China also falls victim to hacker attacks.
中国也是黑客攻击的受害者。
One is security: such systems will be vulnerable to all sorts of hacker attacks.
有一个是安全:此类系统易受各式各样的黑客攻击。
The past year due to hacker attacks there have been 5 total blocks of the site.
去年一年,由于遭到黑客攻击,导致该神社网页瘫痪了5次。
Protect your computer against hacker attacks and intrusions while surfing the Internet.
保护计算机免受黑客攻击和入侵,让你在网上安全冲浪。
Aimed at confronting the digital campus viruses, hacker attacks and spam, and a series of network security issues.
针对数字化校园面临的病毒入侵、黑客攻击和垃圾邮件等一系列网络安全问题。
Summary: With hacker attacks in the news frequently these days, we all know that computer security needs to be taken seriously.
简介:由于黑客攻击最近在新闻中屡有报导,我们都知道需要认真地对待计算机安全问题。
This text has discussed the urgency of case study of the network, the hacker attacks the characteristic safe loophole question.
本文讨论了网络安全研究的紧迫性,黑客攻击特征,安全漏洞问题。
One would be through internet attacks such as hacker attacks but also disinformation through Russian media principally Russian Television.
第一种是通过网络攻击例如黑客攻击,还可以通过俄罗斯媒体主要是俄罗斯电视台故意散播虚假情报。
Also, as open operating systems such as Android become more and more ubiquitous, mobile devices will become more vulnerable to hacker attacks and malware.
此外,由于如Android的开放式操作系统越来越普及,移动设备在黑客和恶意软件面前变得更加脆弱。
Given the proliferation of hacker attacks, Run-time Variation 1, shown in Figure 8, is the recommended pattern for the Directly Integrated Single Channel application pattern.
鉴于电脑黑客的攻击能力不断加强,如图8所示的运行时变种1是适合于直接集成单通道应用程序模式的一种值得推荐的模式。
While many publications exist about software that can be used to secure computer environments, very few publications exist that explain how hacker attacks are actually performed.
尽管有许多出版物介绍可以用来确保计算机环境安全的软件,但很少有出版物说明黑客攻击实际上是如何执行的。
It can collect the proofs timely and accomplish the analysis of detection and forensic when intruded. This system makes up the lack of intrusion detection, and prevents hacker attacks effectively.
在遭受入侵时它能实时地收集可靠的证据,完成入侵事件的检测和取证分析,弥补了入侵检测的不足,有效地阻止了黑客攻击。
An external hacker is probably an expert in security attacks, but might not have any particular grudge against you.
外部黑客也许是安全性攻击方面的专家,但是他们对您可能没有攻击动机。
An external hacker is probably an expert in security attacks, but may not have any particular grudge against you.
外部黑客也许是安全性攻击方面的专家,但是他们对您可能没有攻击动机。
However, recent anonymous attacks showed a new level of sophistication by recruiting volunteers to download a tool to create a "virtual" botnet, turning almost anybody into a potential hacker.
然而,近来的匿名攻击显示其复杂程度又上了新台阶,通过招募志愿者下载工具来创建“虚拟”僵尸网络,几乎可以让人人成为潜在的黑客。
In fact, he notes that within the hacker community, DDoS and similar attacks don't even qualify as true hacking, which involves actually compromising a network, not taking down a site.
他注意到,在黑客界内部,阻断服务攻击以及类似的攻击方式只能算是雕虫小技,甚至还不够格被称作真正的“黑”。真正的“黑”是要对一个网络造成真正的危害,而不是暂时关掉一个网站。
In most cases, these automated attacks are launched by those with the lowest skill levels of the hacker community-those known as script kiddies.
大多数情况下,这些自动进行的攻击由黑客社区中技能水平最低的人来实施——即所谓的脚本kiddy。
Often abbreviated MITM, such attacks are when a hacker tries to get in between a user and an encrypted or secure service.
这类攻击通常被简写为MITM (ManIn The Middle),是黑客试图切入用户同加密服务或安全服务之间的一种攻击。
On the other side, hacker attack, virus spreading and mixed network attacks add increasingly, so that the network security defensive line is full frailness.
另一方面,黑客攻击、病毒传播以及形形色色的网络攻击日益增加,网络安全防线十分脆弱。
On the other side, hacker attack, virus spreading and mixed network attacks add increasingly, so that the network security defensive line is full frailness.
另一方面,黑客攻击、病毒传播以及形形色色的网络攻击日益增加,网络安全防线十分脆弱。
应用推荐