• Collecting evidence from compromised systems is the job of computer forensics experts, the Sherlock Holmes of the digital age.

    遭遇安全威胁系统中搜集证据计算机取证专家(数字时代福尔摩斯)的工作

    youdao

  • So far, RSA said it has only witnessed one instance of the attack and has seen no evidence that stolen credentials are being used to log in to compromised accounts in real time.

    幸运目前为止,RSA组织表示他们目击到类似的攻击而且也没有证据表明有犯罪分子使用这种被窃取的信用卡帐号登录网银系统

    youdao

  • Just over the course of a single academic term, procrastinating college students had such evidence of compromised immune systems as more colds and flu, more gastrointestinal problems.

    通过学期大学课程拖延的大学生的免疫系统明显受到威胁,会容易出现伤风,感冒以及肠胃问题。

    youdao

  • The levels below are based on the best available evidence, but are probably higher than the level at which the infant is compromised.

    血压水平以下基于现有最佳证据可能水平高的婴儿受到损害。

    youdao

  • Though Lulz made claims that it attacked the CIA website, there was no evidence that sensitive data in the agency's internal computer network had been compromised.

    虽然LulzSecurity声称他们中情局网站发动了攻击没有证据显示中央情报局内部电脑网络中的敏感资料被窃取。

    youdao

  • I have already described important structures of the kernel memory, so now we can use this knowledge to find evidence in the physical memory of the compromised machine.

    目前为止,已经所有内核进行内存管理重要数据结构介绍了一遍,接下来,我们就可以前面所讲的知识对目标计算机进行物理内存镜像的分析了。

    youdao

  • I have already described important structures of the kernel memory, so now we can use this knowledge to find evidence in the physical memory of the compromised machine.

    目前为止,已经所有内核进行内存管理重要数据结构介绍了一遍,接下来,我们就可以前面所讲的知识对目标计算机进行物理内存镜像的分析了。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定