随着技术的进步,黑客的攻击手段也在不断更新。
As with progress of technology, measures of hacker's attack also renew continuously.
在该系统中,研究人员可以模拟外国势力和黑客的攻击。
The system will allow researchers to simulate attacks by foreign powers and from hackers.
安全管理问题:在安全管理方面还存在很大隐患,普遍难以抵御黑客的攻击。
Safety control question: generally speaking, the very big hidden danger in the safety control aspect makes it difficult to resist hacker's attack.
安全公司麦咖啡最近发现在2010年世界上十个国家中有八个的重要网络收到了黑客的攻击。
Security firm MacAfee recently found that eight out of 10 countries around the world had had critical networks targeted by hackers during 2010.
电子邮件系统既要防止黑客的攻击,还要防止垃圾邮件泛滥,同时要避免敏感邮件资料内容的泄漏。
The E-Mail system should prevent the hacker's attack, will prevent the junk email from overflowing, avoid the letting out of materials content of the sensitive mail at the same time.
第二,当人们在网上付款时,他们有可能会泄露信息,网上的账号会遭到黑客的攻击,导致失去金钱。
Second, when people pay the money online, they will have the chance to leak out their message, their online account will be attacked by the hackers and thus to lose the money.
他们很可能成为黑客的攻击目标。攻击手段包括伪装成受害者认识的人,通过电子邮件向其发送恶意软件。
They could be targeted by a hacker who could takes steps, including sending malicious software in an email, that appears to come from someone the victim knows.
是转移到HASP SRM的时候了-因为您使用的安全产品越旧,您的产品就越容易受到黑客的攻击。
It's time to move up to HASP SRM-because the longer you use an aging security product, the more vulnerable you are to hackers.
他们很可能成为黑客的攻击目标。 攻击手段包括伪装成受害者认识的人,通过电子邮件向其发送恶意软件。
They could be targetedby hacker who could takes steps, including sending malicious software in an email that appears tocome from someone the victim knows.
但是,高校校园网具有互联性、开放性、共享性等特点,具有众多的不安全因素,如网络病毒、黑客的攻击等。
But, it has not only its own features, such as interconnected, openning, sharing information, etc. also lots of unsafety factors, such as network virus, hacker attack, ect. exist.
但是,如果经营体制,标志着互联网通信缓冲区的记忆,因为只有被有效遏制数据,而不是代码,黑客的攻击将不会得开始。
But if the operating system has marked that Internet communications buffer region of memory as only being valid for containing data and NOT code, the hacker's attack will never get started.
鉴于电脑黑客的攻击能力不断加强,如图8所示的运行时变种1是适合于直接集成单通道应用程序模式的一种值得推荐的模式。
Given the proliferation of hacker attacks, Run-time Variation 1, shown in Figure 8, is the recommended pattern for the Directly Integrated Single Channel application pattern.
因为因特网电话是以软件为基础的,所以它不可避免会受到黑客的攻击,而且它为黑客提供的这条通道极有可能会产生严重后果。
Because Internet telephony is software based it's vulnerable to hacking and it offers a way in for attackers with potentially serious consequences.
索尼已开始恢复旗下网络平台PlayStation Net work。上月,这个平台遭到了黑客的攻击,约1亿用户信息泄露。
Sony began to restore its PlayStation Network after hackers breached its security, compromising the personal information of 100m users last month.
招聘网站频频受到黑客的攻击,或遭受通过电子邮件“网络钓鱼”的攻击,因为它们为那些对身份盗窃感兴趣的人提供了丰富的数据资源。
Job sites are regularly attacked by hackers and via email "phishing" attacks, as they provide a rich source of data for those interested in identity theft.
黑客攻击过去通常指怪异的大学生在卧室里敲着键盘使用电脑来骚扰他们的长辈。
Hacking used to be about geeky college kids tapping away in their bedrooms to annoy their elders.
Target和Neiman 的黑客攻击也改变了成本计算:尽管零售商不愿意花那6美元。
The Target and Neiman hacks have also changed the cost calculation: Although retailers have been reluctant to spend the $6.
除非这些系统有足够的安全保护,否则物联网很容易成为黑客攻击的新目标。
Unless these systems have adequate security protection, the internet of things could easily become the internet of new things to be hacked.
中国也是黑客攻击的受害者。
有一个是安全:此类系统易受各式各样的黑客攻击。
One is security: such systems will be vulnerable to all sorts of hacker attacks.
2010年,更多的黑客将攻击互联网,因为越来越多的关键基础设施如电网将实现网络互连。
In 2010, more hackers will be attacking the Internet because more critical infrastructure like the electric grid will be online.
软件也是一样的道理:复杂的代码会给黑客或攻击者创造更多的机会。
Software is the same: complex code creates more opportunities for hackers and attackers.
但是,即便这样仍无法使他能够泰然接受某些事情:由于担心遭到黑客攻击的风险,他没有开设任何网上银行帐户。
Even this, however, does not give him enough comfort for some things: he does not have an online banking account because of his concern about hacking risk.
据分析人士表示,这就增加了黑客对准富人攻击的几率。
According to analysts, it raises the prospect of hackers targeting wealthy individuals.
这篇文章包含一些关于如果还处理黑客攻击的详情。
This article contains more details on how to deal with hacking.
本节描述了攻击者或者黑客可以使用的潜在的安全攻击方法。
This section describes potential security attack methods from an attacker or hacker.
媒体公司只关注那些攻击计算机系统的黑客,而往往忽视那些计算机的保卫者,所以有些人就使用术语“黑客”表示只进行攻击的黑客。
Media companies only concentrate on the hackers who attack computer systems rather than the defenders, so some people use the term "hacker" to mean only attacking hackers.
最近爆发的几起重大数据失窃事件,就是电子邮件和数据系统等网络应用程序遭受黑客攻击的结果。
Yet, most of the major data breaches in recent news have been the result of attacks on Web apps like email and data systems.
最近爆发的几起重大数据失窃事件,就是电子邮件和数据系统等网络应用程序遭受黑客攻击的结果。
Yet, most of the major data breaches in recent news have been the result of attacks on Web apps like email and data systems.
应用推荐