While there are plenty of hackers who could start startups, there's no one to invest in them.
尽管有很多黑客能创业,但没有人会投资他们。
This is about more than petty hackers who deface websites.
这是关于多谁污损小黑客网站。
They contain confessions and illegal ACTS of REAL hackers who know what they're doing.
它们包含的供述和非法行为的实时黑客谁知道他们在做什么。
This is an attractive target for hackers who may decide to carry out a denial of service attack.
对于希望实施拒绝服务攻击的黑客,这是一个有吸引力的目标。
The coders - expert computer hackers who discover software vulnerabilities and create viruses.
程序编码员——电脑黑客一旦发现软件漏洞,就会编写病毒程序。
Apple recently began a "bug bounty" program to pay hackers who report vulnerabilities in its systems.
最近,苹果启动了一个“漏洞奖励”计划,出钱让黑客报告其系统中的漏洞。
The hackers who targeted her say the pictures were actually taken when she was 20 and sent to rapper Lil B.
攻击她的黑客称这些照片其实是她在20岁时拍的,还发送给了说唱组合Lil B。
The creations of a small coterie of malicious hackers who invent toxic software for the sheer deviltry of it.
计算机病毒系一小撮存心不良的黑客所为,这些人纯属为了搞恶作剧而编造有毒软件。
"It's an ambassador program for hackers who want to come to New York, but are intimidated by the city," Wegener says.
“对于想要来纽约但是又有点害怕这个城市的黑客来说,这个程序就像一个大使”韦格纳说。
Hackers who commandeer your computer are bad enough. Now scientists worry that someday, they'll try to take over your brain.
黑客强占电脑已经够混蛋的了,现在科学家担心,有一天他们会攻陷你的大脑。
Its firms often run bug bounty programmes, which pay rewards to hackers who disclose problems, giving the firms time to fix them.
业界公司运行的程序经常布满安全漏洞,它们聘用黑客攻击系统,发现问题,从而帮公司争取时间修补漏洞。
The National Security Agency has a challenge for hackers who think they're hot stuff: prove it by working on the hardest problems on Earth.
那些觉得自己是香饽饽的黑客们,现在美国国家安全局有一个挑战性任务给你们了。
Phishing is the term coined by hackers who imitate legitimate companies in emails to entice people to share passwords or credit-card Numbers.
网页仿冒是黑客们造出来的词,他们在电子邮件中模仿合法的公司,诱骗人们把自己的口令或信用卡号码告诉他们。
The National Security Agency has a challenge for hackers who think they're hot stuff: prove it by working on the "hardest problems on Earth. ""
那些觉得自己是香饽饽的黑客们,现在美国国家安全局有一个挑战性任务给你们了。想要证明自己的实力,就来攻克这些“地球上最难的难题”吧。
It is easy to write off the asymmetrical tactical gurus as game-engine hackers who search for bugs and errors within the engine and exploit them.
很容易一口气就写出像游戏引擎破解者一样的非对称流战术大师们是如何找寻并利用游戏引擎的漏洞的。
Hackers who claim they are responsible for the Sony breach wrote on underground forums last week that they had access to over 2.2 million credit CARDS.
宣称对攻破索尼负责的黑客上周在秘密论坛发布消息称,他们有2200万张卡片的账户和密码。
Script kiddies are would-be hackers who know enough to run a pre-coded script against a vulnerable machine, but not enough to create such a script in the first place.
指令码人员是将来的骇客,他们的知识足够对易攻击的机器执行预编码的指令码,但还没有足够的知识建立这样的指令码。
Media companies only concentrate on the hackers who attack computer systems rather than the defenders, so some people use the term "hacker" to mean only attacking hackers.
媒体公司只关注那些攻击计算机系统的黑客,而往往忽视那些计算机的保卫者,所以有些人就使用术语“黑客”表示只进行攻击的黑客。
Hackers who breach and cause substantial harm to critical infrastructure systems would face a mandatory minimum three-year prison sentence if the White House gets its way.
如果白宫的一项法案通过的话,破坏关键性基础设施系统并对其造成重大损害的黑客将面临至少三年的强制性监禁。
Hackers who access the network will have the ability to turn off alarm systems and lights, leaving the home vulnerable to a break-in, or the theft could be more electronic.
黑客们会通过网络关掉你的自动警报系统或者照明系统,你的家就会很容易地被侵入,使电子盗窃也变得很容易。
It had been planted on their site by a group called Lulz Security, a loose collective of anonymous hackers who wanted revenge for a recent PBS programme that criticised WikiLeaks.
消息是被一个叫做Lulz Security的黑客组织植入PBS官网的,这个组织是由匿名团体的黑客组成,他们是对最近PBS节目批评Wikeleaks网站的事进行报复。
But there was another group that worried about the attack: other hackers who steal credit card Numbers and personal identity online and then sell and trade this information in underground markets.
然而,还有另外一群人为了这次攻击而担心。他们是另一群黑客,窃取用户的信用卡号以及在线个人身份资料,并把这些信息拿到黑市进行交易。
Not only does that threaten to rub off on users, it's bad for recruitment and retention of talented hackers, who are the lifeblood of Zuckerberg's creation.
这不仅会威胁到用户,也不利于招募和留住天才黑客,而这些黑客正是扎克伯格创建(公司)的命脉。
Because it is difficult to trace hackers, exactly who isbehind any specific attack and how and where they operate remains to alarge extent a mystery, technology experts say.
技术专家说,因为黑客很难追踪,所以谁是攻击的幕后黑手很难确定,他们在哪里以及如何发动的攻击在很大程度上也都是谜。
In 2009, a South Korean military officer used a tainted USB stick and exposed his computer to South Korean hackers, who gained access to Plan 5027.
2009年,一名韩国军官使用了一个被病毒感染的U盘,导致他电脑内的数据暴露在韩国黑客眼前并泄露了5027方案。
Of course, keep in mind that nothing is foolproof - determined hackers can gain access to your account as can anyone who guesses your password....
当然,牢记在心:没有任何东西是密不透风的(纸包不住火,没有不透风的墙)---有决心的黑客可以进入你的账户,而任何猜到你密码的人也可以。。。
In Christopher Nolan's film Inception, a pivotal character named Ariadne is the Architect, who creates stunning dream cities through which dream hackers chase their marks.
在克里斯托弗·诺兰的电影《盗梦空间》中,主角之一的建筑师艾里·阿德妮创造了这令人惊叹的梦之城,在这里盗梦黑客们追逐着他们的目标。
In Christopher Nolan's film Inception, a pivotal character named Ariadne is the Architect, who creates stunning dream cities through which dream hackers chase their marks.
在克里斯托弗·诺兰的电影《盗梦空间》中,主角之一的建筑师艾里·阿德妮创造了这令人惊叹的梦之城,在这里盗梦黑客们追逐着他们的目标。
应用推荐