• During the Army Directors of Information Management Conference here, Loranger demonstrated how fast these "point-and-click" tools can help hackers map out networks, uncover security gaps such as "guest" log-on accounts and password files, gain root access to major network servers, and locate computers belonging to high-level officials.

    CNN: Technology - Government computers: The ultimate hackers' proving ground

  • The past decade's major policies: the withdrawal from Gaza, the construction of the security fence, the acceptance of the road map peace plan, the Annapolis Conference, Operation Defensive Shield, the Second Lebanon War and Operation Cast Lead all shared one central feature.

    CENTERFORSECURITYPOLICY: A low and dishonest decade

  • The next morning, the President met in the Map Room with Tom Donilon, his national-security adviser, Denis McDonough, a deputy adviser, and Brennan.

    NEWYORKER: Getting Bin Laden

  • The map is expected to lay down a procedure under which Israelis and Palestinians meet certain reciprocal commitments leading to security for Israel on the one side and a state for the Palestinians on the other by 2005.

    BBC: Analysis: Mid-East conference hopes

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定