University-educated Riverbend worked as a computer programmer before the invasion which began on March 20, 2003.
受过大学教育的“河湾”在2003年3月20日美军入侵伊拉克前曾是一名电脑程序师。 她在博客中说,她失去了工作,因为那时伊拉克妇女单独出门上班已经是很危险的事情。
In order to prevent the Trojan invasion, the computer to install and update anti-virus software upgrade, not open the unknown email, no computer access to the internet.
为防止木马侵入,计算机要安装杀毒软件并及时更新升级,不随意打开不明电子邮件,严禁将涉密计算机接入互联网。
The need to install, and need to upload the server to the invasion of computer and run the service, to achieve the goal of control.
需要自己安装,而且需要将服务端上传到入侵的电脑并运行服务,才能达到控制的目的。
If a computer could automatically detect and preserve footage "of interest," the rest can be safely deleted, minimizing the invasion to our privacy.
如果计算机可以自动检测并保留“有用的”录像,其余被安全删除,对我们的隐私入侵就能减到最小。
In the time of the invasion, not free to leave your computer.
在入侵的时候,不要随意离开你的电脑。
Based on many years' experience of network management the author, analyzes the common methods of network invasion and offers advice on security frameworks for management of secret computer.
本文根据多年网络信息系统安全管理的实践经验,分析了目前网络攻击入侵手段,详细论述了构建涉密计算机信息系统安全体系的基本思路。
The log as evidence sources is selected for extracting evidence on the illegal computer invasion.
为提取计算机非法入侵的证据,选取了日志作为证据来源。
The log as evidence sources is selected for extracting evidence on the illegal computer invasion.
为提取计算机非法入侵的证据,选取了日志作为证据来源。
应用推荐