Some computer security experts propose that the best way to ensure computer security is to write software that isn't easily breached by viruses, worms and other hacker tricks.
一些电脑安全专家建议,确保计算机安全的最好方法是编写出一种不那么容易被病毒,蠕虫及其他黑客伎俩破环的软件。
Summary: With hacker attacks in the news frequently these days, we all know that computer security needs to be taken seriously.
简介:由于黑客攻击最近在新闻中屡有报导,我们都知道需要认真地对待计算机安全问题。
Many computer programmers insist that the word "hacker" applies only to law-abiding enthusiasts who help create programs and applications or improve computer security.
许多程序员认为黑客一词只适用于那些在遵守法律的前提下编写程序应用软件,提高网络安全的电脑爱好者。 恶意使用技能的人不是黑客,而是骇客。
The British computer hacker Gary McKinnon failed today in his latest legal attempt to avoid extradition to the US where he could face a sentence of up to 60 years in a high-security prison.
今天,英国电脑黑客加里·麦金农(Gary McKinnon)最近一次的法律尝试以失败告终。按照法庭裁决他将被引渡到美国,在那里,他将面临一项审判——监禁在戒备森严的监狱中,最高期限可达60年。
Computer hacker activity has formed an important threat. Information infrastructure facilities are facing the challenge of network security.
电脑黑客活动已形成重要威胁;信息基础设施面临网络安全的挑战;
Computer forensic is a dynamic security technology. It collects the proofs of intrusion and finds the source of hacker with the active methods, so it can prevent hacker intrusion effectively.
计算机取证技术是当今一种热门的动态安全技术,它采用主动出击的方法,搜集入侵证据,查出黑客的来源,有效地防范黑客入侵。
During the university computer network security teaching process needs some viruses, the hacker programs and so on to carry on the teaching demonstration.
高校计算机网络安全教学过程中需要对一些病毒、黑客程序等进行教学演示。
This article analyses the process and the character of the hacker attacking the computer and the hidden troubles in the library computer data, in order to protect computer 's security.
以一则真实的入侵实例分析黑客人侵过程、常用手段、特征及图书馆数据安全存在的隐患、危害及防范措施。
This article analyses the process and the character of the hacker attacking the computer and the hidden troubles in the library computer data, in order to protect computer 's security.
以一则真实的入侵实例分析黑客人侵过程、常用手段、特征及图书馆数据安全存在的隐患、危害及防范措施。
应用推荐