回应攻击性电子邮件的最好方式就是置之不理。
在当天工作时间快要结束的时候,一个公司里的用户打开了一个垃圾邮箱里的邮件,他打开了它,然后程序的攻击开始了。
At the end of the day, a user within that company opened an email. It went into his spam box, he opened it, and that launched the attack.
在本方案中,当用户执行邮件消息中的恶意链接时,就会不知不觉地执行攻击者编写的脚本。
In this scenario, the user unknowingly executes scripts written by an attacker when they follow a malicious link in a mail message.
提起这个话题的一个好方法就是,在博客上写封邮件或写封信给你的伴侣,说明你的感受——同样,不要有攻击对方的感觉。
A good way to get started is to write a blog post or a letter to your spouse about your feelings -again, without being attacking.
他的部分攻击瞄准了高盛的内部邮件。
厂家提供了历史和实时报表,并可通过邮件发送病毒和攻击信息。
The UTM provides graphical historical and real-time reports and can send virus and attack information via e-mail.
网站的访问量收到了绊倒安全机制,让人觉得这个搜索引擎在受到一个垃圾邮件程序的攻击。
The volume of searches the site received tripped safety mechanisms and made the search engine think it was under attack from a spambot.
攻击者可以将有关网银站点的电子邮件发给用户。
An attacker can send an E-mail about a banking Web site to a user.
钓鱼攻击在网上很常见,常常是以收到看似合法的电子邮件开始,邮件中含有逼真的网站(常常是银行或电子邮件供应商)的链接。
Phishing attacks are common online, and usually begin with the arrival of a legitimate-looking email containing a link to a realistic-looking website - often a bank or email provider.
接下来,感染病毒的电脑被连起来形成“僵尸网络”,并被外部控制。“僵尸网络”能被用来发送垃圾邮件或者发动能使网站瘫痪的洪水攻击。
Compromised machines can then be linked up to form "botnets" under external control, which are used to send spam e-mails or disable websites with a flood of bogus requests.
Bob决定利用这一点,他想用吸干带宽的方法来攻击我的Web和邮件服务器。
Bob decides to take advantage of this fact by launching a bandwidth-sucking attack against my web and mail server.
这次攻击之后,几家不相关的网站,包括LinkedIn和Woot,均给他们的用户发送邮件提醒他们,如果他们所用密码与在Gawker上的密码一样,需要尽快修改。
Following the attack several unrelated websites, including LinkedIn and Woot, sent E-mail to their users warning them to change their passwords if these were the same ones as they used for Gawker.
第一条规定按照“合理网络管理”的精神,禁止运营商屏蔽合法通讯(一个例外是要确保垃圾邮件或者拒绝服务的攻击行为能被阻止)。
One prevents network operators from blocking lawful traffic, subject to "reasonable network management" (an exception needed to ensure that spam or denial-of-service attacks can be stopped).
最近爆发的几起重大数据失窃事件,就是电子邮件和数据系统等网络应用程序遭受黑客攻击的结果。
Yet, most of the major data breaches in recent news have been the result of attacks on Web apps like email and data systems.
这些电子邮件显示了批评者的攻击让写这些邮件的科学家灰心丧气,而且就像孟德尔那样,他们渴望加强他们的结论的力量。
The emails reveal that the scientists who wrote them were frustrated by the attacks of critics and, like Mendel, were anxious to sharpen the strength of their conclusions.
我们也同意这点,但是我们也要指出许多钓鱼攻击和恶意软件仍然是通过邮件传播的。
We would agree with this, but we would also point out that a lot of these scams and malware attacks still arrive by email.
或攻击者可以安装一个特洛伊木马程序或不请自来的电子邮件发送软件,目的是在金融活动或造成损害品牌名称,修改公司的资源。
Or an attacker might be able to install a Trojan horse program or unsolicited E-mail sending software, aim at financial enrichment or cause brand name damage by modifying company resources.
招聘网站频频受到黑客的攻击,或遭受通过电子邮件“网络钓鱼”的攻击,因为它们为那些对身份盗窃感兴趣的人提供了丰富的数据资源。
Job sites are regularly attacked by hackers and via email "phishing" attacks, as they provide a rich source of data for those interested in identity theft.
如今网上大量唾手可得的个人信息使得攻击电脑更加容易,方式是仿造一个更能取得信任并能打开的电子邮件。
The amount of information now available online about individuals makes it ever easier to attack a computer by crafting a personalised E-mail that is more likely to be trusted and opened.
FBI并没有就此次故障事故提供更多细节,不过看起来黑客们可能是通过带毒的邮件附件对网络进行攻击。
The FBI did not provide details on the security incident, but it looks as though hackers may have used maliciously encoded file attachments to hack into the network.
为什么任何人都觉得犯罪分子不会使用同一个系统来盗取银行账户和信用卡信息,利用它发动其它攻击或者将它变成巨大的垃圾邮件发放网络?
Why does anyone think criminals won't be able to use the same system to steal bank account and credit card information, use it to launch other attacks or turn it into a massive spam-sending network?
他们很可能成为黑客的攻击目标。攻击手段包括伪装成受害者认识的人,通过电子邮件向其发送恶意软件。
They could be targeted by a hacker who could takes steps, including sending malicious software in an email, that appears to come from someone the victim knows.
那么,你知道还有什么可以让你暴露于垃圾邮件和黑客攻击?
Well, you know what else can expose you to spam and hacking?
电子邮件、远程登录和超级用户特权都需要密码,这些密码最好各不相同而且难以通过自动化攻击猜测或推断出来。
To wit, e-mail, remote login, and superuser privileges all require a password—preferably disparate and each difficult to guess or derive using an automated attack.
犯罪分子可以利用计算机网络攻击他人计算机系统、软件、发送垃圾邮件或是窃取资料。
They can be used to attack other systems, host attack tools, send spam, or just steal data.
一家卓越的因特网巨头发现自己已经成为网络谋划的攻击目标,这将造成无权限的局外者可防卫部分他们网络用户的电子邮件。
A prominent Internet giant has found itself the target of an online plot that allowed outsiders to read some of its users' emails.
如果这个受害者登陆到GoogleMail,攻击者会改变过滤器设置将他的所有邮件转发到攻击者的邮箱里。
If the victim was logged in to Google mail, the attacker would change the filters to forward all e-mails to his E-mail address.
键盘记录工具允许攻击者劫持任何用户输入;比如说,如果某个用户在使用一个基于 Web 的电子邮件服务,那么键盘记录工具将记录下任何文本输入并将其发送给攻击者。
The key logger allows an attacker to hijack any user input; for example, if a user uses a Web-based e-mail service, the key logger will record and transmit any text input to the attacker.
微软承认针对使用其流行的电子邮件服务用户的钓鱼攻击,已经导致泄露了数以千计的Hotmail用户的密码。
Microsoft has confirmed that the publication of thousands of Hotmail passwords was the result of a phishing attack against users of the popular email service.
微软承认针对使用其流行的电子邮件服务用户的钓鱼攻击,已经导致泄露了数以千计的Hotmail用户的密码。
Microsoft has confirmed that the publication of thousands of Hotmail passwords was the result of a phishing attack against users of the popular email service.
应用推荐