• 黑客网络系统常见非法入侵

    Hackers are common illegal intruders in network systems.

    youdao

  • 同意更新不能非法入侵

    If you agree to its update, it is not illegal intrusion.

    youdao

  • 组成设备材料能够防止非法入侵吗?

    Are your facilities constructed of materials (concrete and steel for example) that resist unlawful entry?

    youdao

  • 为什么首先停止非法入侵

    Why don't you Stop this illegal War first!

    youdao

  • 非法入侵一直威胁着计算机网络系统安全

    Unlawful incursion has been threatening the safety of computer network system.

    youdao

  • 警察指控非法入侵

    The police charged him with trespass.

    youdao

  • 电视镜头托内承认他们非法入侵伊朗领海

    Turney was shown on the television admitting "illegal entry" into Iranian waters.

    youdao

  • 只有非法入侵外向闯入警戒才会触发报警

    Only the illegal invaders from the inside outward into the alert zone would trigger the alarm.

    youdao

  • 通过该项行为服务器软件可以自保,不非法入侵损害

    This permits the server specific software to protect itself from unauthorized intrusion.

    youdao

  • 提取计算机非法入侵证据选取日志作为证据来源

    The log as evidence sources is selected for extracting evidence on the illegal computer invasion.

    youdao

  • 介绍网络不安全因素包括网络病毒系统外来非法入侵

    This paper introduces the unsafe factors, including network virus and illegal invasion outside system.

    youdao

  • 背景大多数依据联邦法律非法入侵涉及到联邦的土地财产

    Background: Most trespasses punishable under federal law involve federal lands or property.

    youdao

  • 计算机犯罪形式未经授权非法入侵计算机系统复制程序数据文件

    Computer crime form is unauthorized and illegal invasion of computer systems, copying programs or data files.

    youdao

  • 发明记录报告非法入侵信息便于安全部门管理提高电子设备安全性

    The invention can record and report illegal incursion information, so as to provide convenience for security departments in management to increase security of electronic devices.

    youdao

  • 然而调查显示去年一些银行安全保密机制并不完善,导致客户帐户非法入侵

    However, research published by Which? Last year found the security regimes of some Banks leave customers vulnerable to hacking.

    youdao

  • 加之世界各地包括中国俄罗斯不断地非法入侵我们已经有了一国家毁灭图谱

    Add the ongoing invasion by illegals coming from all over the world including China and Russia and you have a recipe for national suicide.

    youdao

  • 约翰·威戴尔BBC说:“我们现在发现事实上电话非法入侵受害者数量很大。”

    John Whittingdale told the BBC: "we've now discovered that actually the extent of the phone hacking went very wide indeed."

    youdao

  • 这个时候一对夫妇下楼晚饭,两个非法入侵提供了极好的下台阶机会

    A couple walked downstairs to cook their supper at that moment; thus provided a marvellous chance for the intruders to step down.

    youdao

  • 名警察冒险上桥并逮捕非法入侵罗伯特需要交付120欧元保释金才能获释

    Two policemen standing at the top of the pillar arrested Robert for trespassing. He will have to pay a fine of 120 euro before being released.

    youdao

  • 系统结合自己工作实践总结10保护路由器防止非法入侵的办法,不妨一试

    Home of systems in combination with their own work practice, summarizes the article 10 protection router, to prevent the illegal invasion, you might as well try.

    youdao

  • 另一种药物,则是造成披衣挪用宿主细胞质的机制失效,使得这些非法入侵者无法藏匿。

    Another drug might incapacitate the mechanisms the bacteria use to divert lipids from the host cell to the chlamydial vacuole, halting the trespassers' ability to hide.

    youdao

  • 攻击者利用网络技术非法入侵他人计算机系统窃取信息篡改数据企业造成巨大损失。

    Attackers use network technology, illegally intrude computer system, steal information, tamper data, and bring heavy losses to enterprises.

    youdao

  • 该报同样面临被指控非法入侵2005年7月7日纽约交通爆炸袭击事件中遇难市民手机

    The same tabloid is also now accused of snooping on the phones of ordinary citizens bereaved in the July 7th 2005 London transport bombings.

    youdao

  • 因此如果金融企业数据库中的数据丢失遭到非法入侵带来的经济损失无法估量的

    So, if the content of the database are lost, or invaded, the economic loss will be great.

    youdao

  • 周界入侵探测主要任务设防周界发生非法入侵时能及时准确地检测入侵位置发出早期警告

    The main task of perimeter intruder inspection is to inspect the location of intruder exactly and to send an early warning when the illegal intrusion happened.

    youdao

  • 约翰·普雷斯科特这样知名人士据说就是非法入侵牺牲者他们没有明确证据表明手机是被入侵的。

    Well-known figures such as John Prescott are said to have been victims of the hacking without any clear evidence that their phones were, in fact, hacked.

    youdao

  • 约翰·普雷斯科特这样知名人士据说就是非法入侵牺牲者他们没有明确证据表明手机是被入侵的。

    Well-known figures such as John Prescott are said to have been victims of the hacking without any clear evidence that their phones were, in fact, hacked.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定