The owners of Cyber Cafes are obligated to ask all of their customers for identification, leave a name registration and time of use, and report them to the authorities.
网吧经营者有责任要求网吧顾客提供有效证明,登记客人姓名、上机时间,并向官方报告。
“It’s hard to do it at a specific time, ” he says. “If a cyber-attack is used as a military weapon, you want a predictable time and effect.
“在特定的时候很难办到,”他说,“如果网络攻击作为军事武器使用,你会希望得到一个可预测的时间和效果。
"It's hard to do it at a specific time," he says. "if a cyber-attack is used as a military weapon, you want a predictable time and effect."
“很难在某个特定的时间进行网络攻击,”他说,“如果网络攻击被当作军事武器,你需要预先设定时间和攻击效果。”
At the same time, cyber criminals are targeting social network sites with increasing amounts of malware and online scams, honing in on this growing user base.
同时,网络犯罪分子盯上了社交网站,投放越来越多的恶意软件、实施网络诈骗,将这个日益壮大的用户基础当作完善诈骗技巧的试验田。
Online luggage and handbag site eBags also did testing ahead of time to make sure its site could handle Cyber Monday traffic.
在线行李箱和手袋网站eBags也做了提前测试,以确保网站能够承受在线星期一的访问量。
It control what users can log on to the server and access control of the cyber source, user access time and network in which workstations.
它控制哪些用户能够登录到服务器并获取网络资源,控制用户入网的时间和在哪台工作站入网。
The seedier elements of DDoS attacks showed around this time as the technique began to be used by organised criminals to blackmail and extort money from small businesses by threat of cyber-attack.
随着DDoS攻击开始被有组织犯罪以发起网络攻击为威胁成为敲诈勒索小公司钱财的手段,这个技术肮脏的一面开始闪现。
They also provide guidance regarding actions to be taken during a cyber security incident and promote efficient and effective actions during a time of crisis.
他们还提供指导意见要采取的行动,在一个网络安全事件,并促进在危机时刻效率和有效的行动。
He spends all his time in the cyber caf?
他把所有时间都花在网咖里。
As long as they find their children spending too much time on playing cyber games, they should urge children to quit.
只要他们发现孩子们花太多的时间在游戏上,他们就应该去制止。
"But my view on cyber is we need to take it a step at a time," he said.
“但是我对于网络的观点是我们需要走一步看一步”,他说。
At the same time, more cyber are detected and eradicated.
在同一时间内,检测到更多的网络威胁并清除。
It manages national cyber security incidents, carries out real-time threat analysis and provides advice.
而其职责就是处理国家网络安全事件,进行实时分析并提供建议。
At the same time, traditional and non-traditional security issues are interwoven with cyber security, climate change and other global challenges becoming a lot more salient.
与此同时,传统与非传统安全问题相互交织,网络安全、气候变化等全球性问题进一步凸显。
Cyber-communication is dummy, real-time and open etc. It strongly allures university students to use it.
网络传播具有虚拟性、即时性和开放性等特征,对大学生有着莫大的吸引力。
On some degree, it reduces energy consumption in Cyber-physical systems, and lessens time lapse in multi-hop transmission.
在一定程度上降低了信息物理系统中节点的能量消耗,减少了多跳传输中的延时。
The cyber economy makes financial activities more convenient and efficient, but at the same time, it brings huge challenges to the financial security.
网络经济在使金融活动变得更加快捷和高效的同时,也给金融安全带来了巨大的挑战。
Using the Web data mining technology makes full use of the advantages of cyber education, like resource sharing and no time limit.
从数据挖掘技术的角度研究了三江并流带地区丰富的旅游地质资源数据 ,采用“数据概化”的方法对资源数据集进行“维归约”预处理 。
A WebE for the Best Science Website can be found in a cave where cyber explorers travel back in space-time.
“最佳科学网站”可在一个洞穴中找到,虚拟探险家可以回到太空时代遨游。
A WebE for the Best Science Website can be found in a cave where cyber explorers travel back in space-time.
“最佳科学网站”可在一个洞穴中找到,虚拟探险家可以回到太空时代遨游。
应用推荐