计算机犯罪包括数据窃取和盗版软件。
您与数据窃取者面临着相同的法规。
勒索、刺探、数据窃取,这些被当作合理的事情提议出来。
Blackmail, espionage, data theft. These are things that were proposed as reasonable things to do.
云计算提供了全新的计算机遇,不过由于新的数据窃取潜在方式也带来了新的安全问题。
Cloud computing offers new computing opportunities, but it also raises new security issues due to new potential ways for data theft.
无论您是个人隐私,数据窃取,数据丢失或数据泄漏问题,密码文件夹是您的理想工具。
Whether you are concerned with privacy, data theft, data loss, or data leaks, Password Folder is an ideal tool for you.
垃圾邮件、网络钓鱼、炒股诈骗、数据窃取、木马和键盘记录器能够为它们的制造者带来巨额的收入。
Spam, phishing, pump-and-dump schemes and data-stealing Trojans and keyloggers can net their creators an enormous amount of income.
他们提到,在普遍联系的环境中,对隐私和数据窃取的考虑是理所应当的,但是,他们感到现在停止对变化的崇拜已经太晚了。
They acknowledge that privacy and data theft are legitimate concerns in a pervasively connected environment, but they feel it is already too late to stop the juggernaut of change.
他们窃取了保密数据。
企业和政府机构日常面临的最大威胁来自于希望窃取金融数据和商业机密的骗子和间谍。
The biggest day-to-day threats faced by companies and government agencies come from crooks and spooks hoping to steal financial data and trade secrets.
事实上您并不会造成任何损害,而且也不会窃取任何数据,但这并不重要,而且实际上也很难证实这一点!
The fact that you caused no damage and did not steal any data is not only irrelevant, it may actually be hard to prove!
黑客可以从虚拟机中重新分配的实例资源中获取还没有清除的残留数据,从中窃取敏感的信息。
The hacker can steal sensitive information from residual data that has not been purged from re-allocated instance resources within a virtual machine.
利用基于网络实时数据来建立测量标准,从而窃取用户的情绪状况及喜好,这主意并没有多少新意,即使用它来预测人的行为也是一样。
The idea of tapping web-based data to build a real-time measure of users' emotions and preferences is not new. Nor is that of using the results to predict their behaviour.
一定不要记录公司的事情,或从公司窃取数据。
"You don't want to be recording things, or stealing" data from the company.
SQLInjection攻击与应用程序开发人员紧密相关,因为它们可用于侵入据推测是安全的系统并窃取、更改或销毁数据。
SQL injection attacks are a serious concern for application developers as they can be used to break into supposedly secure systems and steal, alter, or destroy data.
这种解决方案保护用户不受那些在浏览器中不知不觉运行的,窃取他的数据,破坏整个0知识架构的恶意代码的侵害。
This solution protects the user from malicious code that could be unknowingly executed by his browser, stealing his data and destroying the whole zero-knowledge architecture.
Facebook迅速针对这个三人帮以及他们名下的社交网站ConnectU发起反诉,宣称这三人侵入Facebook,窃取数据并向其用户发送垃圾邮件。
Facebook promptly countersued the trio and their own social networking site, ConnectU, alleging that they had hacked into Facebook to steal data and spam users.
根据卡巴斯基实验室的Alex Gostev提供的信息,Waledac也会下载一个流氓杀毒软件到感染机器,以及一个可以窃取数据和发送垃圾邮件的电子邮件蠕虫病毒。
According to Kaspersky Labs' Alex Gostev, Waledac will download a rogue antivirus application onto infected machines, as well as an email-worm that can steal data and send spam.
EFS允许文件加密,以便保护保密的数据不会被攻击者以直接访问计算机的方式进行窃取。
This allows for file encryption in order to protect confidential data from attackers with physical access to the computer.
随着我们重要的数据被越来越多的存储到云(云计算)里,寻求窃取那些数据的人会在最薄弱的环节下手的。
As more of our important data finds its way into the cloud, those seeking to exploit that data will seek the weakest point of entry.
这种设计可以在笔记本连接到互联网上时删除其数据,以避免罪犯窃取数据。
The feature protects data on the notebook if the machine is lost or stolen by allowing files to be deleted when the machine connects to the Internet.
组织的数据总是安全的,别人很难窃取或破坏数据。
An organization's data is always secure and is less apt to be stolen or compromised by others.
RSA公司发现550000个在线账户数据和信用卡信息在一个木马的协助下被成功窃取,他们同时在做关于“互联网欺诈的链”的一项研究。
RSA discovered that data from 550, 000 online bank accounts and credit card accounts was stolen with the aid of one Trojan, and has done research on the "Internet Fraud Chain" .
在3月,黑客从Epsilon公司窃取email地址的数据库资料,评论员说那是史上最大的email资料被盗取事件。
In March, hackers stole a database of email addresses from the marketing group Epsilon, in what one commentator called the largest email address heist in history.
所有情况下使用的队列其实是一种双队列(deque)(两端都能输入数据的数据行列,发音为“deck”),它允许线程从另一个队列的后端窃取工作,从而平衡进入线程池的工作。
The queue used in each case is actually a deque (a double-ended queue, pronounced "deck"), which allows threads to steal work from the back end of another queue, balancing work entering the pool.
这种方案要求在手机内部植入一个硬件设备,它可以防止小偷绕过软件程序窃取手机内部的加密数据。
This would involve embedding actual hardware into the phone that would prevent thieves from circumventing software technology to get access to data encrypted on the phone.
然而数据质量低下、敏感数据外泄、外部恶意窃取等问题随之而来,研究行之有效的信息安全策略已刻不容缓。
However, the problems such as low data quality, sensitive data leakage, external malicious theft and so on, it is urgent to study the effective information security strategy.
这可能是危险的和创造机会的人窃取您的隐私数据。
This could be risky and create chance for people to steal your privacy data.
收集信息并不是软件开发者的失误,因为是有米在隐瞒事实,这些被窃取的数据实际上都是传回到了它自己的服务器里。
The data collection does not appear to be the developers' fault, since Youmi was disguising the fact that its software was sending that data to its servers.
本文研究的重点主要是放在对机要数据设备产生的泄漏发射进行检测与窃取方面。
This research report mainly focuses on the detection and eavesdropping of the compromising emanation from the confidential devices.
本文研究的重点主要是放在对机要数据设备产生的泄漏发射进行检测与窃取方面。
This research report mainly focuses on the detection and eavesdropping of the compromising emanation from the confidential devices.
应用推荐