Lifehacker为介绍TOR这一匿名网络工具下足了功夫,告诉了大家它是什么以及它是如何运作的。
Lifehacker has done an excellent job of explaining the anonymous Internet tool, TOR, including what it is and how it works.
匿名网络通讯作为一种新兴通讯方式在现代社会广泛使用,具有广阔发展前景,同时它在监听活动中也愈发显得重要。
As a new communicative method, anonymous Internet communication has a bright prospect in the modern society, and also takes an important role in the monitoring actions.
然而,对于匿名网络通讯监听除外究竟该如何进行设定的问题,理论界存在着诸多不同意见,实践中也有不同的具体法律解决方式。
However, there exist different opinions and concrete legislation solutions, both in theory and in practice, about how to design the anonymous Internet communication monitoring exception.
唯一允许不同政见者发言的地方——或者说警察难以控制的地方——似乎就是网络,人们可以通过匿名隐藏自己的身份。
The one place where dissent does seem to be allowed - or is harder to police - is the internet, where people can hide behind their anonymity.
更安全的网络几乎肯定会提供较少匿名和隐私。
A more secure network is one that would almost certainly offer less anonymity and privacy.
一些联系网则依赖着网络匿名进行沟通,然而由于只有五分之一的叙利亚人上网,所以传统方式的联系就变得更加重要。
Some networks rely on the anonymity of the Internet. But with only about a fifth of Syrians online, traditional bonds are more important.
曾通过P 2 P网络非法下载过音乐的人都可以参与下面的匿名调查。
For anyone who has ever downloaded music illegally via a P2P network, please respond to the anonymous poll below.
但现在,关于网络,我们还有很多关于匿名和身份的争论。
Right now, online, we are having many debates about anonymity and identity.
这次网络袭击事件发生在“匿名者”组织21名成员在美国,英国和荷兰被捕之后。
The cyber attack comes days after 21 suspected members of Anonymous were arrested in the us, Britain and the Netherlands.
当电脑网络提供了简单、匿名的方式进行小额转账,无需信用卡时,将易于建立更好的艺术支持体系。
When computer networks provide an easy anonymous method for sending someone a small amount of money, without a credit card, it will be easy to set up a much better system to support the arts.
我们没有全球性的网络流量分析,我们组织中的大部分成员需要彼此协作,对他们手头上的匿名提交的信息进行分类。
Without specialized global Internet traffic analysis, multiple parts of our organisation must conspire with each other to strip submitters of their anonymity.
唯一的一点空隙是一个阴暗的网络——一个庞大的匿名的高阶互联网,一个黑客的天堂。
The only shadow was the darkweb, a vast, anonymous alt-Internet, a haven for pedophiles or hacker types.
网络上的匿名问题以及有关人员的权利问题,在全球几起法律纠纷后成了热点话题。
The question of anonymity online - and the rights of those involved - is a hot one after a series of legal battles around the world.
匿名将继续保留它的一席之地;这是网络的结构,很难改变它。
Anonymity will continue to have its place; that is the architecture of the web and it will be difficult to change that.
但网络匿名是对执法最棘手的挑战。
But that anonymity is now the most vexing challenge for law enforcement.
人们认为他们在网络上的匿名身份允许他们做些不同寻常的事。
The anonymity people think they have online makes them act differently.
他的主要武器便是他所开发的一种方法,该方法可以将社交网络如Facebook与LinkedLn中发现的真实身份与黑客的匿名资料关联起来。
His principal weapon was a method he developed to associate the real identities found in social networks such as Facebook and LinkedIn with the anonymous profiles of hackers.
随后巴尔比较了嫌疑黑客匿名登录ICR聊天室和登录自己可识别社交网络账号的时间。
Barr then compared The Times that suspected hackers logged into IRC chat rooms anonymously and into their own identifiable social networking accounts.
blue jacking (bluetooth +hijacking,蓝牙劫持)指通过蓝牙无线传输网络给别人的手机发送匿名信息,感觉就好像突然把人家的手机劫持了一样。
Bluejacking means temporarily hijacking another person's cell phone by sending it an anonymous text message using the Bluetooth wireless networking system.
Siegel先生并非第一个用马甲回击匿名攻击者的记者,当然也不是最后一个抱怨网络评论的。
Mr Siegel wasn't the first journalist to use a "sock puppet" to confront anonymous attackers, and he certainly wasn't the last to complain about comments on the web.
这在网络上引起了一场暴风雨般的大讨论,而这门课程也受到了无数匿名网友的支持。
This led to a stormy discussion on the Internet and the university course received a surprising amount of support from anonymous netizens.
在网络和传统媒体上,我们展开了关于身份、匿名制、新闻准确性的讨论。
Online and in traditional media, we are asking each other questions about identity, anonymity and journalistic integrity.
网络匿名将逐渐变得更像现实世界中的匿名。
Anonymity online will gradually become a lot like anonymity in the real world.
然而,近来的匿名攻击显示其复杂程度又上了新台阶,通过招募志愿者下载工具来创建“虚拟”僵尸网络,几乎可以让人人成为潜在的黑客。
However, recent anonymous attacks showed a new level of sophistication by recruiting volunteers to download a tool to create a "virtual" botnet, turning almost anybody into a potential hacker.
网络行为的匿名性,隐形性以及幻想成分鼓励我们认为通行的规则并不适用。
The anonymity, invisibility and fantasy elements of online activities encourage us to think that the usual rules don't apply.
网络行为的匿名性,隐形性以及幻想成分鼓励我们认为通行的规则并不适用。
The anonymity, invisibility and fantasy elements of online activities encourage us to think that the usual rules don't apply.
应用推荐