Intruders might invade your systems for one of two reasons: to gain access to information that they should not have or to alter the behavior of a system.
入侵者入侵您的系统可能是出于这两个原因之一:为了获取他们本不应该拥有的信息,或者为了改变系统的行为。
Intruders may be after your systems for one of two reasons: to gain access to information that they should not have, or to alter the behavior of a system in some way.
入侵者可能为了两个原因之一而入侵您的系统:为了获取他们本不应该拥有的信息,或者为了以某种方式改变系统的正常运行状况。
Anyone familiar with the necessary procedure can gain access to information stored in the computer, no matter how confidential, and use it for his own purposes.
无论保密程度有多么高,任何熟悉必要程序的人都可获取贮存于电脑中的信息并利用它达到自己的目的。
Intruders might be after your systems for one of two reasons: to gain access to information that they should not have, or to alter the behavior of a system in some way.
入侵者可能出于两个原因之一入侵您的系统:为了获取他们本不应该拥有的信息,或者为了以某种方式改变系统的正常行为。
And this one, the scam artist tries to gain access to information like your bank account or social security number, and you may be ask to pay a fee, even to be considered for a job.
这个骗子试图获得你的银行卡账号或者社保号码等信息,你可能会被考虑支付费用,甚至可能会考虑为你提供一份工作。
Decisions are based on both private and public information, but as access to information becomes easier, the opportunity to gain a competitive advantage from that data diminishes.
人们做出决策往往是以个人和公共信息为基础的,但是如果更便捷得到信息渠道的话,那么从资料中得到有竞争力信息的机会就减小了。
That is, by tricking the human beings that work for your organization, attackers are able to gain access to systems and information to which they should not have access.
也就是说,通过欺骗在您的组织中工作的人员,攻击者可以获得权限以访问他们本不应该访问的系统和信息。
After discovery of the data source, the next step is to gain access to the information.
在发现数据源以后,下一步是获得对该信息的访问权限。
That is, attackers are often able to gain access to systems and information to which they should not have access by tricking the human beings that work for an organization.
也就是说,通过欺骗在组织中工作的人员,攻击者可以获得权限以访问他们本不应该访问的系统和信息。
The application's ultimate goal is for the user to gain access to personal information hosted in different locations, all displayed using a calendar-based interface.
这个应用程序的最终目标是,用户可以访问不同位置上的个人信息,这些信息都是使用基于日历的界面显示的。
It's an ideal target for identity thieves, who could use it to obtain more information about you and potentially gain access to your bank or credit card account.
如果你留下了真实的出生年月日,帐户盗贼就有可能根据那个掌握更多你的个人信息,还有可能侵入你的银行帐户或信用卡帐户。
He said "no one has been able to take control of the iPhone to gain access to personal information using this exploit."
他说,到目前为止还没有人能利用这一漏洞控制iPhone,获知用户的个人信息。
It allows end users and applications to gain secure access to any information source, regardless of where it resides.
它使最终用户和应用程序可以获得对任何信息源的安全访问,不管它在什么地方。
If your site serves tons of information you will want your users to gain access to it at the most fastest and fewest clicks.
如果网站提供大量信息,确保用户以最快的方式获得信息,不能立即呈现的信息就是无用的信息。
A unique string of characters input by an authorized user in order to gain access to a system or to protected information in the system.
被授权的用户为取得对系统或系统中被保护的信息的存取权而输入给系统的专门的字符串。
What do you think – should we continue trying so hard to gain more access to information?
你怎么想——我们是否应该继续在获取更多的信息上下这么大力气?
Information that is confidential in nature or is subject to any form of legal protection requires the compulsive nature of the mutual legal assistance process to gain access to it.
一些本身被列为机密,又或受不同形式的法律保护而须保密的资料,便需借助相互法律协助程序的强制特性才可取得。
Unlike the bulk of people who are living in the virtual world, these hackers seek to gain access to the personal and private information that one has stored on their computer.
有别于大部分人生活在虚拟世界,这些黑客设法获取个人和私人资料储存在一个电脑。
Hackers masquerading as internal users can take advantage of weak internal security to gain access to confidential information.
伪装成内部用户的黑客们会利用脆弱的内部安全来获取机密信息。
You may overhear a conversation, gain access to private or personal information, or become clued in some other surprising way.
你可能无意中听到别人的谈话,获取些私人信息,又或以其他令人惊奇的方式传达的信息。
For example, some drivers use a memory handle for the identifier to gain quick access to memory containing information about the given instance.
例如,有些驱动程序使用内存句柄做标识以便能快速访问到包含有给定驱动实例的内存信息。
The attack was unsuccessful and despite their attempts the hackers were unable to gain access to restricted information stored on the website.
虽然参与攻击的黑客宣称已经获取到重要数据,但实际情况确是黑客们根本没有寻找到“进入网站上受限制信息储存区域的权限”。
The attack was unsuccessful and, despite their attempts, the hackers were unable to gain access to restricted information stored on the website.
尽管黑客们进行了多次尝试,但是攻击还是没有成功,无法获得进入网站上受限制信息储存区域的权限。
No longer will Terra allow any other creation to strip her music; nor will she allow duplication or mimicking to gain access to her field to strip her of other information necessary to ascend.
而Terra既不会再允许其它任何创造物剥夺她的音乐,也不会允许他们通过复制、模仿音乐而进入自己的场中来剥夺提升所需要的信息。
No longer will Terra allow any other creation to strip her music; nor will she allow duplication or mimicking to gain access to her field to strip her of other information necessary to ascend.
而Terra既不会再允许其它任何创造物剥夺她的音乐,也不会允许他们通过复制、模仿音乐而进入自己的场中来剥夺提升所需要的信息。
应用推荐