• China also falls victim to hacker attacks.

    中国也是黑客攻击受害者

    youdao

  • One is security: such systems will be vulnerable to all sorts of hacker attacks.

    有一个安全此类系统各式各样黑客攻击。

    youdao

  • The past year due to hacker attacks there have been 5 total blocks of the site.

    去年一年,由于遭到黑客攻击导致该神社网页瘫痪了5次。

    youdao

  • Protect your computer against hacker attacks and intrusions while surfing the Internet.

    保护计算机免受黑客攻击入侵,让网上安全冲浪。

    youdao

  • Aimed at confronting the digital campus viruses, hacker attacks and spam, and a series of network security issues.

    针对数字化校园面临病毒入侵黑客攻击垃圾邮件一系列网络安全问题

    youdao

  • Summary: With hacker attacks in the news frequently these days, we all know that computer security needs to be taken seriously.

    简介由于黑客攻击最近新闻屡有报导,我们知道需要认真地对待计算机安全问题。

    youdao

  • This text has discussed the urgency of case study of the network, the hacker attacks the characteristic safe loophole question.

    本文讨论网络安全研究紧迫性黑客攻击特征,安全漏洞问题。

    youdao

  • One would be through internet attacks such as hacker attacks but also disinformation through Russian media principally Russian Television.

    第一种通过网络攻击例如黑客攻击,可以通过俄罗斯媒体主要是俄罗斯电视台故意散播虚假情报。

    youdao

  • Also, as open operating systems such as Android become more and more ubiquitous, mobile devices will become more vulnerable to hacker attacks and malware.

    此外由于Android开放式操作系统越来越普及移动设备黑客恶意软件面前变得更加脆弱

    youdao

  • Given the proliferation of hacker attacks, Run-time Variation 1, shown in Figure 8, is the recommended pattern for the Directly Integrated Single Channel application pattern.

    鉴于电脑黑客攻击能力不断加强,如图8所示运行变种1适合于直接集成通道应用程序模式一种值得推荐的模式。

    youdao

  • While many publications exist about software that can be used to secure computer environments, very few publications exist that explain how hacker attacks are actually performed.

    尽管许多出版物介绍可以用来确保计算机环境安全的软件,但很少有出版物说明黑客攻击实际上如何执行的。

    youdao

  • It can collect the proofs timely and accomplish the analysis of detection and forensic when intruded. This system makes up the lack of intrusion detection, and prevents hacker attacks effectively.

    在遭受入侵实时地收集可靠证据完成入侵事件检测取证分析弥补了入侵检测的不足,有效地阻止了黑客攻击

    youdao

  • An external hacker is probably an expert in security attacks, but might not have any particular grudge against you.

    外部黑客也许安全性攻击方面的专家但是他们可能没有攻击动机

    youdao

  • An external hacker is probably an expert in security attacks, but may not have any particular grudge against you.

    外部黑客也许安全性攻击方面的专家但是他们可能没有攻击动机

    youdao

  • However, recent anonymous attacks showed a new level of sophistication by recruiting volunteers to download a tool to create a "virtual" botnet, turning almost anybody into a potential hacker.

    然而近来匿名攻击显示复杂程度又上台阶通过招募志愿者下载工具创建虚拟僵尸网络几乎可以让人人成为潜在的黑客。

    youdao

  • In fact, he notes that within the hacker community, DDoS and similar attacks don't even qualify as true hacking, which involves actually compromising a network, not taking down a site.

    注意到,黑客内部阻断服务攻击以及类似的攻击方式只能算是雕虫小技,甚至还够格被称作真正的“黑”。真正的“黑”是要对网络造成真正的危害而不是暂时关掉一个网站。

    youdao

  • In most cases, these automated attacks are launched by those with the lowest skill levels of the hacker community-those known as script kiddies.

    大多数情况下这些自动进行攻击黑客社区中技能水平最低人来实施——即所谓脚本kiddy

    youdao

  • Often abbreviated MITM, such attacks are when a hacker tries to get in between a user and an encrypted or secure service.

    这类攻击通常简写MITM (ManIn The Middle),黑客试图切入用户同加密服务安全服务之间种攻击。

    youdao

  • On the other side, hacker attack, virus spreading and mixed network attacks add increasingly, so that the network security defensive line is full frailness.

    一方面,黑客攻击病毒传播以及形形色色网络攻击日益增加,网络安全防线十分脆弱。

    youdao

  • On the other side, hacker attack, virus spreading and mixed network attacks add increasingly, so that the network security defensive line is full frailness.

    一方面,黑客攻击病毒传播以及形形色色网络攻击日益增加,网络安全防线十分脆弱。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定