• 大概听说计算机黑客计算机病毒

    You probably know about computer hackers and computer viruses.

    youdao

  • 计算机黑客这个名词最初是出现20世纪60年代中期

    The term computer hacker first showed up in the mid-1960s.

    youdao

  • 通常计算机黑客电脑病毒利用安全漏洞入侵计算机系统

    Usually hackers or computer virus intrude a computer system by security holes.

    youdao

  • 这个计算机黑客突然碰壁了,因这家公司实行了密码保存公司纪录政策

    The hacker came smack up against the company's policy of keeping its records in code.

    youdao

  • 不同预防性防御措施(1)可能在防御内部威胁防御来自计算机黑客的威胁有效

    Different preventive defensive measures (Figure 1) may be more effective against an insider threat than a threat from a computer hacker.

    youdao

  • 一位计算机黑客通过入侵ATM柜员机电脑方式,不用银行卡就能让ATM机疯狂钞。

    A hacker has discovered a way to force ATMs to disgorge their cash by hijacking the computers inside them.

    youdao

  • 国际刑警组织阿桑奇追捕令可能集中瑞典英国,这位高深莫测计算机黑客在这两个国家了大半生

    The hunt for Assange sparked by the Interpol request would likely focus on Sweden and Britain, where the elusive former computer hacker spends much of his time.

    youdao

  • 此时计算机黑客可以通过拨号等方式建立的连接攻击台机器,通过这台机器访问内部网络,窃取机密资料,甚至使整个网络瘫痪

    Hackers may attack the host and then visit the Intranet, steal the confidential information and paralyze the whole network through the illegal connection.

    youdao

  • 据说黑客开始传播一种计算机病毒

    Hackers are said to have started a computer virus.

    《柯林斯英汉双解大词典》

  • 创立了一家德国黑客俱乐部——混沌计算机俱乐部,1981年成立以来黑客社区也是数一数二

    He founded the Chaos Computer Club, a hacker club in Germany that has been at the forefront of the hacking community since its establishment in 1981.

    youdao

  • 并非所有攻击都是黑客-有些攻击者根本了解计算机

    Not all attackers are hackerssome attackers don't know anything about computers.

    youdao

  • 黑客通过公共网站通过发送公司高管受感染电子邮件两种方法之一进入计算机

    The hackers got into the computers in one of two ways, either through their public websites or through infected emails sent to company executives.

    youdao

  • 简介由于黑客攻击最近新闻屡有报导,我们知道需要认真地对待计算机安全问题。

    Summary: With hacker attacks in the news frequently these days, we all know that computer security needs to be taken seriously.

    youdao

  • 尽管许多出版物介绍可以用来确保计算机环境安全的软件,但很少有出版物说明黑客攻击实际上如何执行的。

    While many publications exist about software that can be used to secure computer environments, very few publications exist that explain how hacker attacks are actually performed.

    youdao

  • 专家级电脑黑客称作狂乱可以闯入超载其军用计算机网络散布电脑病毒

    Expert computer hackers, called crackers, might break into or overload military computers and networks, or spread computer viruses.

    youdao

  • 一些电脑安全专家建议确保计算机安全最好方法编写出一种那么容易病毒蠕虫其他黑客伎俩破环软件

    Some computer security experts propose that the best way to ensure computer security is to write software that isn't easily breached by viruses, worms and other hacker tricks.

    youdao

  • 麦金农黑客活动并不是非法访问计算机时的随机试验而是关键时刻故意破坏美国防御系统,并且留下了证据确凿损害

    She said McKinnon's hacking activities "were not random experiments in computer hacking, but a deliberate effort to breach US defence systems at a critical time which caused well-documented damage.

    youdao

  • 这个功能黑客能将所有来自计算机网络信息转发到路由器(如图5)。

    This feature enables the hacker's machine to forward any network traffic it receives from your computer to the router (shown in Diagram 5).

    youdao

  • 采访中布伦南问及寻求渗透计算机网络黑客构成威胁

    During the interview, Brennan was also asked about the threat posed by hackers seeking to infiltrate computer networks.

    youdao

  • 现在机器以为黑客计算机你的路由器了

    Now your machine thinks the hacker's computer is your router.

    youdao

  • 有些声明狼籍黑客高中生他们地下室里的电脑寻找利用计算机系统的漏洞的方法

    Some of the most notorious hackers are high school kids in their basements planted in front of their computers looking for ways to exploit computer systems.

    youdao

  • 收件人打开附件时,一则计算机代码就会自动安装受害人电脑上,黑客得以控制电脑。

    When the recipient opened an attached document, a piece of computer code installed itself on the victim's computer allowing the hacker to take control of the computer.

    youdao

  • 缓冲溢出攻击黑客利用程序执行期间存储分配中的特定计算机程序漏洞

    In a buffer overflow attack, the hacker takes advantage of specific type of computer program bug that involves the allocation of storage during program execution.

    youdao

  • 他们都很热爱计算机,高中时一起用黑客技术犯罪。

    They Shared a love of computers and were hacker partners-in-crime during high school.

    youdao

  • 如果负责确保公司计算机环境的安全,那么,理解黑客攻击的工作原理对您就重要了。

    If you are responsible for securing your company's computer environment, it's important you understand how attacks work.

    youdao

  • 根据Morris规则构建计算机不会试图成为针对黑客完全证据他们无法在不留下指纹电子证据时候进入系统。

    Computers built according to Morris's rule would not attempt to be utterly proof against cracker, but they would be impossible to enter without leaving the digital equivalent of fingerprints.

    youdao

  • 休斯顿我们可能遇到了luser(译注:黑客将那些勉强会使用计算机,但又经常失败的人称为luser)。”嘿嘿地起来

    "Houston, we've got a possible luser here," he chuckled.

    youdao

  • 现在只要尝试上网计算机就会网络信息发送黑客机器上然后黑客将其转发路由器

    Now, whenever you try to go to the Internet, your computer sends the network traffic to the hacker's machine, which it then forwards to the real router.

    youdao

  • 现在只要尝试上网计算机就会网络信息发送黑客机器上然后黑客将其转发路由器

    Now, whenever you try to go to the Internet, your computer sends the network traffic to the hacker's machine, which it then forwards to the real router.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定