• 勒索刺探数据窃取这些当作合理事情提议出来

    Blackmail, espionage, data theft. These are things that were proposed as reasonable things to do.

    youdao

  • 计算提供了全新的计算机遇不过由于新的数据窃取潜在方式带来了新的安全问题

    Cloud computing offers new computing opportunities, but it also raises new security issues due to new potential ways for data theft.

    youdao

  • 无论是个隐私数据窃取数据丢失数据泄漏问题密码文件夹理想工具

    Whether you are concerned with privacy, data theft, data loss, or data leaks, Password Folder is an ideal tool for you.

    youdao

  • 垃圾邮件网络钓鱼炒股诈骗、数据窃取木马键盘记录器能够它们制造者带来巨额的收入

    Spam, phishing, pump-and-dump schemes and data-stealing Trojans and keyloggers can net their creators an enormous amount of income.

    youdao

  • 他们提到普遍联系环境中,对隐私数据窃取考虑理所应当的,但是,他们感到现在停止变化崇拜已经太晚了。

    They acknowledge that privacy and data theft are legitimate concerns in a pervasively connected environment, but they feel it is already too late to stop the juggernaut of change.

    youdao

  • 企业政府机构日常面临最大威胁来自希望窃取金融数据商业机密骗子间谍

    The biggest day-to-day threats faced by companies and government agencies come from crooks and spooks hoping to steal financial data and trade secrets.

    youdao

  • 事实上并不造成任何损害而且也不会窃取任何数据,但这并不重要,而且实际上很难证实这一点!

    The fact that you caused no damage and did not steal any data is not only irrelevant, it may actually be hard to prove!

    youdao

  • 黑客可以虚拟重新分配的实例资源中获取没有清除残留数据从中窃取敏感信息

    The hacker can steal sensitive information from residual data that has not been purged from re-allocated instance resources within a virtual machine.

    youdao

  • 利用基于网络实时数据建立测量标准,从而窃取用户情绪状况喜好主意没有多少新意,使用它来预测行为也是一样

    The idea of tapping web-based data to build a real-time measure of users' emotions and preferences is not new. Nor is that of using the results to predict their behaviour.

    youdao

  • 一定不要记录公司事情公司窃取数据

    "You don't want to be recording things, or stealing" data from the company.

    youdao

  • SQLInjection攻击应用程序开发人员紧密相关,因为它们用于侵入据推测是安全系统窃取更改销毁数据

    SQL injection attacks are a serious concern for application developers as they can be used to break into supposedly secure systems and steal, alter, or destroy data.

    youdao

  • 这种解决方案保护用户不受那些浏览器中不知不觉运行的,窃取数据破坏整个0知识架构恶意代码的侵害。

    This solution protects the user from malicious code that could be unknowingly executed by his browser, stealing his data and destroying the whole zero-knowledge architecture.

    youdao

  • Facebook迅速针对这个人帮以及他们名下的社交网站ConnectU发起反诉宣称这三人侵入Facebook,窃取数据向其用户发送垃圾邮件。

    Facebook promptly countersued the trio and their own social networking site, ConnectU, alleging that they had hacked into Facebook to steal data and spam users.

    youdao

  • 根据卡巴斯基实验室Alex Gostev提供的信息,Waledac也下载流氓杀毒软件感染机器以及可以窃取数据发送垃圾邮件的电子邮件蠕虫病毒。

    According to Kaspersky Labs' Alex Gostev, Waledac will download a rogue antivirus application onto infected machines, as well as an email-worm that can steal data and send spam.

    youdao

  • EFS允许文件加密以便保护保密数据不会被攻击直接访问计算机的方式进行窃取

    This allows for file encryption in order to protect confidential data from attackers with physical access to the computer.

    youdao

  • 随着我们重要数据越来越多存储(云计算)里,寻求窃取那些数据的人薄弱的环节下手的。

    As more of our important data finds its way into the cloud, those seeking to exploit that data will seek the weakest point of entry.

    youdao

  • 这种设计可以笔记本连接互联网删除其数据,以避免罪犯窃取数据

    The feature protects data on the notebook if the machine is lost or stolen by allowing files to be deleted when the machine connects to the Internet.

    youdao

  • 组织数据总是安全的,别人很难窃取破坏数据

    An organization's data is always secure and is less apt to be stolen or compromised by others.

    youdao

  • RSA公司发现550000个在线账户数据信用卡信息在木马协助下成功窃取,他们同时关于互联网欺诈”的一项研究

    RSA discovered that data from 550, 000 online bank accounts and credit card accounts was stolen with the aid of one Trojan, and has done research on the "Internet Fraud Chain" .

    youdao

  • 3月黑客Epsilon公司窃取email地址数据资料,评论员是史上最大的email资料被盗取事件。

    In March, hackers stole a database of email addresses from the marketing group Epsilon, in what one commentator called the largest email address heist in history.

    youdao

  • 所有情况下使用队列其实种双队列(deque)(两端都能输入数据数据行列,发音为“deck”),允许线程另一个队列的窃取工作从而平衡进入线程的工作。

    The queue used in each case is actually a deque (a double-ended queue, pronounced "deck"), which allows threads to steal work from the back end of another queue, balancing work entering the pool.

    youdao

  • 这种方案要求手机内部植入一硬件设备可以防止小偷绕过软件程序窃取手机内部加密数据

    This would involve embedding actual hardware into the phone that would prevent thieves from circumventing software technology to get access to data encrypted on the phone.

    youdao

  • 然而数据质量低下敏感数据外泄外部恶意窃取问题随之而来,研究行之有效信息安全策略刻不容缓

    However, the problems such as low data quality, sensitive data leakage, external malicious theft and so on, it is urgent to study the effective information security strategy.

    youdao

  • 收集信息不是软件开发者失误因为有米在隐瞒事实,这些窃取数据实际上都传回到了它自己的服务器里

    The data collection does not appear to be the developers' fault, since Youmi was disguising the fact that its software was sending that data to its servers.

    youdao

  • 本文研究重点主要是放在对机要数据设备产生的泄漏发射进行检测窃取方面。

    This research report mainly focuses on the detection and eavesdropping of the compromising emanation from the confidential devices.

    youdao

  • 文件加密存储保证机密数据窃取篡改有效方法

    The file cryptographic storage is an effective method to guarantee secret data from being stolen or tampered.

    youdao

  • 例如恶意用户可能会构建用于运行任意代码生成定义,从而控制服务器窃取数据

    For example, a malicious user could construct a build definition to run arbitrary code to take control of the server and steal data.

    youdao

  • 因为即使这么权限下,熟练控制电脑存储器,你就可以窃取别人的秘密,如果知道相应数据位于哪里的话,你也能窃取别人的数据

    Cause when you can actually manipulate a computer's memory at this low level, you can steal people's passwords, you can steal their data if you know how that memory is laid out.

    youdao

  • 如今网络黑客窃取数据花样很多非法接入木马攻击IP欺骗、网页仿冒僵尸网络、网络嗅探网址嫁接

    Now the network hackers to steal data many tricks: illegal access, Trojan attacks, phishing, spoofing, IP Botnet, network sniffer, pharming etc...

    youdao

  • 如今网络黑客窃取数据花样很多非法接入木马攻击IP欺骗、网页仿冒僵尸网络、网络嗅探网址嫁接

    Now the network hackers to steal data many tricks: illegal access, Trojan attacks, phishing, spoofing, IP Botnet, network sniffer, pharming etc...

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定