• Could terrorists or hackers cause financial chaos by tampering with Wall Street's computerised trading systems?

    恐怖份子黑客通过篡改华尔街电脑交易系统制造金融混乱,可以吗?

    youdao

  • That makes it easier for hackers to create applications that surreptitiously spy on users or access phone functions without permission.

    使得黑客能更轻易的通过恶意软件暗中盗取用户信息使用手机功能。

    youdao

  • The owner of the software used by the hacker or hackers to protect their identity said that he believed it would be possible to identify the culprit.

    黑客为隐藏身份使用软件软件开发者表示希望查清这次犯罪行为。

    youdao

  • But we all know that hackers would beat the system anyway, and which one do you think is more stable: third-party development with official support or without?

    知道黑客们总撬开系统的,那么官方支持第三方软件开发没有官方支持的哪个稳定

    youdao

  • Hackers can take advantage of the advances in cryptanalysis or malicious instance resources to render cryptographic algorithms insecure.

    黑客可以利用密码分析技术恶意实例资源破解密码算法

    youdao

  • Hackers who access the network will have the ability to turn off alarm systems and lights, leaving the home vulnerable to a break-in, or the theft could be more electronic.

    黑客通过网络关掉自动警报系统或者照明系统,你的就会很容易地被侵入,使电子盗窃变得很容易。

    youdao

  • But rarely have hackers breached a bank itself rather than the partners or retail outlets that often store large caches of those card Numbers.

    黑客很少会直接攻击银行系统,而是更倾向于袭击那些存储大量信用卡号码合作伙伴零售商

    youdao

  • But not completely as, there are still many companies who hire hackers to analysis the weaknesses or the strength of their own systems.

    但是也不许多公司雇佣黑客分析他们自己的系统优缺点

    youdao

  • If the user loses the certificate or the certificate is stolen, hackers can access this information without being challenged for authentication.

    如果用户证书丢失被盗黑客就能够访问信息而不用经过身份验证

    youdao

  • Fortunately, such a scenario is likely to remain science fiction. But smart systems might be vulnerable to malfunctioning or attacks by hackers.

    幸运的是,一幕或许仍然只是科幻小说中的情节,不过智能系统的确很容易瘫痪或是黑客侵袭。

    youdao

  • This feature prevents hackers from changing the MAC address of their machine or from trying to map more than one MAC address to their machine.

    这个功能会阻止黑客改变机器MAC地址试图映射多个MAC地址机器上。

    youdao

  • While experts ferret out software flaws to fix them and protect users, hackers use the same information to devise pranks or commit crimes.

    专家们找出需要修复软件漏洞保护用户之时,黑客们却利用了这些相同信息搞恶作剧进行一些犯罪活动。

    youdao

  • The sudden growth in the number of hackers in not necessarily down to schools improving their computing classes or an increased diligence on the part of young IT enthusiasts.

    黑客数量突然增加并不是因为学校增开计算机课程不是因为少年IT发烧友智力突飞猛进

    youdao

  • In retrospect the tipoff to the bank that something was awry was that the hackers used an Internet protocol, or IP, address that the Shames-Yeakels had never used before.

    银行回顾偷盗过程时,发现蹊跷地方在于黑客使用了山姆斯·伊克尔一家从未使用过的因特网协议(又称IP)地址

    youdao

  • Since banks have started watching out for transfer requests from unknown computers, hackers have in the past year or so begun hijacking their victims' own IP addresses.

    由于银行开始严密监视未知电脑处发出转账申请黑客大约从前年开始劫持受害者IP地址

    youdao

  • The point of all this work is to make it so difficult to get at sensitive data that hackers don't even try, or they move on after a few failed attempts.

    加密要点使获取敏感数据变得非常困难,以致黑客不再尝试攻击,尝试攻击失败离去。

    youdao

  • Using information from these ethical hackers, manufacturers can remedy or "patch" the problem before its release and companies can take measures to safeguard their data.

    通过这些道德性极高的黑客所提供的信息制造商会在危机发生之前就把所存在的问题解决,相关的公司采取必要的措施保护好自己的数据。

    youdao

  • Chances are, you're a customer of one of these 2,500 companies and it's possible that your email or name has fallen into the hands of hackers.

    可能就是2500家公司之一一名客户电子邮件姓名可能已经落入黑客手。

    youdao

  • Though hackers are often characterized as reckless cyber outlaws, Coleman noted that many aren't out to steal credit card information or crash computer servers.

    尽管黑客经常被定型毫无顾忌游走于法律之外的人,Coleman指出其中很多不会盗取信用卡信息或者服务器掉。

    youdao

  • The hackers got into the computers in one of two ways, either through their public websites or through infected emails sent to company executives.

    黑客通过公共网站通过发送公司高管受感染电子邮件两种方法之一进入计算机

    youdao

  • These would be needed, for example, if hackers took control of nuclear facilities, or were about to open the Hoover dam.

    例如骇客控制设施或者准备开闸胡佛大坝这些权利还是需要的。

    youdao

  • Hackers have moved their attention past traditional targets, perhaps due to the inevitable maturity of those platforms, or perhaps because they are now simply passe.

    黑客不再关注传统目标可能由于这些平台已经比较成熟可能是因为它们现在已经过时了。

    youdao

  • Port probing by hackers is usually an attempt to execute malicious code on a server or to take control of the server by looking for vulnerable ports.

    黑客进行端口探测通常尝试服务器执行恶意代码或者通过寻找易攻击的端口来控制服务器。

    youdao

  • The hackers then used those login details to forward all mail coming into the account to a third party, or in some cases gathered information about contacts to use in other phishing scams.

    接着,黑客会利用盗取的信息入侵受害人的账户,将其所有来信转发第三邮箱,或者收集受害人的联系人信息用于其他网络钓鱼活动。

    youdao

  • Expert computer hackers, called crackers, might break into or overload military computers and networks, or spread computer viruses.

    专家级电脑黑客称作狂乱可以闯入超载其军用计算机网络散布电脑病毒

    youdao

  • But smart systems might be vulnerable to malfunctioning or attacks by hackers.

    智能系统反而在故障面前极度脆弱,而且容易受黑客攻击。

    youdao

  • But smart systems might be vulnerable to malfunctioning or attacks by hackers.

    智能系统反而在故障面前极度脆弱,而且容易受黑客攻击。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定