This paper introduces the unsafe factors, including network virus and illegal invasion outside system.
介绍了网络的不安全因素,包括网络病毒和系统外来非法入侵。
Computer crime form is unauthorized and illegal invasion of computer systems, copying programs or data files.
计算机犯罪的形式是未经授权而非法入侵计算机系统,复制程序或数据文件。
Home of systems in combination with their own work practice, summarizes the article 10 protection router, to prevent the illegal invasion, you might as well try.
系统之家结合自己的工作实践,总结了10条保护路由器、防止非法入侵的办法,您不妨一试。
However, in recent years, more and more Judicial officers have treated it as the crime of illegal invasion of residential, which even be regulated distinctly by some Judiciaries.
近些年来,越来越多的司法工作人员将这种行为以非法侵入住宅罪论,甚有司法机关明文规定以非法侵入住宅罪定罪处罚。
Now, lest you think that this potential privacy invasion is illegal, know that the FTC just determined that Social Intelligence Corp. is in compliance with the Fair Credit Reporting Act.
恐怕你会认为这些潜在的隐私侵犯是违法的,但你要知道联邦贸易委员会才决定了社会情报公司遵守公平信用报告法案。
The log as evidence sources is selected for extracting evidence on the illegal computer invasion.
为提取计算机非法入侵的证据,选取了日志作为证据来源。
Access control becomes a research hotspot in the multitudinous security mechanism, whose goal is to prevent invasion of illegal users or illegal usage of the system resources by legitimate users.
访问控制成为众多安全机制中的一个研究热点,目标是防止非法用户侵入或者合法用户对系统资源的非法使用。
Finally, placed backdoor, erasing invasion, cleaning log, new traces, acquiring or modify account information, network monitor (sniffer), against other host or other illegal activities.
最后,放置后门程序,擦除入侵痕迹,清理日志,新建账号,获取或修改信息、网络监听(sniffer)、攻击其他主机或者进行其他非法活动。
Finally, placed backdoor, erasing invasion, cleaning log, new traces, acquiring or modify account information, network monitor (sniffer), against other host or other illegal activities.
最后,放置后门程序,擦除入侵痕迹,清理日志,新建账号,获取或修改信息、网络监听(sniffer)、攻击其他主机或者进行其他非法活动。
应用推荐