黑客的攻击可能使系统瘫痪。
Thirdly, the attack from hack may lead to database system paralysis.
但是想完全阻止黑客的攻击是不可能的。
To completely prevent attacks sounds just like walking on water.
随着技术的进步,黑客的攻击手段也在不断更新。
As with progress of technology, measures of hacker's attack also renew continuously.
在该系统中,研究人员可以模拟外国势力和黑客的攻击。
The system will allow researchers to simulate attacks by foreign powers and from hackers.
安全管理问题:在安全管理方面还存在很大隐患,普遍难以抵御黑客的攻击。
Safety control question: generally speaking, the very big hidden danger in the safety control aspect makes it difficult to resist hacker's attack.
安全公司麦咖啡最近发现在2010年世界上十个国家中有八个的重要网络收到了黑客的攻击。
Security firm MacAfee recently found that eight out of 10 countries around the world had had critical networks targeted by hackers during 2010.
电子邮件系统既要防止黑客的攻击,还要防止垃圾邮件泛滥,同时要避免敏感邮件资料内容的泄漏。
The E-Mail system should prevent the hacker's attack, will prevent the junk email from overflowing, avoid the letting out of materials content of the sensitive mail at the same time.
第二,当人们在网上付款时,他们有可能会泄露信息,网上的账号会遭到黑客的攻击,导致失去金钱。
Second, when people pay the money online, they will have the chance to leak out their message, their online account will be attacked by the hackers and thus to lose the money.
他们很可能成为黑客的攻击目标。攻击手段包括伪装成受害者认识的人,通过电子邮件向其发送恶意软件。
They could be targeted by a hacker who could takes steps, including sending malicious software in an email, that appears to come from someone the victim knows.
是转移到HASP SRM的时候了-因为您使用的安全产品越旧,您的产品就越容易受到黑客的攻击。
It's time to move up to HASP SRM-because the longer you use an aging security product, the more vulnerable you are to hackers.
他们很可能成为黑客的攻击目标。 攻击手段包括伪装成受害者认识的人,通过电子邮件向其发送恶意软件。
They could be targetedby hacker who could takes steps, including sending malicious software in an email that appears tocome from someone the victim knows.
但是,高校校园网具有互联性、开放性、共享性等特点,具有众多的不安全因素,如网络病毒、黑客的攻击等。
But, it has not only its own features, such as interconnected, openning, sharing information, etc. also lots of unsafety factors, such as network virus, hacker attack, ect. exist.
但是,如果经营体制,标志着互联网通信缓冲区的记忆,因为只有被有效遏制数据,而不是代码,黑客的攻击将不会得开始。
But if the operating system has marked that Internet communications buffer region of memory as only being valid for containing data and NOT code, the hacker's attack will never get started.
鉴于电脑黑客的攻击能力不断加强,如图8所示的运行时变种1是适合于直接集成单通道应用程序模式的一种值得推荐的模式。
Given the proliferation of hacker attacks, Run-time Variation 1, shown in Figure 8, is the recommended pattern for the Directly Integrated Single Channel application pattern.
因为因特网电话是以软件为基础的,所以它不可避免会受到黑客的攻击,而且它为黑客提供的这条通道极有可能会产生严重后果。
Because Internet telephony is software based it's vulnerable to hacking and it offers a way in for attackers with potentially serious consequences.
索尼已开始恢复旗下网络平台PlayStation Net work。上月,这个平台遭到了黑客的攻击,约1亿用户信息泄露。
Sony began to restore its PlayStation Network after hackers breached its security, compromising the personal information of 100m users last month.
招聘网站频频受到黑客的攻击,或遭受通过电子邮件“网络钓鱼”的攻击,因为它们为那些对身份盗窃感兴趣的人提供了丰富的数据资源。
Job sites are regularly attacked by hackers and via email "phishing" attacks, as they provide a rich source of data for those interested in identity theft.
黑客攻击过去通常指怪异的大学生在卧室里敲着键盘使用电脑来骚扰他们的长辈。
Hacking used to be about geeky college kids tapping away in their bedrooms to annoy their elders.
目标已被集体行动击中,这些行动来自被黑客攻击的消费者。
Target has been hit with class actions from hacked consumers.
Target和Neiman 的黑客攻击也改变了成本计算:尽管零售商不愿意花那6美元。
The Target and Neiman hacks have also changed the cost calculation: Although retailers have been reluctant to spend the $6.
除非这些系统有足够的安全保护,否则物联网很容易成为黑客攻击的新目标。
Unless these systems have adequate security protection, the internet of things could easily become the internet of new things to be hacked.
中国也是黑客攻击的受害者。
有一个是安全:此类系统易受各式各样的黑客攻击。
One is security: such systems will be vulnerable to all sorts of hacker attacks.
2010年,更多的黑客将攻击互联网,因为越来越多的关键基础设施如电网将实现网络互连。
In 2010, more hackers will be attacking the Internet because more critical infrastructure like the electric grid will be online.
我们的主页被黑客攻击了。
据分析人士表示,这就增加了黑客对准富人攻击的几率。
According to analysts, it raises the prospect of hackers targeting wealthy individuals.
这篇文章包含一些关于如果还处理黑客攻击的详情。
This article contains more details on how to deal with hacking.
这篇文章包含一些关于如果还处理黑客攻击的详情。
This article contains more details on how to deal with hacking.
应用推荐