在现实中,当犯罪分子想要入侵别人的银行账户时,他们不必使用密码破解工具——其实,他们只需用钓鱼攻击或者其他方法窃取所需信息即可。
The fact is that when criminals want to gain access to peoples' bank accounts, they don't do it with password-cracking tools - they simply steal the data by phishing or other means.
“匿名者”的一个分支组织此前曾经入侵了CIA和英国重大组织犯罪署的网站。
A splinter group of Anonymous has previously hacked the website of the CIA and of Britain's Serious Organised Crime Agency.
如果使用算牌器是犯罪的话,那么使用黑客技术入侵网站获取本来无权获取的数据也是犯罪。
It would be a crime if [the bot master] was, and I use the word reluctantly, hacking - trying to delve into the site to obtain data he hasn't got rights to use.
计算机犯罪的形式是未经授权而非法入侵计算机系统,复制程序或数据文件。
Computer crime form is unauthorized and illegal invasion of computer systems, copying programs or data files.
正当个体黑客组织壮大得如火如荼的时候,另一种入侵形式源的黑客-有组织犯罪的黑客群体-也在像往常一样经营着他们的勾当。
While hacktivists are gathering speed, another source of hacking—organised-crime groups—are going about their business as usual.
自从我妻子和我都是警察,我们更进一步受执法人员责任的约束24 / 7,包括在处理入侵我们房子的犯罪。
Since my wife and I are both police officers, we are further bound by responsibilities of law enforcement officers 24/7, including when dealing with intruders in our house.
并且在此基础上分析了对各类操作系统的入侵犯罪的方式。
The author also analyzes the fashion of inbreak crimes to some kinds of OS.
今天有一个被捕的消息受到媒体热议。“某少年由于计算机犯罪被捕”,“入侵银行的黑客被捕”…一帮臭小子,他们都一样。
Another one got caught today, it's all over the papers. "Teenager Arrested in Computer Crime Scandal", "Hacker Arrested after Bank Tampering"... Damn kids. They're all alike.
该模型将入侵检测系统与司法分析技术有机结合,它的提出对计算机犯罪的动态取证有一定指导意义。
Since it is the combo of IDS and justice parsing technique, it will be instructive for the dynamic forensics of computer crime.
该模型将入侵检测系统与司法分析技术有机结合,它的提出对计算机犯罪的动态取证有一定指导意义。
Since it is the combo of IDS and justice parsing technique, it will be instructive for the dynamic forensics of computer crime.
应用推荐