• Soon, the term hacker had a new meaning — a person using computers to explore a network to which he or she didn't belong.

    不久黑客被赋予新的含义,即黑客是使用计算机探索不在的网络

    youdao

  • Instead of trying to penetrate a network and find a domain or network they're completely unaware of, the hacker only has to infiltrate a portion of a network that they do know about.

    他们不必再去尝试潜入网络找到毫不了解网络,只需进入自己了解某个网络的一部分即可。

    youdao

  • In fact, he notes that within the hacker community, DDoS and similar attacks don't even qualify as true hacking, which involves actually compromising a network, not taking down a site.

    注意到,黑客内部阻断服务攻击以及类似的攻击方式只能算是雕虫小技,甚至还够格被称作真正的“黑”。真正的“黑”是要对网络造成真正的危害而不是暂时关掉一个网站。

    youdao

  • A hacker takes advantage of the fact that the IaaS administrator cannot apply standard controls such as IP-based network zoning in virtualized networks.

    IaaS管理员无法虚拟网络中应用基于IP网络分段等标准控制措施黑客可以利用一情况。

    youdao

  • Using a network of computers (dubbed zombies) controlled by a single master machine, the hacker tries to overwhelm a website's servers.

    利用单一主机控制电脑网络(称为僵尸网络),黑客竭力颠覆一个网站服务器

    youdao

  • Hacker crime emerges as a new type of crime with the development of computer and network technology.

    黑客犯罪伴随网络计算机出现种新的犯罪形式。

    youdao

  • The second might enable the hacker to overload a Windows machine and prevent it from functioning properly. This can be achieved by sending similarly customized network messages repeatedly.

    其二黑客可以让装有视窗的电脑超载使该机功能失常,反复输入类似定制网络信息的方法就目的。

    youdao

  • Thee second might enable the hacker to overload a Windows machine and prevent it from functioning properly. This can be achieved by sending similarly customized network messages repeatedly.

    其二黑客可以让装有视窗的电脑超载使该机功能失常,反复输入类似定制网络信息的方法就目的。 。

    youdao

  • The first could allow the hacker to break into a Windows system and run any programs or code they choose by sending a specially designed network message.

    可能允许黑客输入特别编制的网络信息,闯入一种视窗系统,操纵全部程序他们任意编码

    youdao

  • Since TCP/IP shows less consideration to security, some shortcomings in security are in existence, which provides Hacker opportunities to attack network.

    IP协议由于缺乏安全性考虑存在一定的安全缺陷,黑客攻击网络可乘之机。

    youdao

  • When People purchase and use these network product, they are not aware of some hacker or organization are intercepting; stealing; modifying their information through network without any resistance.

    人们购买使用这些网络产品时,他们意识一些黑客、强力组织通过网络悄无声息的窥探、窃取修改他们信息

    youdao

  • The police spent a long time tackling the hacker who ruined the network.

    警方花了时间对付那个毁坏了电脑网络黑客

    youdao

  • But, it has not only its own features, such as interconnected, openning, sharing information, etc. also lots of unsafety factors, such as network virus, hacker attack, ect. exist.

    但是,高校校园网具有互联性开放性共享性特点,具有众多不安全因素网络病毒黑客攻击

    youdao

  • Computer hacker activity has formed an important threat. Information infrastructure facilities are facing the challenge of network security.

    电脑黑客活动形成重要威胁信息基础设施面临网络安全挑战

    youdao

  • This text has discussed the urgency of case study of the network, the hacker attacks the characteristic safe loophole question.

    本文讨论网络安全研究紧迫性黑客攻击特征,安全漏洞问题。

    youdao

  • Also the community network will connect to internet, so it is an important requirement to prevent outside hacker, and network virus invasion.

    另外整个网络需要接入国际互联网因此本方案设计了以下措施防止外部黑客网络病毒入侵

    youdao

  • Aimed at confronting the digital campus viruses, hacker attacks and spam, and a series of network security issues.

    针对数字化校园面临病毒入侵黑客攻击垃圾邮件一系列网络安全问题

    youdao

  • To oppose hacker and to prevent virus are the important content of network secure.

    反黑客病毒网络安全重要内容

    youdao

  • A comprehensive, yet easy to use network protection software, you can ensure that your computer is not by any hacker intrusion.

    一个全面却又简单易用的网络防护软件可以确保计算机任何黑客侵扰。

    youdao

  • Guards the network security, becomes the genuine hacker!

    捍卫网络安全成为真正黑客

    youdao

  • Program design, network technology, hacker attack and defense, and other e-books.

    程序设计网络技术黑客攻防各种电子书。

    youdao

  • Network sniffing is like one double-edged sword. It makes the network administrator convenience, but it also offers the hacker a tool to steal network information.

    网络监听技术双刃剑,在提供给网络管理员管理网络方便提供给黑客盗取网络信息的工具

    youdao

  • However as hacker attack and network virus emerge in endlessly, the problem of network security has become very serious.

    然而层出不穷黑客攻击网络病毒事件使得网络安全问题突显出来

    youdao

  • On the other side, hacker attack, virus spreading and mixed network attacks add increasingly, so that the network security defensive line is full frailness.

    一方面,黑客攻击病毒传播以及形形色色网络攻击日益增加,网络安全防线十分脆弱。

    youdao

  • At present constant enlargement in network size and hacker attack means complicated day-by-day, the demands of people for the network security grow with each passing day.

    目前随着网络规模不断扩大黑客攻击手段日益复杂人们对于网络安全需求与日俱增

    youdao

  • This paper presents a network attack model , which departs attack into several steps , and describes technology that hacker adopts during each attack step.

    给出一个网络攻击模型模型将攻击过程归纳若干阶段详细地分析了黑客阶段采用技术方法。

    youdao

  • The first could allow the hacker to break into a Windows system run any programs or code they choose by sending a specially designed network message.

    可能允许黑客输入特别编制的网络信息,闯入一种视窗系统,操纵全部程序他们任意编码

    youdao

  • The first could allow the hacker to break into a Windows system run any programs or code they choose by sending a specially designed network message.

    可能允许黑客输入特别编制的网络信息,闯入一种视窗系统,操纵全部程序他们任意编码

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定