黑客是网络系统常见的非法入侵者。
你同意更新,就不能算非法入侵了。
组成设备的材料能够防止非法入侵吗?
Are your facilities constructed of materials (concrete and steel for example) that resist unlawful entry?
为什么不首先停止非法入侵!
非法入侵一直威胁着计算机网络系统的安全。
Unlawful incursion has been threatening the safety of computer network system.
警察指控他非法入侵。
在电视镜头上托内承认他们非法入侵了伊朗领海。
Turney was shown on the television admitting "illegal entry" into Iranian waters.
只有非法入侵者从外向内闯入警戒区,才会触发报警。
Only the illegal invaders from the inside outward into the alert zone would trigger the alarm.
通过该项行为服务器软件可以自保,不受非法入侵损害。
This permits the server specific software to protect itself from unauthorized intrusion.
为提取计算机非法入侵的证据,选取了日志作为证据来源。
The log as evidence sources is selected for extracting evidence on the illegal computer invasion.
介绍了网络的不安全因素,包括网络病毒和系统外来非法入侵。
This paper introduces the unsafe factors, including network virus and illegal invasion outside system.
背景:大多数依据联邦法律该罚的非法入侵涉及到联邦的土地或财产。
Background: Most trespasses punishable under federal law involve federal lands or property.
计算机犯罪的形式是未经授权而非法入侵计算机系统,复制程序或数据文件。
Computer crime form is unauthorized and illegal invasion of computer systems, copying programs or data files.
本发明记录并报告非法入侵信息,便于安全部门管理,提高电子设备的安全性。
The invention can record and report illegal incursion information, so as to provide convenience for security departments in management to increase security of electronic devices.
然而调查显示,去年一些银行的安全保密机制并不完善,导致客户们的帐户被非法入侵。
However, research published by Which? Last year found the security regimes of some Banks leave customers vulnerable to hacking.
加之世界各地包括中国和俄罗斯不断地非法入侵,我们已经有了一套国家毁灭的图谱。
Add the ongoing invasion by illegals coming from all over the world including China and Russia and you have a recipe for national suicide.
约翰·威廷戴尔对BBC说:“我们现在发现,事实上电话非法入侵受害者的数量很大。”
John Whittingdale told the BBC: "we've now discovered that actually the extent of the phone hacking went very wide indeed."
就在这个时候,一对夫妇下楼来做晚饭,给两个非法入侵者提供了极好的下台阶的机会。
A couple walked downstairs to cook their supper at that moment; thus provided a marvellous chance for the intruders to step down.
两名警察冒险爬上桥并将他逮捕,非法入侵。罗伯特需要交付120欧元的保释金才能获释。
Two policemen standing at the top of the pillar arrested Robert for trespassing. He will have to pay a fine of 120 euro before being released.
系统之家结合自己的工作实践,总结了10条保护路由器、防止非法入侵的办法,您不妨一试。
Home of systems in combination with their own work practice, summarizes the article 10 protection router, to prevent the illegal invasion, you might as well try.
另一种药物,则是造成披衣菌挪用宿主细胞脂质的机制失效,使得这些非法入侵者无法藏匿。
Another drug might incapacitate the mechanisms the bacteria use to divert lipids from the host cell to the chlamydial vacuole, halting the trespassers' ability to hide.
攻击者利用网络技术,非法入侵他人计算机系统,窃取信息、篡改数据,给企业造成巨大损失。
Attackers use network technology, illegally intrude computer system, steal information, tamper data, and bring heavy losses to enterprises.
该报同样面临被指控非法入侵在2005年7月7日的纽约交通爆炸袭击事件中遇难的市民的手机。
The same tabloid is also now accused of snooping on the phones of ordinary citizens bereaved in the July 7th 2005 London transport bombings.
因此,如果金融企业数据库中的数据丢失、或遭到非法入侵,其带来的经济损失将是无法估量的。
So, if the content of the database are lost, or invaded, the economic loss will be great.
周界入侵探测的主要任务是当设防周界发生非法入侵时能及时准确地检测到入侵的位置并发出早期警告。
The main task of perimeter intruder inspection is to inspect the location of intruder exactly and to send an early warning when the illegal intrusion happened.
像约翰·普雷斯科特这样的知名人士据说就是非法入侵的牺牲者,他们没有明确的证据表明手机是被入侵的。
Well-known figures such as John Prescott are said to have been victims of the hacking without any clear evidence that their phones were, in fact, hacked.
像约翰·普雷斯科特这样的知名人士据说就是非法入侵的牺牲者,他们没有明确的证据表明手机是被入侵的。
Well-known figures such as John Prescott are said to have been victims of the hacking without any clear evidence that their phones were, in fact, hacked.
应用推荐