• At another utility, in an undisclosed city, Slammer downed the computer network controlling vital equipment.

    FORBES: The Next Threat

  • Matthew Keys is charged with supplying hackers in December 2010 with the login credentials to the computer network of Tribune Co.

    WSJ: Reuters journalist charged with hacking conspiracy

  • The secure communication link is a virtual private network communication link over the computer network in which one or more data values that vary according to a pseudo-random sequence are inserted into each data packet.

    FORBES: VirnetX Files Infringement Case Vs. Apple With ITC

  • Hackers have repeatedly penetrated the computer network of the company that runs the Nasdaq Stock Market during the past year, and federal investigators are trying to identify the perpetrators and their purpose, according to people familiar with the matter.

    WSJ: Hackers Penetrate Nasdaq's Computers

  • While it is possible for malware protection within a computer network to do this work, the best practice is to detect and isolate a problem at the network boundary using a NGFW before it can reach the computer network.

    FORBES: Next-Generation Firewalls: What Makes Them Next-Gen

  • He was arrested in 2011 and charged in a scheme in which he allegedly logged into the computer network at the Massachusetts Institute of Technology and using it to download millions of academic journal articles from a database called JSTOR, owned by a nonprofit group.

    WSJ: Legal Case Strained Troubled Web Activist

  • In the most recent incident, the Journal was notified by the FBI of a potential breach in the middle of last year, when the FBI came across data that apparently had come from the computer network in the Journal's Beijing bureau, people familiar with the incident said.

    WSJ: Chinese Hackers Target U.S. Media

  • He predicts that Cisco's territory, which is the core of the computer network, will become a commodity whose value lies only in its ability to move bits as quickly as possible (although, to be fair to Cisco, it is a commodity that many firms would love to supply).

    ECONOMIST: 3Com

  • In the 1970s he built the largest computer network at the time for florist network FTD.

    FORBES: Bright Lights, Big Legacy?

  • As Eric Schmidt said, when the back plane of your computer runs more slowly than the network, the computer hollows out and distributes itself across the network.

    FORBES: Magazine Article

  • AutEx was founded by my father, rolled out right at the dawn of the computer age in 1968, and can truly claim to be the first eCommerce business: the first computer network used to make money.

    FORBES: Bloomberg Isn't The Only Company Able To Spy On Users

  • Within about a half-hour, the retired computer network engineer had sewn up a sizeable gash in the portrait and was testing settings that might provide more visual data to help clean the apparently sepia-toned image.

    WSJ: Snapshots of Sandy: Group restores victims' photos

  • It is easy to see why Oracle, Netscape and Sun are together promoting the Java language, since the success of the network computer would create a bigger market for all three.

    ECONOMIST: Movers and shakers

  • That money quickly paid dividends when Miller hired two academy graduates to maintain the school's computer network during the summer.

    CNN: Teen techies graduate with enhanced learning

  • Again, if you unplug the computer during a video playback, the image pauses until you plug the computer in elsewhere in the network.

    FORBES: Sun's Ultra-Secret PC-Killer

  • If either Oracle or Sun had truly understood what it was they were trying to provide when they ventured out with the network computer concept, we might already be dealing with a whole different desktop experience -- and a new set of vendors to provide it.

    CNN: The future of desktop PCs

  • He fell foul of the law again in 2011, after attaching a laptop computer inside the MIT network (easily achieved as, although not a member of MIT, he was, at 24, already a grand old man of computing) and downloading around 4 million journal articles from JSTOR, the access-protected academic document storage system.

    FORBES: Open Data Activist Aaron Swartz Dies Aged 26: 'Uncompromising, Reckless and Delightful'

  • By improving the way that a computer network handled collisions, Mr Metcalfe believed he could vastly improve the speed with which data was passed around.

    BBC: Original Ethernet diagram, 3Com

  • Yet despite their failures, the concept of network computing resonated and validated the Windows terminal, which has the advantages of a network computer and runs Windows applications.

    CNN: The future of desktop PCs

  • Eventually, Swartz broke into a closet in the basement of building at MIT and connected his computer directly to the network.

    FORBES: How Congress Can Create A Lasting Legacy For Aaron Swartz

  • Then, a secure communication link is established between the first computer and a second computer over a computer network based on the enabled secure communication mode of communication.

    FORBES: VirnetX Files Infringement Case Vs. Apple With ITC

  • The state attorney, Bill Lockyer, also said the owners illegally tapped into computer users' network connections so the company could send e-mails that could not be traced back to its source.

    BBC: NEWS | Technology | California wins anti-spam case

  • Unlike past viruses that have hijacked armies of PCs, Storm doesn't place the command and control of the network in a single computer.

    FORBES: Zombie Storm Rising

  • AlohaNet let any computer on the network transmit data at any time.

    BBC: Original Ethernet diagram, 3Com

  • Swartz, 26, faced allegations that he stole millions of online documents -- mostly scholarly papers -- from MIT through the university's computer network.

    CNN: Anger, soul searching follow death of Internet activist

  • Perhaps we should extend Zittrain's idea beyond the computer and onto the network itself, and offer two separate logical networks, operating over the same physical connections.

    BBC: Staying safe and taking risks

  • Much of the campaign involved sending spear-phishing emails, where an unsuspecting target would click on a link, activating a program that would then runs quietly in the background of their computer network.

    FORBES: China Thought To Be Behind Global Cyber-Espionage Campaign That Hit UN, Olympic Committee

  • The infrared signal is then transmitted to an infrared receiver on the phone, which then beams it across the mobile phone network to the doctor's computer.

    BBC: Medicine over the mobile network

  • The hackers installed malware which enabled them to access any computer using the New York Times network, steal the password of every employee, and access 53 personal computers, mostly outside the Times offices.

    BBC: New York Times 'hit by hackers from China'

  • It sells with two-year guarantees, and offers much the biggest regional network of any Russian computer firm: 250 dealers across the country, full-service centres in 60 cities.

    ECONOMIST: Russian computers

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定