最后根据当前常用的电子邮件攻击手段给出该系统的安全评估。
At last a security evaluation to this system is given according to the current means to attack the mail system.
最近有一个英语班级,能写一手好字的同学在电子邮件攻击下坚持提高自己书法学习。
At an English class recently, students worked at perfecting a skill that is under threat from the onset of email ja the art of writing a letter by hand.
回应攻击性电子邮件的最好方式就是置之不理。
招聘网站频频受到黑客的攻击,或遭受通过电子邮件“网络钓鱼”的攻击,因为它们为那些对身份盗窃感兴趣的人提供了丰富的数据资源。
Job sites are regularly attacked by hackers and via email "phishing" attacks, as they provide a rich source of data for those interested in identity theft.
攻击者可以将有关网银站点的电子邮件发给用户。
An attacker can send an E-mail about a banking Web site to a user.
这些电子邮件显示了批评者的攻击让写这些邮件的科学家灰心丧气,而且就像孟德尔那样,他们渴望加强他们的结论的力量。
The emails reveal that the scientists who wrote them were frustrated by the attacks of critics and, like Mendel, were anxious to sharpen the strength of their conclusions.
最近爆发的几起重大数据失窃事件,就是电子邮件和数据系统等网络应用程序遭受黑客攻击的结果。
Yet, most of the major data breaches in recent news have been the result of attacks on Web apps like email and data systems.
电子邮件、远程登录和超级用户特权都需要密码,这些密码最好各不相同而且难以通过自动化攻击猜测或推断出来。
To wit, e-mail, remote login, and superuser privileges all require a password—preferably disparate and each difficult to guess or derive using an automated attack.
或攻击者可以安装一个特洛伊木马程序或不请自来的电子邮件发送软件,目的是在金融活动或造成损害品牌名称,修改公司的资源。
Or an attacker might be able to install a Trojan horse program or unsolicited E-mail sending software, aim at financial enrichment or cause brand name damage by modifying company resources.
他们很可能成为黑客的攻击目标。攻击手段包括伪装成受害者认识的人,通过电子邮件向其发送恶意软件。
They could be targeted by a hacker who could takes steps, including sending malicious software in an email, that appears to come from someone the victim knows.
如今网上大量唾手可得的个人信息使得攻击电脑更加容易,方式是仿造一个更能取得信任并能打开的电子邮件。
The amount of information now available online about individuals makes it ever easier to attack a computer by crafting a personalised E-mail that is more likely to be trusted and opened.
钓鱼攻击在网上很常见,常常是以收到看似合法的电子邮件开始,邮件中含有逼真的网站(常常是银行或电子邮件供应商)的链接。
Phishing attacks are common online, and usually begin with the arrival of a legitimate-looking email containing a link to a realistic-looking website - often a bank or email provider.
一家卓越的因特网巨头发现自己已经成为网络谋划的攻击目标,这将造成无权限的局外者可防卫部分他们网络用户的电子邮件。
A prominent Internet giant has found itself the target of an online plot that allowed outsiders to read some of its users' emails.
键盘记录工具允许攻击者劫持任何用户输入;比如说,如果某个用户在使用一个基于 Web 的电子邮件服务,那么键盘记录工具将记录下任何文本输入并将其发送给攻击者。
The key logger allows an attacker to hijack any user input; for example, if a user uses a Web-based e-mail service, the key logger will record and transmit any text input to the attacker.
微软承认针对使用其流行的电子邮件服务用户的钓鱼攻击,已经导致泄露了数以千计的Hotmail用户的密码。
Microsoft has confirmed that the publication of thousands of Hotmail passwords was the result of a phishing attack against users of the popular email service.
攻击者可以用电子邮件给受害者发送特别处理过的文件,如果受害者用vim来阅读或者编辑它,受害者就可能会去运行攻击者想要运行的任何程序!
An attacker could E-mail a specially rigged file to the victim, and if the victim used vim to read or edit it, the victim would run whatever program the attacker wanted. Oops.
电子邮件系统既要防止黑客的攻击,还要防止垃圾邮件泛滥,同时要避免敏感邮件资料内容的泄漏。
The E-Mail system should prevent the hacker's attack, will prevent the junk email from overflowing, avoid the letting out of materials content of the sensitive mail at the same time.
或攻击者可以安装一个特洛伊木马程序或不请自来的电子邮件发送软件,目的是在金融活动或造成损害品牌名称,修改公司的资源。
Or an attacker might be able to install a Trojan horse program or unsolicited email sending software, aim at financial enrichment or cause brand name damage by modifying company resources.
他们很可能成为黑客的攻击目标。 攻击手段包括伪装成受害者认识的人,通过电子邮件向其发送恶意软件。
They could be targetedby hacker who could takes steps, including sending malicious software in an email that appears tocome from someone the victim knows.
三人成功地对两家律师事务所进行了黑客攻击,窃取了从事并购业务的律所合伙人的电子邮件,检察官说。
The men were successful in hacking two firms, stealing emails of partners who work on mergers, prosecutors said.
目前最为普遍的一种攻击手段就是“电子邮件炸弹”,这也是我们这些个人用户在网络安全中最需要注意的地方。
At present method of most common a kind of attack is "email bomb", this also is us the place that these individual users need to notice most in network safety.
如今网上大量唾手可得的个人信息使得攻击电脑更加容易,方式是仿造一个更能取得信任并能打开的电子邮件。
The amount of information now available online about individuals makes it ever easier to attack a computer by crafting a personalised email that is more likely to be trusted and opened.
达尔高说,对电子邮件发起攻击,是要杜绝冗长、耗时、一对一的电子邮件。
In targeting email, Mr. Dalgaard is trying to root out long, time-consuming, one-on-one email strings, he says.
据此dha程序就生成一个数据库,把攻击中没有被返送回来的电子邮件地址记录下来。
The DHA program creates a database of all thee-mail addresses at the server that were not returned during the attack.
目录收割攻击能利用两种方法收集有效电子邮件地址。
A directory harvest attack can use either of two methods for harvesting valid email addresses.
不要用公司给每个员工提供的电子邮件信箱发送和接收与工作无关的信件,以减少公司网络被病毒和黑客攻击的机率。
Do not send or receive emails which are not related with works with the mailbox provided by company. This is to reduce the possibility of company network being attacked by virus and hackers.
不要用公司给每个员工提供的电子邮件信箱发送和接收与工作无关的信件,以减少公司网络被病毒和黑客攻击的机率。
Do not send or receive emails which are not related with works with the mailbox provided by company. This is to reduce the possibility of company network being attacked by virus and hackers.
应用推荐