• This article analyses the process and the character of the hacker attacking the computer and the hidden troubles in the library computer data, in order to protect computer 's security.

    一则真实入侵实例分析黑客人侵过程、常用手段、特征图书馆数据安全存在隐患、危害及防范措施。

    youdao

  • Media companies only concentrate on the hackers who attack computer systems rather than the defenders, so some people use the term "hacker" to mean only attacking hackers.

    媒体公司关注那些攻击计算机系统黑客往往忽视那些计算机的保卫者所以有些使用术语黑客表示只进行攻击的黑客。

    youdao

  • Dynamic analysis works in a way very similar to the one a hacker would employ when attacking an application.

    动态分析工作方法黑客攻击一个应用程序所使用方法十分相似

    youdao

  • Dynamic analysis works in a way very similar to the one a hacker would employ when attacking an application.

    动态分析工作方法黑客攻击一个应用程序所使用方法十分相似

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定