Nowadays, information systems are mostly threatened by information stealing and destroying attacks launched by such malware as virus, worm, Troy horse and spy-ware.
显式授权机制具备很好的安全性质,能有效地防御信息窃取和破坏攻击。
But security experts warn that attackers could use their foothold on the system to start stealing users' and customers' credit card Numbers and personal information.
但是安全专家警告说攻击者可以利用他们在系统中的立足点偷窃用户和客户的信用卡账号和个人信息。
In a way, they can be perceived as stealing the information owned by a web site.
某种意义上来说,它们可以被认为是偷取了属于其它网站的信息。
At least the initial charges against the four men-of stealing state secrets, a graver crime-were downgraded to merely stealing commercially confidential information.
至少对这4人的首要指控——窃取国家秘密,一条重罪——将被降为窃取商业秘密罪。
This prevents attackers from stealing information from the main page.
这样可以防止攻击者从主页面中窃取信息。
At present, the behaviors of stealing personal information through the network are not surprising any more.
目前,透过网络窃取个人信息的行为是不奇怪了。
When People purchase and use these network product, they are not aware of some hacker or organization are intercepting; stealing; modifying their information through network without any resistance.
当人们购买、使用这些网络产品时,他们还未意识到一些黑客、强力组织,正通过网络悄无声息的窥探、窃取、修改他们的信息。
New Identity Theft Protection prevents new and unknown threats from stealing your personal information like bank and credit card details.
更新身份窃取保护阻止新的和未知的窃取诸如银行信用卡信息的个人信息威胁。
The thieves appear to have benefited by stealing loads in several jurisdictions, with the result that some police departments were slow to share information about the crimes.
小偷已有几个辖区的盗窃中尝到了甜头,而一些警察部门却很少公布关于这次犯罪的信息。
This part analysis the objective acts of the crime of stealing spying buying illegally providing state secret and information for those out of borders.
其次,在犯罪构成特征分析部分主要论述了境外窃取、刺探、收买、非法提供国家秘密、情报罪构成的特点。
Whoever illegally obtains the aforesaid information by stealing or any other means shall, if the circumstances are serious, be punished under the preceding paragraph.
窃取或者以其他方法非法获取上述信息,情节严重的,依照前款的规定处罚。
The attacker can feel the interest information simplify by the fact that the data base inquiry gains the person coming order once stealing right from the visit to the data base.
攻击者一旦窃取到数据库的访问权,就可以简单地通过数据库查询命令来获取其感兴趣的的信息。
A typical example is stealing passwords, but information disclosure can involve access to any file or resource on the server.
一个典型的示例是偷窃密码,但信息泄露可以涉及对服务器上的任何文件或资源的访问。
This paper analyzes the common procedure of stealing information and accordingly represents the general design of a desktop defense system protecting information from being stolen.
本文分析了通过网络窃取桌面信息的一般流程,有针对性地提出了一种防窃密桌面防御系统。
Information disclosure simply means stealing or revealing information that is supposed to be private.
“信息泄露”仅指偷窃或泄露应该保密的信息。
Based on the usual means of stealing an automobile, this paper mainly introduces the methods of signal acquisition based on multi sensors and signal processing with information fusion technology.
基于汽车的常见被盗方式,介绍了用多传感器采集信号、信息融合技术处理信号的方法,分析了信息融合技术的基本算法,讲述了神经网络的自学习和自组织能力。
It USES the method of first maintaining that China displays the behavioral pattern of "stealing ', and then fabricating facts subjectively by scraping together deliberately concocted information."
它所采取的方法是先认定中国有“窃缺行为,然后主观臆造、东拼西凑甚至蓄意捏造。”
It USES the method of first maintaining that China displays the behavioral pattern of "stealing ', and then fabricating facts subjectively by scraping together deliberately concocted information."
它所采取的方法是先认定中国有“窃缺行为,然后主观臆造、东拼西凑甚至蓄意捏造。”
应用推荐