• University-educated Riverbend worked as a computer programmer before the invasion which began on March 20, 2003.

    受过大学教育的“河湾”在2003年3月20日美军入侵伊拉克一名电脑程序师。 她在博客说,她失去了工作,因为那时伊拉克妇女单独出门上班已经是很危险的事情。

    youdao

  • In order to prevent the Trojan invasion, the computer to install and update anti-virus software upgrade, not open the unknown email, no computer access to the internet.

    防止木马侵入计算机安装杀毒软件及时更新升级随意打开不明电子邮件,严禁将涉密计算机接入互联网。

    youdao

  • The need to install, and need to upload the server to the invasion of computer and run the service, to achieve the goal of control.

    需要自己安装而且需要将服务端上传到入侵电脑运行服务才能达到控制的目的

    youdao

  • If a computer could automatically detect and preserve footage "of interest," the rest can be safely deleted, minimizing the invasion to our privacy.

    如果计算机可以自动检测保留“有用录像其余安全删除我们的隐私入侵就能减到最小。

    youdao

  • Based on many years' experience of network management the author, analyzes the common methods of network invasion and offers advice on security frameworks for management of secret computer.

    本文根据多年网络信息系统安全管理实践经验分析了目前网络攻击入侵手段,详细论述了构建涉密计算机信息系统安全体系的基本思路。

    youdao

  • The log as evidence sources is selected for extracting evidence on the illegal computer invasion.

    提取计算机非法入侵证据选取日志作为证据来源

    youdao

  • The log as evidence sources is selected for extracting evidence on the illegal computer invasion.

    提取计算机非法入侵证据选取日志作为证据来源

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定