相反,许多此类犯罪,如挪用资金、篡改记录、盗窃、破坏公物、蓄意破坏和恐怖主义,都可以在没有计算机的情况下进行。
On the contrary, many of these crimes, such as embezzlement of funds, the alteration of records, theft, vandalism, sabotage, and terrorism, can be committed without a computer.
他被指控利用25个身份盗窃、非法访问和非法损坏一个受保护的计算机。
He is charged with 25 counts of identity theft, unauthorized access and unauthorized damage to a protected computer.
七月,一名前高盛员工因涉嫌盗窃该公司专有的计算机代码而被捕,这一事件将神秘的高频交易(HFT)世界推到了聚光灯下。
The arrest of a former Goldman Sachs employee in July for allegedly stealing the firm's proprietary computer codes thrust the arcane world of high-frequency trading (HFT) into the spotlight.
预计下周三出现在审判庭上的钱尼,面临着26项身份盗窃及未授权登录和监听一个受保护的计算机的指控。
Chaney, who was expected to appear in a Florida courtroom later Wednesday, was charged with 26 counts of identity theft, unauthorized access to a protected computer and wiretapping.
计算机世界的小偷也可能采用这种方式,它们盗窃技术文档,行贿内部人员,修改软件等等。
Computer thieves come through the walls too. They steal technical data, bribe insiders, modify software, and collude.
攻击站点会安装用于盗窃隐私信息的程序,或使用您的计算机来攻击其他人,或者损坏您的系统。
Attack sites try to install programs that steal private information, use your computer to attack others, or damage your system.
由于在会计学方面知识的渊博,那名小偷和他的女帮凶运用银行的计算机系统完成了历史上最大一桩盗窃案。
Having extensive knowledge of accounting, ha and a woman accomplice use the bank's computer system to accomplish the biggest theft in history.
计算机网络犯罪主要有以下几种情形:盗窃;非法进入并破坏他人计算机系统;制作、传播计算机病毒等。
Generally it can be summed up as the following types: theft, illegal entry and damage to other computer systems, producing and spreading computer viruses, etc.
最后,US B拦截器可帮助您保护您的整个网络(包括计算机)免受病毒攻击和防止盗窃重要的企业数据。
To conclude, USB Blocker helps you to protect your entire network (including computers) against virus attacks and prevent theft of important corporate data.
最后,US B拦截器可帮助您保护您的整个网络(包括计算机)免受病毒攻击和防止盗窃重要的企业数据。
To conclude, USB Blocker helps you to protect your entire network (including computers) against virus attacks and prevent theft of important corporate data.
应用推荐