黑客
- 与 黑客 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
Juvenile delinquent hackers launch potent computer viruses.
少年黑客罪犯发出了威力巨大的计算机病毒。
-
To operate and compete effectively, hackers who want to lead collaborative projects have to learn how to recruit and energize effective communities of interest in the mode vaguely suggested by Kropotkin's ''principle of understanding''.
要有效的运作和竞争,想要领导协作性项目的黑客们不得不学会怎样按照Kropotkin的"共同理解的原则"里模糊地提出的模式、招募和激励活动中的相关社区。
-
Network and information security become to be more and more serious. All of the world are regarding the hurt aroused by hacker intrusion, information leakiness and virus flood as importance.
网络与信息安全问题已经日益突出,黑客入侵、信息泄密以及病毒泛滥所带来的危害引起了世界各地的高度重视。
-
There is no undocumented API to reverse engineer, no "leet" hacks, just the right things in the right places, at the right times.
没有未公开的API进行逆向工程,没有"利特"黑客,只是在正确的地方正确的事在适当的时候。
-
A rule that ass umption responsibility as long as a PIN is used should be established,with excep tions of too low degree safeguard of the software,prompt report of loss and heck ler' s attack.
应当设立私人密码一经使用即认为其进行了交易并应承担相应责任的原则,但应以软件密级程度过低、及时挂失或者系统遭黑客攻击为例外。
-
My home four mouth people:papa mama I and GG.I beat letter very fast,because I am a computer high hand,leven act as black guest.
我打字很快,因为我是电脑高手,我甚至还当过黑客呢。
-
But this kind of invasion cannot avoid the detection of IDS using the protocol analysis technology.(2) In the invasion activities of hackers using TCP, the actions about scanning and Denial of Service utilizing the three-handshake protocol are general. The characteristics of the actions are dynamic for its lie on a series of packets from beginning to end. So the IDS using the traditional pattern match technology cannot detect these actions effectively, but the IDS using the protocol analysis technology can do its.
2在利用TCP协议进行的黑客活动中,比较常用的是利用三次握手过程进行扫描行为和拒绝服务攻击,这类攻击的特征必须根据前后的一系列数据包才能确定,因此攻击特征具有动态性,很不适合于采用模式匹配作为信息检测技术的IDS,但协议分析技术可较为迅速地检测出这类攻击。
-
Such unknowns make it possible for seemingly long-gone data to turn up in a court under the order of a subpoena, or worse, in the hands of a hacker.
这种未知使看似已经消失的数据在法庭的命令传票下出现,或者更糟的是,出现在黑客手中。
-
Such unknowns make it possible for seemingly long-gone data to turn up in a court under the order of a subpoena, or worse, in the hands of a hacker. On August 13th, though, a team of computer scientists led by Roxana Geambasu of the University of Washington, Seattle will unveil to the 18th USENIX Security Symposium in Montreal an e-communications system that destroys messages soon after they have been sent.
这种未知性,使得很久以前的数据似乎很有可能随时被传上法庭,更糟糕的是落入黑客之手。8月13日,在蒙特利尔召开的第18届USENIX安全专题讨论会上,西雅图华盛顿大学以Roxana Geambasu为首的计算机科学小组将推出一套全新的电子通信系统,该系统能够在信息发送完后不久将其销毁。
-
Kaspersky Lab, a leading d EVE loper of secure content management systems, has detected a hacker attack on usa.kaspersky.com the official website of the company's US office.
领先的信息安全解决方案提供商--卡巴斯基实验室近日监测到针对我美国分公司官网usa.kaspersky.com进行的一次黑客攻击。
- 推荐网络例句
-
However, as the name(read-only memory)implies, CD disks cannot be written onorchanged in any way.
然而,正如其名字所指出的那样,CD盘不能写,也不能用任何方式改变其内容。
-
Galvanizes steel pallet is mainly export which suits standard packing of European Union, the North America. galvanizes steel pallet is suitable to heavy rack. Pallet surface can design plate type, corrugated and the gap form, satisfies the different requirements.
镀锌钢托盘多用于出口,替代木托盘,免薰蒸,符合欧盟、北美各国对出口货物包装材料的法令要求;喷涂钢托盘适用于重载上货架之用,托盘表面根据需要制作成平板状、波纹状及间隔形式,满足不同的使用要求。
-
A single payment file can be uploaded from an ERP system to effect all pan-China RMB payments and overseas payments in all currencies.
付款指令文件可从您的 ERP 系统上传到我们的电子银行系统来只是国内及对海外各种币种付款。