In order to computer security. And I together to fight the virus! Don't let them!
为了电脑的安全!和我一起来打击病毒!不要放过它们! !
For all those efforts, though, the real limits to computer security may lie in human nature.
尽管有了所有这些努力,但真正的限制计算机安全可能是人类的本性。
This paper has discussed the operation principle of the Trojan Horse virus that caused the harm greatly to computer security.
讨论对计算机安全危害极大的“木马”病毒的工作原理。
That might be about to change, now that US researchers have discovered a fresh approach to computer security that takes real-life bugs as its inspiration.
鉴于美国研究人员受来自现实生活中昆虫的灵感激发,发现了令计算机安全的一种新方法,这种反应可能会发生变化。
In this paper, we present a series of important applications of blind signature to computer security communication, especially to electronic voting and electronic cash.
根据近年来国内外关于数字签名的研究背景及进展,阐述盲签名在计算机保密通信,特别是在电子货币等方面的一系列重要应用。
Diaz, 37, is top of the list of the most dangerous celebrities to search for online, above second-placed Julia Roberts, according to computer security company McAfee, Inc.
根据迈克菲计算机安全公司的一项调查,37岁的迪亚兹名列网络搜索最危险名人排行榜之首,茱莉亚·罗伯茨位居其后。
Some of the problems related to computer security technology are discussed here and several methods for ensuring the secure operation of individual computers are illustrated with examples.
本文主要介绍了计算机安全技术所需要注意的一些问题,同时举例说明实现单机运行安全的几种方法。
The prevention of this type of fraud is no easy task, and a new field of computer science is developing to cope with security issues.
防止这种类型的欺诈不是一件容易的事,一个新的计算机科学领域正在发展以应对安全问题。
The existence of the botnet has brought together some of the world’s best computer security experts to prevent potential damage.
由于僵尸网络的存在把世界上一些最好的计算机安全专家聚到一起来阻止其带来的潜在破坏。
To be sure, computer security companies are in the business of not only finding but also marketing security risks.
为确保无误,电脑安全公司不单在做寻找但也再做销售安全风险的生意。
But security experts say it contains biological and chemical sensor technology, video, wireless communications, and computer software to simulate the spread of potential contaminants.
但安全专家说,它包括了生物和化学传感器技术、视频、无线通信,以及模拟潜在污染物蔓延的计算机软件。
Their scanners, cameras and computer applications are supplied by a US security industry that seems to grow bigger and more insatiable every year.
他们的扫描仪、相机和电脑都是由一家日益壮大且不知满足的美国安全公司提供的。
Computer experts at the University of California in San Diego set out to show how easily keys could be copied from a digital image to highlight the potential security risk of leaving keys on display.
为了强调钥匙曝光的对安全造成的潜在危险,圣地亚哥加利福尼亚大学的计算机专家打算证明通过数码照片配制钥匙轻而易举。
Security software is covered because it "enables computer access by multiple users to a computer server by providing its customers with online access to its update servers," the court said.
“电脑安全软件也被认为是提供“网络交互服务”的公司是因为这些软件需要接入服务器来实现更新服务。”法庭认为。
Then there's the need to bridge the gap between traditional computer security and research into industrial-control-system security.
还有就是需要将传统方式上电脑安全和研究与工业控制系统的安全联系起来。
Mistakes by users are estimated to be responsible for as many as 60% of breaches of computer security.
据估算,高达60%的安全漏洞是由用户错误引起的。
If you've been working in computer security for any amount of time, you're used to the following types of questions surrounding any application.
如果您曾经从事过计算机安全方面的工作,则应该习惯于关于任何应用程序的以下类型的问题。
McAfee has spent more than a year bolstering relationships with personal computer vendors, convincing them to load trial versions of its security software onto their hardware.
McAfee花了一年多时间,来加强同个人电脑提供商的关系,说服他们在其硬件产品上装载mcafee安全软件的试用版本。
Sean Morrissey, a security expert, said on Thursday that the tracking on Apple devices isn't new, or a surprise, to those in the computer forensics community.
安全专家Sean Morrissey周四说,苹果追踪器设备对那些计算机取证团体而言,不是新的设备,或者一个惊奇。
Summary: With hacker attacks in the news frequently these days, we all know that computer security needs to be taken seriously.
简介:由于黑客攻击最近在新闻中屡有报导,我们都知道需要认真地对待计算机安全问题。
Some computer security experts propose that the best way to ensure computer security is to write software that isn't easily breached by viruses, worms and other hacker tricks.
一些电脑安全专家建议,确保计算机安全的最好方法是编写出一种不那么容易被病毒,蠕虫及其他黑客伎俩破环的软件。
This role is required to allocate the RID pool so that new or existing domain controllers can create user accounts, computer accounts or security groups.
此角色用于分配rid池,以便新的或现有的域控制器能够创建用户帐户、计算机帐户或安全组。
Under section 1030(a)(5) of the U. S. Computer Fraud and Abuse Act, it's against the law to knowingly disseminate computer viruses, worms, denial-of-service attacks and other security intrusions.
根据美国计算机欺诈和滥用法案第1030条(a)(5),故意散布计算机病毒,蠕虫,进行拒绝服务攻击和其他安全入侵的行为是违法的。
Under section 1030(a)(5) of the U. S. Computer Fraud and Abuse Act, it's against the law to knowingly disseminate computer viruses, worms, denial-of-service attacks and other security intrusions.
根据美国计算机欺诈和滥用法案第1030条(a)(5),故意散布计算机病毒,蠕虫,进行拒绝服务攻击和其他安全入侵的行为是违法的。
应用推荐