• 最后根据当前常用的电子邮件攻击手段给出系统安全评估

    At last a security evaluation to this system is given according to the current means to attack the mail system.

    youdao

  • 最近一个英语班级,能一手同学电子邮件攻击坚持提高自己书法学习。

    At an English class recently, students worked at perfecting a skill that is under threat from the onset of email ja the art of writing a letter by hand.

    youdao

  • 回应攻击电子邮件最好方式就是置之不理

    The best way to respond to a flame is to ignore it.

    《柯林斯英汉双解大词典》

  • 招聘网站频频受到黑客攻击,或遭受通过电子邮件网络钓鱼”的攻击因为它们那些身份盗窃兴趣的人提供丰富数据资源

    Job sites are regularly attacked by hackers and via email "phishing" attacks, as they provide a rich source of data for those interested in identity theft.

    youdao

  • 攻击可以有关网银站点电子邮件发给用户

    An attacker can send an E-mail about a banking Web site to a user.

    youdao

  • 这些电子邮件显示批评者攻击这些邮件科学家灰心丧气,而且就像孟德尔那样他们渴望加强他们结论力量

    The emails reveal that the scientists who wrote them were frustrated by the attacks of critics and, like Mendel, were anxious to sharpen the strength of their conclusions.

    youdao

  • 最近爆发几起重大数据失窃事件,就是电子邮件数据系统网络应用程序遭受黑客攻击结果

    Yet, most of the major data breaches in recent news have been the result of attacks on Web apps like email and data systems.

    youdao

  • 电子邮件远程登录超级用户特权需要密码,这些密码最好不相同而且难以通过自动化攻击猜测推断出来

    To wit, e-mail, remote login, and superuser privileges all require a passwordpreferably disparate and each difficult to guess or derive using an automated attack.

    youdao

  • 攻击可以安装一个特洛伊木马程序不请自来电子邮件发送软件目的是金融活动造成损害品牌名称修改公司资源

    Or an attacker might be able to install a Trojan horse program or unsolicited E-mail sending software, aim at financial enrichment or cause brand name damage by modifying company resources.

    youdao

  • 他们可能成为黑客攻击目标攻击手段包括伪装成受害者认识通过电子邮件向其发送恶意软件

    They could be targeted by a hacker who could takes steps, including sending malicious software in an email, that appears to come from someone the victim knows.

    youdao

  • 如今网上大量唾手可得的个人信息使得攻击电脑更加容易,方式仿造一个能取得信任打开电子邮件

    The amount of information now available online about individuals makes it ever easier to attack a computer by crafting a personalised E-mail that is more likely to be trusted and opened.

    youdao

  • 钓鱼攻击网上很常见常常是以收到看似合法电子邮件开始邮件中含有逼真网站(常常银行电子邮件供应商)的链接

    Phishing attacks are common online, and usually begin with the arrival of a legitimate-looking email containing a link to a realistic-looking website - often a bank or email provider.

    youdao

  • 一家卓越因特网巨头发现自己已经成为网络谋划攻击目标将造成无权限的局外者可防卫部分他们网络用户电子邮件

    A prominent Internet giant has found itself the target of an online plot that allowed outsiders to read some of its users' emails.

    youdao

  • 键盘记录工具允许攻击劫持任何用户输入比如说如果某个用户在使用一个基于 Web电子邮件服务,那么键盘记录工具记录下任何文本输入将其发送攻击者。

    The key logger allows an attacker to hijack any user input; for example, if a user uses a Web-based e-mail service, the key logger will record and transmit any text input to the attacker.

    youdao

  • 微软承认针对使用流行电子邮件服务用户的钓鱼攻击已经导致泄露了数以千计Hotmail用户的密码

    Microsoft has confirmed that the publication of thousands of Hotmail passwords was the result of a phishing attack against users of the popular email service.

    youdao

  • 攻击可以电子邮件受害者发送特别处理过文件如果受害者用vim阅读或者编辑,受害者就可能会去运行攻击想要运行的任何程序

    An attacker could E-mail a specially rigged file to the victim, and if the victim used vim to read or edit it, the victim would run whatever program the attacker wanted. Oops.

    youdao

  • 电子邮件系统防止黑客攻击还要防止垃圾邮件泛滥同时避免敏感邮件资料内容泄漏

    The E-Mail system should prevent the hacker's attack, will prevent the junk email from overflowing, avoid the letting out of materials content of the sensitive mail at the same time.

    youdao

  • 攻击可以安装一个特洛伊木马程序不请自来电子邮件发送软件目的是金融活动造成损害品牌名称修改公司资源

    Or an attacker might be able to install a Trojan horse program or unsolicited email sending software, aim at financial enrichment or cause brand name damage by modifying company resources.

    youdao

  • 他们可能成为黑客的攻击目标。 攻击手段包括伪装受害者认识,通过电子邮件向其发送恶意软件

    They could be targetedby hacker who could takes steps, including sending malicious software in an email that appears tocome from someone the victim knows.

    youdao

  • 成功地家律师事务所进行了黑客攻击窃取了从事并购业务律所合伙人电子邮件检察官

    The men were successful in hacking two firms, stealing emails of partners who work on mergers, prosecutors said.

    youdao

  • 目前最为普遍攻击手段就是电子邮件炸弹”,也是我们这些个人用户网络安全需要注意地方

    At present method of most common a kind of attack is "email bomb", this also is us the place that these individual users need to notice most in network safety.

    youdao

  • 如今网上大量唾手可得的个人信息使得攻击电脑更加容易,方式仿造一个能取得信任打开电子邮件

    The amount of information now available online about individuals makes it ever easier to attack a computer by crafting a personalised email that is more likely to be trusted and opened.

    youdao

  • 尔高电子邮件发起攻击杜绝冗长耗时一对一电子邮件

    In targeting email, Mr. Dalgaard is trying to root out long, time-consuming, one-on-one email strings, he says.

    youdao

  • 据此dha程序就生成一个数据库攻击没有被返送回来电子邮件地址记录下来。

    The DHA program creates a database of all thee-mail addresses at the server that were not returned during the attack.

    youdao

  • 目录收割攻击利用两种方法收集有效电子邮件地址

    A directory harvest attack can use either of two methods for harvesting valid email addresses.

    youdao

  • 不要公司每个员工提供电子邮件信箱发送接收工作无关信件,减少公司网络病毒黑客攻击的机率。

    Do not send or receive emails which are not related with works with the mailbox provided by company. This is to reduce the possibility of company network being attacked by virus and hackers.

    youdao

  • 不要公司每个员工提供电子邮件信箱发送接收工作无关信件,减少公司网络病毒黑客攻击的机率。

    Do not send or receive emails which are not related with works with the mailbox provided by company. This is to reduce the possibility of company network being attacked by virus and hackers.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定