• JACK BAUER famously does whatever it takes to save America from disaster, be that disaster nuclear, biological or computer attack.

    JACKBAUER拯救美国各式灾难而闻名于世,不论这些灾难核泄漏生化危机还是计算机攻击

    youdao

  • The goal of the computer attack tools, the report said, is "to deny an adversary access to information essential to conduct combat operations."

    报告认为,设计这些电脑攻击工具目的“阻挠敌方获得基本信息开展军事行动能力”。

    youdao

  • In the cyberworld, this rule means you couldn't plan a massive computer attack, even on a military network, without regard for the civilian computer networks that would be affected by that attack.

    虚拟空间里,这个规则意味着不能规划庞大计算机网络攻击即使是一个军事网络也不能够排除民用网络受到牵连。

    youdao

  • I have no idea why a boomerang is attacking a plant or whether the magical hovering computer monitor is aiding in the attack or fleeing the scene.

    知道为什么回力镖会攻击植物知道神奇悬停电脑显示器协助攻击还是逃离现场

    youdao

  • In the case of an attack, military advisers suggested the advantage of being able to operate one computer from another terminal.

    遭受攻击情况下军事顾问说明另一个终端操控台计算机优势

    youdao

  • Realize, though, that this attack is not reserved strictly for the realm of computer and digital security.

    然而我们要认识到这种攻击并不仅仅存在计算机数字安全领域。

    youdao

  • A more practical location for this attack is near the shopper's computer or the server.

    这种攻击比较可行方案购物者计算机或者服务器附近

    youdao

  • Once the attack begins, websites can try to trace the sudden flood of traffic back to the source computer and filter it out, but even that's a complex process.

    一旦攻击开始网站可以尝试追踪突发洪水般的流量找到计算机对此加以过滤一个复杂的过程。

    youdao

  • Modern societies are ever more reliant on computer systems linked to the Internet, giving enemies more avenues of attack.

    现代社会越来越依赖于有网络连接计算机系统,这增加了敌人攻击途径

    youdao

  • Media companies only concentrate on the hackers who attack computer systems rather than the defenders, so some people use the term "hacker" to mean only attacking hackers.

    媒体公司关注那些攻击计算机系统黑客往往忽视那些计算机的保卫者所以有些使用术语黑客表示只进行攻击的黑客。

    youdao

  • The amount of information now available online about individuals makes it ever easier to attack a computer by crafting a personalised E-mail that is more likely to be trusted and opened.

    如今网上大量唾手可得的个人信息使得攻击电脑更加容易,方式仿造一个能取得信任能打开的电子邮件

    youdao

  • In a buffer overflow attack, the hacker takes advantage of specific type of computer program bug that involves the allocation of storage during program execution.

    缓冲溢出攻击黑客利用程序执行期间存储分配中的特定计算机程序漏洞

    youdao

  • That same dark side of human nature ensures that there will always be those who misuse computer technology to attack, intrude, and otherwise attempt to do harm to computer systems.

    人类邪恶一面使得有人滥用计算机技术实施攻击入侵,那么就是试图破坏计算机系统

    youdao

  • A new program aims to put the squeeze on malicious software that can disable, infiltrate or transform a computer system into an unwitting zombie - before the cyber attack ever materializes.

    新的程序旨在恶意软件施加压力程序可以网络攻击开始之前禁用渗透变换的方法阻止计算机在不知情的情况下成为僵尸电脑。

    youdao

  • Zero-day attack Computer threats that prey on software weaknesses developers had not identified.

    电脑攻击是因为电脑软件开发者没有发现缺陷,从而被黑客利用;

    youdao

  • Richard Lawless, a Pentagon official, recently said China had developed a "very sophisticated" ability to attack American computer and Internet systems.

    五角大楼官员理查德·劳里斯最近中国练就了袭击美国网络系统的“高明本领

    youdao

  • A ping flooding attack is a simple DDoS attack in which a computer sends a packet (ping) to another system with the intention of uncovering information about services or systems that are up or down.

    ping洪水攻击简单DDoS攻击。这种攻击中,一个计算机一个系统发送一个(ping),找到关于服务系统信息

    youdao

  • Internet service providers say they're rarely able to identify the master computer behind a DDoS attack.

    互联网服务供应商,在DDoS攻击后他们很少僵尸电脑网络的主控计算机。

    youdao

  • Increases the cost of attack, because the attack has to be adapted for each computer, "she says."

    认为:“就增加攻击成本因为攻击必须适应每个系统。”

    youdao

  • "Social engineering," the gathering of information about a computer or computer network via questions to naive users, is often the first step in a malicious attack on computer networks.

    社会工程有关计算机通过向天真的问题,计算机网络用户信息收集往往计算机网络进行恶意攻击一步

    youdao

  • For non confidential computer information system, the attack success rate of 88%, was found only accounted for 5%.

    保密计算机信息系统来说,攻击成功率达88%,查出占5%。

    youdao

  • TEMPEST ATTACK threat on the computer information security is analyzed. The fundamental electromagnetic radiation models are set up.

    针对TEMPEST ATTACK计算机信息安全构成的威胁建立基本电磁辐射模型

    youdao

  • TEMPEST ATTACK threat on the computer information security is analyzed. The fundamental electromagnetic radiation models are set up.

    针对TEMPEST ATTACK计算机信息安全构成的威胁建立基本电磁辐射模型

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定