这会让它们成为网络黑客的目标。
反对任何形式的网络黑客攻击行为。
你认为这些网络黑客如何?
网络黑客袭击大公司、国际货币基金组织以及各大新闻网站。
正因为如此,它也成了网络黑客攻击的目标和对象。
大多数被捕者都在美国。联邦调查局表示,已有16人承认了自己是网络黑客。
Most of the arrests were in the US, where the FBI said 16 people had been held for alleged computer hacking.
当PKI提供服务时,PKI系统可能成为网络黑客攻击的重点目标。
When PKI provides services, PKI system will be the target of Internet hackers.
在网络上如何保证合法用户对资源的合法访问以及如何防止网络黑客攻击,成为网络安全的主要内容。
How to guarantee the legal user's legal access to resources and protect hackers' attacks has been the mostly content of network security.
主要介绍了基于以太网环境下数据包的截获的设计与实现。数据包截获的实现是防范网络黑客攻击的措施之一。
This paper, based on Ether network environment, primarily presents design and realization of data packet seize which is one of the measure against the hacker's attack.
对于维护一个应用程序或系统,网络黑客所涉及的人:下一代是为数不多的书籍之一,以识别各种新兴的攻击媒介。
For anyone involved in defending an application or a network of systems, Hacking: the Next Generation is one of the few books to identify a variety of emerging attack vectors.
《洛杉矶时报》称,网络黑客最近袭击了美军战区的网络系统,其中包括负责监控伊拉克和阿富汗的中央指挥部系统。
Hackers have recently attacked US combat zone computers, including those of Central Command overseeing Iraq and Afghanistan, according to the Los Angeles Times.
如今网络黑客窃取数据的花样很多:非法接入、木马攻击、IP欺骗、网页仿冒、僵尸网络、网络嗅探、网址嫁接等。
Now the network hackers to steal data many tricks: illegal access, Trojan attacks, phishing, spoofing, IP Botnet, network sniffer, pharming etc...
我们面临着网络黑客攻击问题,这也是我们致力于实施和加强在网络中的行为准则,以保护我们的互联网和我们的公民的原因。
We have a serious problem with cyberattacks, which is why we're working to shape and enforce rules of the road to secure our networks and our citizens.
到目前为止,因涉嫌参与LulzSec 和Anonymous集团实施的网络黑客攻击的犯罪人已有10人被警方抓获,并且都是来自英国的男性。
Police have so far arrested 10 people in the UK, all male, in connection with online attacks carried out by the LulzSec and Anonymous groups.
当这些智能手机和笔记本电脑登录到不真实的网络上时,黑客可以很容易地窃取他们的私人信息。
When these smartphones and laptops log on to the networks which are not real, hackers can easily steal their private information.
然后,黑客们将这些数据卖给了另一群在网络阴暗角落里活动的犯罪分子。
Hackers then sold the data to a second group of criminals operating in shadowy corners of the web.
在采访中,布伦南还被问及寻求渗透计算机网络的黑客所构成的威胁。
During the interview, Brennan was also asked about the threat posed by hackers seeking to infiltrate computer networks.
那就是说,黑客会被知道他接入了这个网络。
That said, hackers have been known to gain local access to networks.
安全公司麦咖啡最近发现在2010年世界上十个国家中有八个的重要网络收到了黑客的攻击。
Security firm MacAfee recently found that eight out of 10 countries around the world had had critical networks targeted by hackers during 2010.
现在,只要你尝试上网,你的计算机就会将网络信息发送到黑客的机器上,然后黑客再将其转发到路由器。
Now, whenever you try to go to the Internet, your computer sends the network traffic to the hacker's machine, which it then forwards to the real router.
今年夏天早些时候,联邦调查局和保密署警告巴拉克·奥巴马和约翰·麦凯恩的竞选团队他们的计算机网络已经被外国黑客们危害。
Earlier this summer, the Secret Service and Federal Bureau of Investigation warned Barack Obama's and John McCain's campaign teams that their computer networks had been compromised by foreign hackers.
这一密码列表刊登在了网站上,黑客及网络安全研究人员可自由下载。
The list was briefly posted on the Web, and hackers and security researchers downloaded it.
利用一个由单一主机控制的电脑网络(称为僵尸网络),黑客竭力地颠覆一个网站的服务器。
Using a network of computers (dubbed zombies) controlled by a single master machine, the hacker tries to overwhelm a website's servers.
一组网络安全专家警告说,改变违法网络的流向程序会在黑客掌控一定范围时被他们模仿。
A group of Internet safety experts cautioned that the procedure to redirect Internet traffic from offending Web sites would mimic what hackers do when they take over a domain.
一组网络安全专家警告说,改变违法网络的流向程序会在黑客掌控一定范围时被他们模仿。
A group of Internet safety experts cautioned that the procedure to redirect Internet traffic from offending Web sites would mimic what hackers do when they take over a domain.
应用推荐