盜用者 的英文怎麼說
中文拼音 [dàoyòngzhě]
盜用者
英文
embezzler-
Microdot technology and signs warning it is in use have scared off raiders from council gardens
微粒科技和標志在於警告嚇跑盜樹者,議會花園的植物有使用此項技術。Some car park management staff recorded id card numbers of car park space users for the purpose of preventing crime such as car theft
一些停車場管理公司的職員,為了防止例如車輛盜竊等罪案,會記錄停車場使用者的身分證號碼。The expression "social engineering" has been usurped by the utopianist without a shadow of light.
「社會工程」這個詞已被烏托邦主義者毫無理由地盜用了。Pay tv signal piracy still remains rampant despite efforts have been made by the law enforcers in trying to clamp down illegal decoders and by the industry in regularly using new technical solutions to combat piracy
雖然執法者已經不遺餘力遏制非法售賣收費電視解碼器,而業界亦不時使用新的技術程式以阻礙盜版活動的進行,但是收費電視信號的盜用情況仍然猖獗。This new consumer action publication explains how to recognize and avoid many forms of fraud that involve credit cards, such as skimming, phishing, id theft and counterfeit cards
這本消費者行動最新發行的手冊提醒大家認明及避免形形色色有關信用卡之詐騙,例如:仿製信用卡、假冒騙取信用卡、身份盜用、偽造信用卡等等。As long as consumers are not held responsible for fraudulent transactions, and they can still use other convenient means of payment and obtaining credit, there seems to be no good reason for the official sector to intervene. in any case, in the credit card business, most, if not all, of the key parties are not subject to any existing system of regulation
只要消費者無需對不法分子以盜用資料進行的交易負責,並且仍然可以利用其他方便的途徑付款以及獲取信貸,監管機構看來沒有理由要插手,反正信用卡業務的主要參與者絕大部分都不受任何現行的監管制度約束。Use dhs and cbp methods outlined above to make it more costly for violators by tacking down illicit financial gains as well as exposing counterfeit and piracy businesses practices
利用上文提到的國土安全部及海關與邊境保護局所採用的方式,通過追查非法所得及揭露偽冒和盜版者的所作所為,讓侵權者付出更高的代價。The vtt technical research center of finland said the device, which is has patented but has yet to sell, could prevent millions of portable appliances being stolen every year
該中心指出在一份聲明中表明: 「這種防盜裝置配有可以準確識別使用者步態特徵的傳感器。The gadget would monitor the user ' s walking style and check it against the saved information. if the values differ, the user would have to enter a password
研究人員介紹說,一旦發現使用者的步態與原來的不同,防盜裝置將會要求使用者輸入密碼,若密碼再發生錯誤,機器將自動關閉。These digital media including images, characters, audio and video digitalized works are easy to store, design, transmit and duplicate, and accelerate communication and transmission of knowledge and information. while it offered convenience to some illegal persons who can distort, attack and pirate the achievement maliciously at the same time
這些數字化的圖形、文字以及音頻、視頻作品的易存儲加工、易傳輸復制的優點加快了知識與信息的交流與傳播,但同時也為一些非法者提供了惡意篡改、攻擊、盜用他人勞動成果的便利條件。Easy - to - operate : sound to inform the locking and setting status so as to be more simple and clear for the driver
易操作:防盜鎖上鎖與設定以聲響告知,讓使用者更加簡單明了。We look to hong kong to sustain the pace of its enforcement activities aimed at local producers and vendors of infringing products, to work with us to develop the means to combat the growing challenge of internat piracy, and to maintain its efforts against end - use piracy and the cross - boundary flow of infringing products
我們希望香港繼續打擊本地非法產品的製造和銷售活動;美港合作,找到途徑以對付日益嚴重的網際網路盜版行為;同時繼續展開針對使用者盜版行為及非法產品的跨境流通的執法活動。Pirates now masquerade as international firms and use mislabeling, counterfeit trademarks, direct mail, television and the internet to reach consumers
盜版者如今裝扮成跨國公司,使用內容虛假的標簽、偽造的商標、直郵、電視、因特網等手段出現在消費者面前。We implemented and improved the license management system for the operation of telecommunications services, the network access of telecommunications equipment and the philatelic market, and harshly cracked down on the illegal activities such as the telephone number - associated fraud and unauthorized use of international dedicated lines to operate international telephone services in order to safeguard the state interests and the legitimate rights of the consumers
我們根據市場的需要實行和完善了對經營電信業務、電信設備進網和集郵市場的許可證管理制度;配合有關部門嚴厲打擊盜用電信碼號和非法利用國際專線經營國際電話業務等違法行為,維護國家利益和消費者合法權益。In this surreal crime thriller, miyamoto, aka " returner " takeshi kaneshiro, is sent on a mission in the yokohama underworld
"宮本是一個" returner " ,職責是替聘用者潛入黑市盜取大筆大筆無跡可尋的鉅款。With respect to units without qualifications for hosting or sponsoring foreign economic and technological exhibitions holding exhibitions without authorization, or usurping the name of another unit in the holding of exhibitions, the competent departments of foreign trade and economic cooperation and organs of industry and commerce administration at all levels shall investigate and handle the cases according to law
對不具備主辦或承辦對外經濟技術展覽會資格而擅自辦展的,或者盜用其他單位名稱辦展的,由各級外經貿主管部門和工商行政管理機關依法查處。Doyouhike and the relevant author reserve the right to take any legal action necessary against those unauthorized use of articles on doyouhike
擅自盜用磨房上的文章,磨房和作者將保留追究法律責任的權利。Uncovering the mystery of the tomb raiders reveals the extent to which ancient pharaohs used clever technology to outsmart some of egypt ' s greatest criminal minds
盜墓者謎團的解開顯示了,在一定程度上,古代法老使用聰明的伎倆要比古埃及一些最偉大的犯罪頭腦略勝一籌Not one of the three could have said, from anything he saw, what either of the other two was like ; and each was hidden under almost as many wrappers from the eyes of the mind, as from the eyes of the body, of his two companions
三個人都用盡多的障礙包裹住自己,不讓同路人心靈的眼睛和肉體的眼睛看出自己的形跡。那時的旅客都很警惕,從不輕易對人推心置腹,因為路上的人誰都可能是強盜或者跟強盜有勾結。In our programme, when this conditions happen, we will run continue, but run wrong algorithms. that will waste much time and money of the pirate maker and users. help laws prevent pirate
我們的思路是即使發現是盜版軟體,程序仍正常運行,只不過執行錯誤的演算法,使得盜版者還有盜版軟體的使用者,無論金錢還是時間都是很大浪費。分享友人