遗憾的是,盗取数字数据常常很容易。
这就是为什么我要从梦中把它盗取出来。
索马里海盗一般不会盗取货物或杀害人质。
Somali pirates generally do not steal goods or kill hostages.
攻击者盗取了所有10个指纹时会怎样呢?
有时,攻击者不必盗取物理标记来复制它。
Sometimes an attacker doesn't need to steal the physical token in order to duplicate it.
现在,她可以操纵数据库,盗取bob的客户信息。
Now, she can manipulate the database to steal Bob's customer information.
我认为不会有人试图盗取小美人鱼,因为她太有名了。
I don't think that anyone will try to steal the Little Mermaid because she is too famous.
黑客是如何盗取账号和密码的至今仍是个迷。
How the hackers stole their user name and password is a mystery.
Mallory现在可以模仿bob并盗取他的信息。
Mallory can now impersonate Bob and steal information from him.
如果你在盗取公司的资金,你必然不想把这一事实披露出来。
If you are stealing money from the company, you can't very well disclose that.
攻击者需要盗取您的信用卡并且尝试5,000个PIN号码。
The attacker needs to steal your card AND try an expected 5,000 pin Numbers.
其被控盗取商业秘密罪和行贿罪,在秘密审理后被判入狱十年。
Convicted of stealing trade secrets and bribery, Mr.Hu was sentenced to 10 years in prison after a largely closed trial.
另外,请注意这种系统怂恿人们盗取您身体的一部分,这可从来不是一件好事。
Additionally, note that such systems encourage people to steal parts of your body, which is never a good thing.
2006年,中国有44人因涉嫌盗取价值超过70万元的虚拟财物而被逮捕。
In 2006 in China, 44 people were arrested for stealing more than 700, 000 yuan worth of virtual items.
山寨的市场策略很简单:盗取他方的外观工业设计,品牌标识则直接复制或模仿。
Marketing strategies were simple: steal. Designs and brand names were copied identically or simply mimicked.
他们对汇率的操控,过度的关税,和盗取美国的知识产权都是主要原因。
And their currency manipulation, excessive tariffs, and theft of American intellectual property are major concerns.
这就是AlbertGonzalez用来盗取1.3亿信用卡号的那类攻击。
This type of attack was what Albert Gonzalez used to steal 130 million credit card Numbers.
在黑客们利用这个盗取你信息之后升级就完了,特别在你持有敏感用户数据的时候。
Upgrading after a hacker USES this exploit to steal your information is simply too late, especially if you hold sensitive customer data.
此类规定亦须具有国际性,以防外国银行从颁布该规定国之银行手中盗取市场份额。
Such rules would need to be international, to stop foreign banks from stealing market share from banks in countries that observed the regulations.
这样会导致各种类型的攻击(类似于XSS),包括盗取用户的敏感信息。
This can result in all kinds of attacks (similar to XSS), including the theft of sensitive user information.
这就使得黑客能更轻易的通过恶意软件暗中盗取用户信息或使用手机功能。
That makes it easier for hackers to create applications that surreptitiously spy on users or access phone functions without permission.
研究人员预测,这些猴子会避免从身着红色服装的测试人员那里盗取食物,事实证实了猜想。
Researchers predicted the monkeys would avoid stealing from the tester wearing red, and they were right.
研究人员预测,这些猴子会避免从身着红色服装的测试人员那里盗取食物,事实证实了猜想。
Researchers predicted the monkeys would avoid stealing from the tester wearing red, and they were right.
应用推荐