英语人>网络例句>盗取 相关的搜索结果
网络例句

盗取

与 盗取 相关的网络例句 [注:此内容来源于网络,仅供参考]

The article designs and implements a tool of exploring the Word document's secrete infomati -on,this tool is mainly used in correlative department which need to check the Word document to prevent local sensetive infomati -on from purloining.

本文具体设计与实现的是一个Word文档隐秘信息探查工具,该探查工具主要应用于需要对从本地输出的Word 文档进行查看,防止本地敏感信息被非法盗取的企事业相关部门中。

Too frequently it is shovelled abroad by political leaders who have tapped treasuries, pocketed aid money and collected bribes.

更常见的原因是,贫困国那些盗取国家财富,将援助资金中饱私囊及收受贿赂的政治领导人纷纷将&逃离资本&收刮干净。

The year before last year will come in July in August, the name of net silver-colored Zhang that Cai Li uses purloin and password, adopt Zhang turns on the net, add up to the deposit of many depositor on more than yuan of 137 thousand bank card that turns to bridge, collect ready money.

前年7月至8月,蔡利用盗取的网银账号和密码,采取网上转账,将多名储户的存款共计13.7万余元转至梁的银行卡上,并提取现金。

While centaur are accomplished bowyers and fletchers, they haven't quite mastered the arts of working metal; thus, most metal weapons and armor among centaur are stolen from other races.

虽然半人马是熟练的制弓匠和造箭手,他们还没有完全掌握冶炼金属的技术;因此,半人马大多数的金属武器和铠甲都是从其他种族那里盗取的。

Austrian news agency APA quoted police investigator Gerald Hoebart as saying possible theft was being looked into since the younger woman appeared to have lived off her aunt's pension since the death and used her cashpoint card to withdraw money.

奥地利通讯社澳洲通讯社的报道引述一位警方调查人员的话称,那位较年轻的女子看起来是以她姑妈的养老金为生,有可能在其姑妈过世之后盗取她的信用卡取走现金供自己使用。

The applicant confessed that he stole a video camera from Floor Three and this corresponds with the testimony of Odagiri Yuko that she lost a video camera.

申请人招认时说他从三楼的楼宇盗取了一部摄录机,与小田切优子说她失去了一部摄录机相符。

Can detect and remove rootkits, mass-mailing worms, e-mail viruses, peer-to-peer viruses, Internet worms, file viruses, Trojans, stealth viruses, polymorphic viruses, bodiless viruses, macro viruses, MS Office viruses, script viruses, spyware, spybots, password stealers, keyloggers, paid dialers, adware, riskware, hacktools, backdoors, joke programs, malicious scripts and most other malware.

可以检测和删除的rootkit ,邮件群发蠕虫,电子邮件病毒,点对点病毒,互联网蠕虫病毒,文件病毒,木马,隐形病毒,多态病毒,脱胎病毒,宏病毒,病毒的MS Office ,脚本病毒,间谍软件, spybots ,密码盗取者,键盘记录程序,支付拨号,广告软件, riskware , hacktools ,后门,玩笑程序,恶意脚本和其他大多数恶意软件。

In addition, we proposed a new approach to implement a descrambler. The security problem of speech communication has always been a demanding problem in military and business areas. A common approach to realizing end-to-end security is the use of a scrambler. Most of the scramblers are based on the permutation of speech signals in the time domain and/or frequency domain. On the other hand, descramblers are used to eavesdrop information from scrambled speech signals. We treated the descrambling problem as a puzzle solving problem. Some speech signals were used to demonstrate the performance of the proposed methods.

接著我们将此演算法应用於语音通讯保密的语音解搅拌器上,语音通讯保密已经被广泛应用在军事与商业领域,一般的作法是将语音搅拌器使用在端点对端点的保密上,而大部分的语音搅拌器都是以时域与频域为基础来进行排列搅拌,另一方面语音解搅拌器也必须防止窃听者盗取搅拌后的语音讯号,在此实验上,我们将语音解搅拌的问题视为解拼图的问题,并且利用我们所提出的解拼图方法来实作其应用,最后我们采用一些范例来展示其结果。

In some mountainous countryside of China where the rivulets wander though,the stones on the river—related:lands have been rapt without restraint.

在一些水流流经的我国山区农村,河地上的石头被大肆盗取。这是否侵害了山民的合法权益?

The Jarawa are one of four ancient Negroid tribes barely surviving on the Andamans.

他透露,一些偷猎者盗取了加洛瓦人储藏起来的蜂蜜,并捣毁了储存蜂蜜用的雕刻容器。

第7/8页 首页 < 1 2 3 4 5 6 7 8 > 尾页
推荐网络例句

With Death guitarist Schuldiner adopting vocal duties, the band made a major impact on the scene.

随着死亡的吉他手Schuldiner接受主唱的职务,乐队在现实中树立了重要的影响。

But he could still end up breakfasting on Swiss-government issue muesli because all six are accused of nicking around 45 million pounds they should have paid to FIFA.

不过他最后仍有可能沦为瑞士政府&议事餐桌&上的一道早餐,因为这所有六个人都被指控把本应支付给国际足联的大约4500万英镑骗了个精光。

Closes the eye, the deep breathing, all no longer are the dreams as if......

关闭眼睛,深呼吸,一切不再是梦想,犹如。。。。。。