• In order to computer security. And I together to fight the virus! Don't let them!

    为了电脑安全一起打击病毒不要放过它们! !

    youdao

  • For all those efforts, though, the real limits to computer security may lie in human nature.

    尽管有了所有这些努力,但真正限制计算机安全可能人类本性

    youdao

  • This paper has discussed the operation principle of the Trojan Horse virus that caused the harm greatly to computer security.

    讨论计算机安全危害极大木马病毒工作原理

    youdao

  • That might be about to change, now that US researchers have discovered a fresh approach to computer security that takes real-life bugs as its inspiration.

    鉴于美国研究人员受来自现实生活中昆虫的灵感激发,发现计算机安全一种方法这种反应可能发生变化

    youdao

  • In this paper, we present a series of important applications of blind signature to computer security communication, especially to electronic voting and electronic cash.

    根据近年来国内外关于数字签名研究背景进展,阐述签名计算机保密通信特别是电子货币等方面的一系列重要应用

    youdao

  • Diaz, 37, is top of the list of the most dangerous celebrities to search for online, above second-placed Julia Roberts, according to computer security company McAfee, Inc.

    根据迈克计算机安全公司一项调查,37迪亚兹名列网络搜索危险名人排行榜之首,茱莉亚·罗伯茨位居其后。

    youdao

  • Some of the problems related to computer security technology are discussed here and several methods for ensuring the secure operation of individual computers are illustrated with examples.

    本文主要介绍计算机安全技术需要注意一些问题,同时举例说明实现单机运行安全几种方法

    youdao

  • The prevention of this type of fraud is no easy task, and a new field of computer science is developing to cope with security issues.

    防止这种类型欺诈不是件容易,一个新的计算机科学领域正在发展应对安全问题。

    youdao

  • The existence of the botnet has brought together some of the world’s best computer security experts to prevent potential damage.

    由于僵尸网络存在世界一些最好计算机安全专家聚到一起阻止其带来的潜在破坏。

    youdao

  • To be sure, computer security companies are in the business of not only finding but also marketing security risks.

    确保无误,电脑安全公司不单在做寻找再做销售安全风险生意

    youdao

  • But security experts say it contains biological and chemical sensor technology, video, wireless communications, and computer software to simulate the spread of potential contaminants.

    安全专家包括了生物化学传感器技术视频无线通信以及模拟潜在污染物蔓延计算机软件

    youdao

  • Their scanners, cameras and computer applications are supplied by a US security industry that seems to grow bigger and more insatiable every year.

    他们的扫描仪相机电脑是由一家日益壮大且不知满足的美国安全公司提供的。

    youdao

  • Computer experts at the University of California in San Diego set out to show how easily keys could be copied from a digital image to highlight the potential security risk of leaving keys on display.

    为了强调钥匙曝光安全造成潜在危险圣地亚哥加利福尼亚大学计算机专家打算证明通过数码照片配制钥匙轻而易举

    youdao

  • Security software is covered because it "enables computer access by multiple users to a computer server by providing its customers with online access to its update servers," the court said.

    电脑安全软件认为提供网络交互服务”的公司是因为这些软件需要接入服务器实现更新服务。”法庭认为。

    youdao

  • Then there's the need to bridge the gap between traditional computer security and research into industrial-control-system security.

    还有就是需要传统方式上电脑安全和研究工业控制系统的安全联系起来。

    youdao

  • Mistakes by users are estimated to be responsible for as many as 60% of breaches of computer security.

    据估算,高达60%安全漏洞用户错误引起的。

    youdao

  • If you've been working in computer security for any amount of time, you're used to the following types of questions surrounding any application.

    如果曾经从事过计算机安全方面工作,则应该习惯于关于任何应用程序以下类型问题

    youdao

  • McAfee has spent more than a year bolstering relationships with personal computer vendors, convincing them to load trial versions of its security software onto their hardware.

    McAfee了一时间,来加强个人电脑提供商关系说服他们硬件产品上装载mcafee安全软件试用版本

    youdao

  • Sean Morrissey, a security expert, said on Thursday that the tracking on Apple devices isn't new, or a surprise, to those in the computer forensics community.

    安全专家Sean Morrissey周四苹果追踪设备对那些计算机取证团体而言,不是新的设备,或者一个惊奇

    youdao

  • Summary: With hacker attacks in the news frequently these days, we all know that computer security needs to be taken seriously.

    简介由于黑客攻击最近新闻屡有报导,我们知道需要认真地对待计算机安全问题。

    youdao

  • Some computer security experts propose that the best way to ensure computer security is to write software that isn't easily breached by viruses, worms and other hacker tricks.

    一些电脑安全专家建议确保计算机安全最好方法编写出一种那么容易病毒蠕虫其他黑客伎俩破环软件

    youdao

  • This role is required to allocate the RID pool so that new or existing domain controllers can create user accounts, computer accounts or security groups.

    角色用于分配rid以便新的现有控制器能够创建用户帐户计算机帐户或安全组。

    youdao

  • Under section 1030(a)(5) of the U. S. Computer Fraud and Abuse Act, it's against the law to knowingly disseminate computer viruses, worms, denial-of-service attacks and other security intrusions.

    根据美国计算机欺诈滥用法案第1030条(a)(5),故意散布计算机病毒蠕虫进行拒绝服务攻击其他安全入侵的行为是违法的。

    youdao

  • Under section 1030(a)(5) of the U. S. Computer Fraud and Abuse Act, it's against the law to knowingly disseminate computer viruses, worms, denial-of-service attacks and other security intrusions.

    根据美国计算机欺诈滥用法案第1030条(a)(5),故意散布计算机病毒蠕虫进行拒绝服务攻击其他安全入侵的行为是违法的。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定