你大概听说过计算机黑客和计算机病毒。
You probably know about computer hackers and computer viruses.
计算机黑客这个名词最初是出现在20世纪60年代中期。
通常,计算机黑客和电脑病毒利用安全漏洞入侵计算机系统。
Usually hackers or computer virus intrude a computer system by security holes.
这个计算机黑客突然碰壁了,因这家公司实行了用密码保存公司纪录的政策。
The hacker came smack up against the company's policy of keeping its records in code.
不同的预防性防御措施(图1)可能在防御内部威胁比防御来自计算机黑客的威胁更有效。
Different preventive defensive measures (Figure 1) may be more effective against an insider threat than a threat from a computer hacker.
一位计算机黑客通过入侵ATM柜员机里的电脑的方式,不用银行卡就能让ATM机疯狂吐钞。
A hacker has discovered a way to force ATMs to disgorge their cash by hijacking the computers inside them.
国际刑警组织对阿桑奇的追捕令可能集中在瑞典和英国,这位高深莫测的前计算机黑客在这两个国家呆了大半生。
The hunt for Assange sparked by the Interpol request would likely focus on Sweden and Britain, where the elusive former computer hacker spends much of his time.
此时计算机黑客就可以通过拨号等方式建立的连接攻击这台机器,并通过这台机器访问内部网络,窃取机密资料,甚至使整个网络瘫痪。
Hackers may attack the host and then visit the Intranet, steal the confidential information and paralyze the whole network through the illegal connection.
据说黑客们已开始传播一种计算机病毒。
他创立了一家德国的黑客俱乐部——混沌计算机俱乐部,自1981年成立以来,在黑客社区也是数一数二的。
He founded the Chaos Computer Club, a hacker club in Germany that has been at the forefront of the hacking community since its establishment in 1981.
并非所有攻击者都是黑客-有些攻击者根本不了解计算机。
Not all attackers are hackers — some attackers don't know anything about computers.
黑客通过其公共网站或通过发送到公司高管、受感染的电子邮件的两种方法之一进入到计算机。
The hackers got into the computers in one of two ways, either through their public websites or through infected emails sent to company executives.
简介:由于黑客攻击最近在新闻中屡有报导,我们都知道需要认真地对待计算机安全问题。
Summary: With hacker attacks in the news frequently these days, we all know that computer security needs to be taken seriously.
尽管有许多出版物介绍可以用来确保计算机环境安全的软件,但很少有出版物说明黑客攻击实际上是如何执行的。
While many publications exist about software that can be used to secure computer environments, very few publications exist that explain how hacker attacks are actually performed.
专家级电脑黑客,称作狂乱,可以闯入、超载其军用计算机和网络,散布电脑病毒。
Expert computer hackers, called crackers, might break into or overload military computers and networks, or spread computer viruses.
一些电脑安全专家建议,确保计算机安全的最好方法是编写出一种不那么容易被病毒,蠕虫及其他黑客伎俩破环的软件。
Some computer security experts propose that the best way to ensure computer security is to write software that isn't easily breached by viruses, worms and other hacker tricks.
她说,麦金农的黑客活动“并不是非法访问计算机时的随机试验,而是在关键时刻故意破坏美国防御系统,并且留下了证据确凿的损害。
She said McKinnon's hacking activities "were not random experiments in computer hacking, but a deliberate effort to breach US defence systems at a critical time which caused well-documented damage.
这个功能让黑客能将所有来自你的计算机的网络信息转发到路由器(如图5)。
This feature enables the hacker's machine to forward any network traffic it receives from your computer to the router (shown in Diagram 5).
在采访中,布伦南还被问及寻求渗透计算机网络的黑客所构成的威胁。
During the interview, Brennan was also asked about the threat posed by hackers seeking to infiltrate computer networks.
现在你的机器以为黑客的计算机是你的路由器了。
Now your machine thinks the hacker's computer is your router.
有些声明狼籍的黑客是高中生,他们在地下室里的电脑前寻找利用计算机系统的漏洞的方法。
Some of the most notorious hackers are high school kids in their basements planted in front of their computers looking for ways to exploit computer systems.
当收件人打开附件时,一则计算机代码就会自动安装在受害人的电脑上,令黑客得以控制电脑。
When the recipient opened an attached document, a piece of computer code installed itself on the victim's computer allowing the hacker to take control of the computer.
在缓冲溢出攻击中,黑客利用了程序执行期间存储分配中的特定计算机程序漏洞。
In a buffer overflow attack, the hacker takes advantage of specific type of computer program bug that involves the allocation of storage during program execution.
他们都很热爱计算机,高中时一起用黑客技术犯罪。
They Shared a love of computers and were hacker partners-in-crime during high school.
如果您负责确保公司的计算机环境的安全,那么,理解黑客攻击的工作原理对您就很重要了。
If you are responsible for securing your company's computer environment, it's important you understand how attacks work.
根据Morris规则构建的计算机不会试图成为针对黑客的完全证据,但他们将无法在不留下指纹的电子证据的时候进入系统。
Computers built according to Morris's rule would not attempt to be utterly proof against cracker, but they would be impossible to enter without leaving the digital equivalent of fingerprints.
“休斯顿,我们可能遇到了一个luser(译注:黑客将那些勉强会使用计算机,但又经常失败的人称为luser)。”他嘿嘿地笑了起来。
现在,只要你尝试上网,你的计算机就会将网络信息发送到黑客的机器上,然后黑客再将其转发到路由器。
Now, whenever you try to go to the Internet, your computer sends the network traffic to the hacker's machine, which it then forwards to the real router.
现在,只要你尝试上网,你的计算机就会将网络信息发送到黑客的机器上,然后黑客再将其转发到路由器。
Now, whenever you try to go to the Internet, your computer sends the network traffic to the hacker's machine, which it then forwards to the real router.
应用推荐