体可以要求获得信息信息获取机密

    youdao

  • Unlike the bulk of people who are living in the virtual world, these hackers seek to gain access to the personal and private information that one has stored on their computer.

    有别于大部分生活虚拟世界这些黑客设法获取个人私人资料储存一个电脑

    youdao

  • Hackers masquerading as internal users can take advantage of weak internal security to gain access to confidential information.

    伪装内部用户黑客们利用脆弱的内部安全获取机密信息。

    youdao

  • You may overhear a conversation, gain access to private or personal information, or become clued in some other surprising way.

    可能无意中听到别人谈话获取私人信息,又其他令人惊奇方式传达的信息。

    youdao

  • For example, some drivers use a memory handle for the identifier to gain quick access to memory containing information about the given instance.

    例如有些驱动程序使用内存句柄标识以便快速访问包含给定驱动实例的内存信息

    youdao

  • The attack was unsuccessful and despite their attempts the hackers were unable to gain access to restricted information stored on the website.

    虽然参与攻击黑客宣称已经获取重要数据,但实际情况确黑客根本没有寻找到“进入网站限制信息储存区域的权限”。

    youdao

  • Third, city dwellers gain access to better information service and educational facilities.

    第三城市居民获得更好信息服务教育设施

    youdao

  • The attack was unsuccessful and, despite their attempts, the hackers were unable to gain access to restricted information stored on the website.

    尽管黑客们进行了多次尝试,但是攻击还是没有成功无法获得进入网站受限制信息储存区域的权限。

    youdao

  • No longer will Terra allow any other creation to strip her music; nor will she allow duplication or mimicking to gain access to her field to strip her of other information necessary to ascend.

    而Terra既不会允许其它任何创造物剥夺音乐也不会允许他们通过复制模仿音乐进入自己中来剥夺提升所需要信息

    youdao

  • No longer will Terra allow any other creation to strip her music; nor will she allow duplication or mimicking to gain access to her field to strip her of other information necessary to ascend.

    而Terra既不会允许其它任何创造物剥夺音乐也不会允许他们通过复制模仿音乐进入自己中来剥夺提升所需要信息

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定