• Some computer security experts propose that the best way to ensure computer security is to write software that isn't easily breached by viruses, worms and other hacker tricks.

    一些电脑安全专家建议确保计算机安全最好方法编写出一种那么容易病毒蠕虫其他黑客伎俩破环软件

    youdao

  • Summary: With hacker attacks in the news frequently these days, we all know that computer security needs to be taken seriously.

    简介由于黑客攻击最近新闻屡有报导,我们知道需要认真地对待计算机安全问题。

    youdao

  • Many computer programmers insist that the word "hacker" applies only to law-abiding enthusiasts who help create programs and applications or improve computer security.

    许多程序员认为黑客适用于那些在遵守法律的前提下编写程序应用软件,提高网络安全的电脑爱好者。 恶意使用技能的人不是黑客,而是骇客。

    youdao

  • The British computer hacker Gary McKinnon failed today in his latest legal attempt to avoid extradition to the US where he could face a sentence of up to 60 years in a high-security prison.

    今天英国电脑黑客加里·麦金农(Gary McKinnon)最近法律尝试失败告终按照法庭裁决将被引渡美国,在那里面临一项审判——监禁戒备森严的监狱中,最高期限可60

    youdao

  • Computer hacker activity has formed an important threat. Information infrastructure facilities are facing the challenge of network security.

    电脑黑客活动形成重要威胁信息基础设施面临网络安全挑战

    youdao

  • Computer forensic is a dynamic security technology. It collects the proofs of intrusion and finds the source of hacker with the active methods, so it can prevent hacker intrusion effectively.

    计算机取证技术当今一种热门动态安全技术采用主动出击方法搜集入侵证据,查出黑客来源有效地防范黑客入侵。

    youdao

  • During the university computer network security teaching process needs some viruses, the hacker programs and so on to carry on the teaching demonstration.

    高校计算机网络安全教学过程中需要一些病毒黑客程序进行教学演示

    youdao

  • This article analyses the process and the character of the hacker attacking the computer and the hidden troubles in the library computer data, in order to protect computer 's security.

    一则真实入侵实例分析黑客人侵过程、常用手段、特征图书馆数据安全存在隐患、危害及防范措施。

    youdao

  • This article analyses the process and the character of the hacker attacking the computer and the hidden troubles in the library computer data, in order to protect computer 's security.

    一则真实入侵实例分析黑客人侵过程、常用手段、特征图书馆数据安全存在隐患、危害及防范措施。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定