这些照片被非法窃取,未经我的同意便散播出去。
These photos were stolen from me illegally, and distributed without my consent.
但是,黑客一词也用于形容试图从计算机系统非法窃取信息的人。
But the word hacker is also used to describe a person who tries to steal information from computer systems.
如何保护信息,使之不被非法窃取或窜改,已成为人们所关注的问题。
It has become a public concern that how to protect information and avoid filching and juggling information.
在司法实践中拾得遗失物与盗窃罪的界限容易模糊,行为人非法窃取有保管义务人的遗失物应认定盗窃罪,拾得真正遗失物拒不返还应构成侵占罪。
In the legal practice, the demarcation line between picking up the lost articles and larceny is easy to blur. the person who illegally steals the custodian's lost articles is to be accused of larceny;
近期,计算机安全公司RSA(美国EMC分公司)的网络遭到非法侵入,侵入者目的像是要窃取公司安全ID后的秘密系统。
Recently the computer-security company RSA (a division of EMC) was penetrated by an intrusion which appears to have stolen the secret sauce behind the company's SecureID.
但就像像废纸一样的合同,安哥拉已经坠落了,官员通过非法操作私有化或者窃取公库为私营公司的扶助金。
But as well as contract padding, Angolans have lost out as officials seize state assets through rigged privatisations or rip off the public Treasury in bail-outs of private companies.
窃取或者以其他方法非法获取上述信息,情节严重的,依照前款的规定处罚。
Whoever illegally obtains the aforesaid information by stealing or any other means shall, if the circumstances are serious, be punished under the preceding paragraph.
其次,在犯罪构成特征分析部分主要论述了境外窃取、刺探、收买、非法提供国家秘密、情报罪构成的特点。
This part analysis the objective acts of the crime of stealing spying buying illegally providing state secret and information for those out of borders.
从而窃取客户输入的用户名、密码以及手机交易码信息,并发送远程服务器,并利用这些被侵入的银行账户进行非法交易。
To steal the user input user name, password and mobile phone trading code information, and send a remote server, and the use of these invasive bank accounts for illegal transactions.
同时,数字矢量地图制作成本极高,针对数字矢量地图的非法拷贝、窃取等侵权行为也日益猖獗。
And its fabricating cost is huge. On the other hand, illegal copying and stealing of digital vector map are becoming increasingly rampant.
盗窃罪是指以非法占有为目的,秘密窃取数额较大的公私财物或者多次盗窃公私财物的行为。
Theft is the illegal possession for the purpose of stealing large amounts of secret public-private property or multiple ACTS of theft of public or private property.
如今网络黑客窃取数据的花样很多:非法接入、木马攻击、IP欺骗、网页仿冒、僵尸网络、网络嗅探、网址嫁接等。
Now the network hackers to steal data many tricks: illegal access, Trojan attacks, phishing, spoofing, IP Botnet, network sniffer, pharming etc...
根据我国目前的刑事立法,盗窃罪是指以非法占有为目的,秘密窃取公私财物数额较大,或者多次盗窃公私财物的行为。
The steal crime is a act which takes the illicit possession as the aim, the amount of the state and private property stool is large or the steal act many times.
攻击者利用网络技术,非法入侵他人计算机系统,窃取信息、篡改数据,给企业造成巨大损失。
Attackers use network technology, illegally intrude computer system, steal information, tamper data, and bring heavy losses to enterprises.
在数据加密系统中,通常利用混沌模型迭代产生的序列作为密钥,以保障数据安全,防止非法篡改和窃取。
In the data encryption systems, chaotic sequences can be used as the secret key to guarantee the safety of data and prohibit the juggle and steal unlawfully towards the data we sent.
第四百三十一条以窃取、刺探、收买方法,非法获取军事秘密的,处五年以下有期徒刑;
Article 431 Whoever, by means of stealing, prying or buying, illegally obtains military secrets shall be sentenced to fixed-term imprisonment of not more than five years.
大多数计算机犯罪都是见惯不怪的——从心怀不满的职员对其先前供职的公司搞破坏,到某公司非法进入其竞争对手的电脑里窃取商业机密。
Most computer crimes are more ordinary. They range from an annoyed employee who secretly damages his former company to a company that hacks into a competitor's computer to steal trade secrets.
对电子文档进行加密处理,接受方需具有相应安全证书,防止非法用户窃取文件信息;
Encrypting the electronic documents to which the receiver can have access only through corresponding safety certificates so as to avoid the access by illegal users.
对电子文档进行加密处理,接受方需具有相应安全证书,防止非法用户窃取文件信息;
Encrypting the electronic documents to which the receiver can have access only through corresponding safety certificates so as to avoid the access by illegal users.
应用推荐