• What do you think of the hackers and crackers?

    认为这些网络黑客如何

    youdao

  • Some of those online lists have been recovered by hackers and re-posted.

    黑客已经恢复了一些信息将其重新网上

    youdao

  • Hackers and scammers have also successfully managed to rob bitcoin mining pools.

    黑客骗子曾成功比特币矿池中盗取比特币。

    youdao

  • Software is the same: complex code creates more opportunities for hackers and attackers.

    软件也是一样道理:复杂代码黑客攻击者创造更多机会

    youdao

  • The list was briefly posted on the Web, and hackers and security researchers downloaded it.

    密码列表刊登网站上,黑客网络安全研究人员可自由下载。

    youdao

  • It is also the challenge of preventing unauthorized access from hackers and fraudsters.

    而对于黑客欺诈者防止未经授权访问也是挑战

    youdao

  • But things have finally changed, thanks to two Perl hackers and a lot of volunteer help and contributions!

    由于两位Perl高手许多志愿者帮助奉献情况最终得以改变

    youdao

  • There are any number of hackers and thieves out there in cyberspace just waiting to prey on innocent people.

    任何数目黑客小偷网络空间只是等待猎物无辜的

    youdao

  • Hackers and id thieves actually send these emails that look genuine and request that you provide them with sensitive information.

    黑客身份小偷实际上发送这些邮件真正是想你他们提供敏感信息

    youdao

  • Partly, it could be that in the endless cat-and-mouse game between hackers and security teams, the hackers have jumped ahead.

    部分原因可能黑客信息安保部门无休止的猫老鼠游戏中,黑客目前暂时占据了上风。

    youdao

  • The great experiment proved that some of us are wonderful and interesting but that a lot of us are hackers and pranksters and hucksters.

    这个伟大的试验证明我们中的一部分极好幽默的有一些却是黑客或者是爱开玩笑或者是卑鄙小人。

    youdao

  • Sometimes young programmers notice the eccentricities of eminent hackers and decide to adopt some of their own in order to seem smarter.

    有时年轻程序员注意到了著名黑客一些怪癖决定模仿,显得聪明

    youdao

  • Most major law firms have played down the threat posed by hackers and have been reluctant to discuss breaches or even attempted breaches.

    大多数大型律师事务所不重视黑客威胁,不讨论遭受黑客攻击的问题,甚至不愿讨论未能成功的攻击。

    youdao

  • Age verification requires that you have a database of kids, and if you do, that database is available to hackers and anyone who can get into it.

    年龄验证需要具有一个儿童信息数据库如果了,这个数据库就也同时黑客任何能够进入敞开了大门

    youdao

  • Hackers and thieves can work endlessly to compromise an asset if they can confirm its presence and feel there is substantive value in gaining access.

    如果他们证实出席并且感觉获得存取实质价值那么黑客不断工作损害资产

    youdao

  • Job sites are regularly attacked by hackers and via email "phishing" attacks, as they provide a rich source of data for those interested in identity theft.

    招聘网站频频受到黑客攻击,或遭受通过电子邮件网络钓鱼”的攻击因为它们那些对身份盗窃感兴趣的人提供丰富数据资源

    youdao

  • Steve Jobs, Apple’s chief executive, hasacknowledged that his company is involved in acat and mousegame to try andkeep hackers and jailbreakers at bay.

    苹果首席执行官Steve Jobs承认,他们陷入了一阻击黑客越狱者的“老鼠游戏

    youdao

  • Since then, Sony's networks have become targets for hackers and the company has confirmed at least four other break-ins prior to the claimed attack on Sony Pictures.

    此后索尼公司成为黑客攻击目标并且公司已经证实此次针对索尼图片攻击被发布之前已有至少四次其他攻击发生。

    youdao

  • And, in addition to computer hardware and software, garage hackers and home-build enthusiasts are now merrily cooking up electric cars, drone aircraft and rockets.

    而且除了电脑软件硬件之外,车库天才在家创业的爱好者们还在兴奋地制造电动汽车并谈论航空器火箭。

    youdao

  • Because hackers and identity thieves learn new ways to infiltrate computers everyday, it's important to make your computer as hacker - and identity theft-proof as possible.

    因为黑客身份小偷每天都会学习用新的方式渗透电脑所以使电脑尽可能的收集到黑客和身份小偷的证据很重要的。

    youdao

  • Because hackers and identity thieves learn new ways to infiltrate computers everyday, ita s important to make your computer as hacker - and identity theft-proof as possible.

    因为黑客身份小偷每天都会学习用新的方式渗透电脑,所以,使电脑能尽可能的收集到黑客和身份小偷的证据是重要的。

    youdao

  • Second, when people pay the money online, they will have the chance to leak out their message, their online account will be attacked by the hackers and thus to lose the money.

    第二人们网上付款时,他们可能泄露信息,网上的账号遭到黑客攻击,导致失去金钱

    youdao

  • Ase-government platform, running heavily involved in secret and sensitive data and information, will inevitably become information espionage, hostile forces, hackers and other damage and targets.

    由于电子政务平台运行大量涉及秘密敏感数据信息必然成为信息间谍敌对势力黑客破坏和攻击的目标

    youdao

  • When these smartphones and laptops log on to the networks which are not real, hackers can easily steal their private information.

    这些智能手机笔记本电脑登录真实网络上时,黑客可以很容易地窃取他们私人信息

    youdao

  • Not only does that threaten to rub off on users, it's bad for recruitment and retention of talented hackers, who are the lifeblood of Zuckerberg's creation.

    不仅威胁用户,也不利于招募留住天才黑客,而这些黑客正是扎克伯格创建(公司)命脉

    youdao

  • Not only does that threaten to rub off on users, it's bad for recruitment and retention of talented hackers, who are the lifeblood of Zuckerberg's creation.

    不仅威胁用户,也不利于招募留住天才黑客,而这些黑客正是扎克伯格创建(公司)命脉

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定