为企业改善计算机安全操作系统。
Improve computer systems security operations for organizations.
通过观念和信息的分享来为计算机安全领域的进步打下基础。
It serves as the foundation for the improvement of computer security worldwide by sharing goals, ideas, and information.
许多资深的计算机安全研究人员认为这种战略是“外硬内软”。
“Hard on the outside, with a soft chewy center, ” is the way many veteran computer security researchers think of such strategies.
保持计算机安全和保护计算机免受威胁从未如此艰难。
Keeping computers secure and protected against threats has never been harder.
尽管有了所有这些努力,但真正的限制计算机安全可能是人类的本性。
For all those efforts, though, the real limits to computer security may lie in human nature.
介绍计算机安全检测方法和个人计算机常用安全防护措施。
The paper presents methods of computer safety detection and common protection measures of private computers.
然而计算机安全研究人员这周说他们对作者的多产印象深刻。
Security researchers, however, said this week that they were impressed by the authors' productivity.
计算机安全技术公司McAfee已经发布了最新的恶意网站地图报告。
McAfee, the computer security company, has released its latest "Mapping the Mal Web" report.
他说:“我们正在经历一场计算机安全危机,类似危机我们从未见过。”
"We are living through a crisis in computer security the likes of which we've never seen," he says.
对于有效地计算机安全来说,找到区别计算机和人更好的检验方法至关重要。
Finding better tests for distinguishing computers from humans is critical for effective computer security.
在计算机安全学中,经处理操作后,消磁或重写数据前剩留在存储器中的数据。
In computer security, data left in storage after processing operations and before degaussing or rewriting has taken place.
由于僵尸网络的存在把世界上一些最好的计算机安全专家聚到一起来阻止其带来的潜在破坏。
The existence of the botnet has brought together some of the world’s best computer security experts to prevent potential damage.
一些计算机安全专家正提出异端思想,即密码不需要“强”,也不需要频繁更换。
Some computer security experts are advancing the heretical thought that passwords might not need to be "strong," or changed constantly.
1月28日Kerviel就滥用职权、违反计算机安全条例及伪造文件开始接受正式调查。
On January 28th Mr Kerviel was placed under formal investigation for abuse of trust, breaching computer security and falsifying documents.
如果您曾经从事过计算机安全方面的工作,则应该习惯于关于任何应用程序的以下类型的问题。
If you've been working in computer security for any amount of time, you're used to the following types of questions surrounding any application.
“匿名”随后发现,巴尔与他的一些同事竟然犯了计算机安全的大忌:对多个账号使用相同密码。
Barr and some of his colleagues, Anonymous then discovered, had committed computer security's biggest sin: They used the same password on multiple accounts.
这是一个虚构的故事,然而在我的系统管理员/计算机安全生涯中,这些事情却的的确确地发生过。
This is a fictional account, yet just about everything that happens in it is something I've seen take place at one time or another during my sysadmin/computer security career.
不过,计算机安全方面的研究者却指出,该公司拥有这方面的能力意味着他们或能够提供恶意服务。
However, computer security researchers have noted that the capability could enable severe malicious activities.
那些报道计算机安全的新闻网站对转储的文档进行深入挖掘,将HBGary与巴尔当作了嘲弄的靶子。
News sites that cover computer security have plumbed the document dump, turning HBGary and Barr into objects of ridicule.
论述了在普通四轮拖拉机上加装废气控制装置的技术,设计了一种相配套的计算机安全监测系统。
Paper introduces a technique of the normal four-wheel tractor equipped with exhaust gas controlling device and designs a computer safety monitor system.
我早期对计算机安全的兴趣实际上激发了我对计算机科学的最初兴趣,并且从那时起就一直是我关注的焦点。
My early interest in system security is actually what sparked my initial interest in computer science and has been a focus of mine ever since.
在其苏黎世研究实验室,来自20多个国家的约300位科学家主攻微电子学、纳米技术和计算机安全等领域。
At its Zurich Research Laboratory around 300 scientists representing over 20 nationalities concentrate on areas such as microelectronics, nanotechnology and computer security.
这家芯片制造企业支付了60%的溢价,表明了对计算机安全的重要性增强,也助长了与这些业务相关交易的投机。
The chipmaker paid a 60 percent premium, underscoring the growing importance of computer security and fueling speculation that related deals may be in the works.
鉴于美国研究人员受来自现实生活中昆虫的灵感激发,发现了令计算机安全的一种新方法,这种反应可能会发生变化。
That might be about to change, now that US researchers have discovered a fresh approach to computer security that takes real-life bugs as its inspiration.
一份计算机安全研究协会2007年的调查发现,有50%的受访者在过去的一年里有笔记本电脑或其他移动设备被偷。
A 2007 survey by the Computer Security Institute found that 50 percent of respondents had a laptop or other mobile device sto-len in the past year.
一些电脑安全专家建议,确保计算机安全的最好方法是编写出一种不那么容易被病毒,蠕虫及其他黑客伎俩破环的软件。
Some computer security experts propose that the best way to ensure computer security is to write software that isn't easily breached by viruses, worms and other hacker tricks.
“神经装置正以极快的速度进行革新,未来前景巨大,”华盛顿大学的计算机安全专家TadayoshiKohno说。
“Neural devices are innovating at an extremely rapid rate and hold tremendous promise for the future,” said computer security expert Tadayoshi Kohno of the University of Washington.
其他计算机安全公司也报告了处方药广告垃圾邮件的减少,虽然他们谨慎的认为垃圾邮件量是有波动的,而且经常会回到原来的高度。
Other computer security companies had reported similar reductions in prescription drug spam, although they cautioned that spam volumes were volatile and often spring back to previous high levels.
其他计算机安全公司也报告了处方药广告垃圾邮件的减少,虽然他们谨慎的认为垃圾邮件量是有波动的,而且经常会回到原来的高度。
Other computer security companies had reported similar reductions in prescription drug spam, although they cautioned that spam volumes were volatile and often spring back to previous high levels.
应用推荐