If developers neglect to address all security issues, a future hacker will very likely exploit the flaw to extract confidential information from the website.
如果开发者忽视了解决所有安全问题,未来的黑客便很可能利用这一缺陷,从网站抽取机密信息。
Upgrading after a hacker USES this exploit to steal your information is simply too late, especially if you hold sensitive customer data.
在黑客们利用这个盗取你信息之后升级就完了,特别在你持有敏感用户数据的时候。
Q: If my account was compromised, what information about my Real ID friends would a hacker have access to?
问:如果我的账户被盗了,那么黑客能获得我的实名交友信息吗?
In addition, handled and unhandled exceptions should always offer minimal information that might assist the hacker in his efforts.
此外,已处理的异常和未处理的异常应该始终将提供的可能有助于黑客攻击的信息减到最少。
For handled exceptions, you need to strike a balance in your error messages between being helpful to the naive user and giving away too much information to the unscrupulous hacker.
对于已处理的异常,需要在错误消息中权衡:对无经验的用户有帮助,但不要向无道德的黑客透露过多信息。
A hacker looks for inside instance resources to get a victim's personal information.
黑客可以在实例资源中寻找受害者的个人信息。
Torrentspy later sued the MPAA because an alleged hacker, hired by the MPAA, retrieved private information from the BitTorrent indexer.
稍后,Torrentspy起诉了MPAA,宣称一名受雇于MPAA的黑客,从BitTorrent indexer中窃取了私人信息。
One hacker - identified as IAMDGKZ1 - told Gawker they had information on a well-known film director.
一位名号为IAMDGKZ1的黑客成员告诉Gawker说,他们握有一位著名电影导演的信息。
RockYou, which had already been widely criticized for lax privacy practices, has advised its customers to change their passwords, as the hacker gained information about their e-mail accounts as well.
Rock You多次被批评隐私保护松懈,该网站已建议用户更改密码,黑客同时也得到了用户的个人邮箱地址。
What if a hacker discovers a vulnerability in the security mechanism that allows him to break through the authentication without the need to know the required user's authentication information?
如果黑客在安全机制中发现了一个漏洞,让他可以破解身份验证,而不需要了解用户的身份验证信息,那么会怎么样?
The hacker can steal sensitive information from residual data that has not been purged from re-allocated instance resources within a virtual machine.
黑客可以从虚拟机中重新分配的实例资源中获取还没有清除的残留数据,从中窃取敏感的信息。
A hacker could get numbers and contact information.
黑客可以以此获取电话里储存的号码和联系方法。
Scanning: Scanning, or footprinting, is part of the initial information-gathering process for a hacker.
扫描: 扫描或 跟踪足迹(footprinting)是黑客的初始信息收集过程的一部分。
He said Sony has not received any reports of illegal USES of stolen information, and the company is continuing its probe into the hacker attack.
他表示,索尼并没有收到关于非法使用被盗信息的报道,该公司正在继续黑客攻击事件的调查。
In theory it could possibly have been tweaked by some malicious hacker to steal your Google account information (this is unlikely, but who knows).
理论上说,可能有黑客将病毒和有害软件植入,并借机偷窃你的Google帐号(虽然这种可能性并不大,但谁知道呢)。
The hacker obtained user-provided names, e-mail addresses, birth dates, log-in information and purchase history, Seybold said.
索尼发言人PatrickSeybold称一个未经受权的个人已经获取了用户信息:姓名、地址、国家、邮箱地址、出生日期、登录信息和消费记录等。
If a computer is attacked by a hacker or virus, it could lose important personal information and software.
如果一台计算机受到黑客或者病毒攻击,那么其中重要的个人信息和软件就有可能丢失。
Computer hacker activity has formed an important threat. Information infrastructure facilities are facing the challenge of network security.
电脑黑客活动已形成重要威胁;信息基础设施面临网络安全的挑战;
When People purchase and use these network product, they are not aware of some hacker or organization are intercepting; stealing; modifying their information through network without any resistance.
当人们购买、使用这些网络产品时,他们还未意识到一些黑客、强力组织,正通过网络悄无声息的窥探、窃取、修改他们的信息。
This kind of virus can gather the information of user system, help hacker controls user computer.
这种病毒能收集用户系统的信息,帮助黑客控制用户电脑。
The insight ofthe information security professional will continue to be of great value, with the ability to think like a hacker.
信息安全系统专家从黑客角度考虑信息安全问题具有重要的意义。
Gavin Orsay - Computer hacker Gavin possesses one of the most dangerous things in the world of House of Cards: information.
电脑黑客加文掌握了《纸牌屋》世界中最危险的东西之一:信息。
Network sniffing is like one double-edged sword. It makes the network administrator convenience, but it also offers the hacker a tool to steal network information.
网络监听技术就像一把双刃剑,在提供给网络管理员管理网络的方便时也提供给黑客一个盗取网络信息的工具。
Of course, a stolen laptop grants unrestricted physical access to the hacker, so the unencrypted information on the laptop itself is already compromised, password or no password.
当然,膝上型计算机失窃授予不受限制的物理访问以便本身便携式计算机上的未加密的信息已受到黑客、密码或没有密码。
The reasons that hackers give out information as gift are revolting monopoly information and winning reputation as a hacker.
黑客之所以要把信息当成礼物散发,其动机一是出于对信息垄断的反抗,二是为了获得做一名黑客的声誉。
If they refused, the hacker would threaten to post personal information online about the teenagers gathered from infiltrating their computers.
如果拒绝该请求,该电脑黑客就会利用他从女孩电脑上入侵来的私人信息威胁她们。
Once you login you have given the hacker all of your account information.
一旦你登录你给你所有的黑客帐户资料。
Once you login you have given the hacker all of your account information.
一旦你登录你给你所有的黑客帐户资料。
应用推荐