竊取 的英文怎麼說

中文拼音 [qiè]
竊取 英文
usurp; steal; grab
  • : Ⅰ動詞(偷) steal; pilfer Ⅱ副詞(暗中; 偷偷 地) secretly; surreptitiously; furtively Ⅲ代詞[書面語] (謙指自已) i
  • : Ⅰ動詞1 (拿到身邊) take; get; fetch 2 (得到; 招致) aim at; seek 3 (採取; 選取) adopt; assume...
  1. Bolero is a joint project, aimed at the use of e - b / l

    目前國際黑客對各國計算機系統中高度敏感保密信息的攻擊和竊取正在日益上升。
  2. In my opinion, sun probably took this approach so that someone couldn t walk off with the javamail reference implementation that had many developers working on it transcribing public domain rfcs until the early hours of the morning and make boatloads of cash with it

    我認為, sun採這種方法的目的很可能是使其他人無法竊取javamail參考實現(曾有許多開發人員通宵達旦地將其轉錄到不受版權限制的rfc中)並籍此謀利。
  3. Digital signature operates the born and a series of sign and codes to constitute the electronics password to carry on the signature through a certain password, replace to the writing signature or an official seals, to confirm the body, the data source and integrities of signs, keeping data from burglarize to take, distort and break, thus to attain the purpose of protecting the data

    數字簽名是通過某種密碼運算生成一系列符號及代碼組成電子密碼進行簽名,來代替書寫簽名或印章,確認簽名者的身份、數據來源和完整性,防止數據被竊取、篡改和破壞,從而達到保護數據的目的。
  4. A small cabal of politicians almost certainly stole the result by fraud ( see article )

    一個政客小集團通過欺騙幾乎完全竊取了勝利果實。
  5. Now, agent one believed that there was a plot to steal the crown jewels

    一號特工確信有人想竊取王冠
  6. It is ( a ) sacrilege to steal a crucifix from an altar

    從聖壇竊取耶穌受難像是褻瀆神靈的行為
  7. Answer : point to it is a purpose with detinue, take state - private property amount secretly bigger, or for many times secret filch is state - private the behavior of property

    答:指以非法佔有為目的,秘密公私財物數額較大,或者多次秘密竊取公私財物的行為。
  8. With the rapidly development of computer network technology and the widely use of network technology in every walk of life, people transmit data through computer network more and more frequently, including all kinds of secret information ( for example, military secret ; bussiness secret ; personal private information ). today, as a result of poor security of our network system, we can not prevent the transmittied information from stealing and modifying unlawful. thus, the computer network technology is applied to our daily life restrictedly. recently, many network applications with voip ( for example msn messenger ; dialpad ; distributed multipoint multimedia conferences ) take no measures to encrypt their data

    隨著計算機網路技術的迅猛發展和網路技術在各行各業中的廣泛應用,人們通過計算機網路傳輸數據日益增加,其中包含了各種機密信息(例如軍事機密信息、商業機密信息、個人隱私信息等) 。由於目前的網路系統缺乏足夠的安全性,不能有效防止網路上所傳輸的信息被非法竊取和修改,因而極大地限制了計算機網路技術在日常工作中的應用。當前,基於voip技術的各種網路應用,如msnmessenger , dialpad ,以及一些分散式多媒體會議系統,竟然未採任何加密措施
  9. Guarantees that the data passed between the requester and provider is protected from eavesdroppers

    保證請求方和提供方之間傳輸的數據不會被聽者竊取
  10. And although there are allegations in the redacted report that classified information may have been obtained by the prc during previous administrations, the evidence that is presented with respect to those allegations is actually exculpatory

    盡管報告中稱在前幾任政府期間,中國可能從美國竊取了一些情報,但是與之相關的論點實際上成了為中國的開脫之辭。
  11. Indicted for high security code infiltration,

    竊取絕密安全代碼和別人的id
  12. Indicted for high - security code infiltration

    竊取絕密安全代碼而被指控
  13. The act of stealing iou and its nature determination

    竊取借條行為之定性
  14. He added that any possible frauds, misfeasance and theft by either employers or employees would be referred to police for investigations

    他補充說,任何僱主或員工如涉及詐騙、不適當地使用及竊取破產欠薪保障基金,均會由警方跟進調查。
  15. Now drawn to outland, many ethereals are seeking to track down its treasures and steal them back into the twisting nether

    許多虛空幽客來到了外域貪婪地尋找並竊取這個世界的珍寶企圖帶回扭曲的虛空之中。
  16. Those data, which are stored in plain text and are even protected by passwords and firewalls and intrusion detection systems, are easily filched, peculated and destroyed

    以明文形式存放的數據,即使置於口令、防火墻和入侵檢測系統的保護之下,也很容易被竊取、盜用和破壞。
  17. Among all the techniques and methods protecting data, it is the most practicable to encrypt data and store encrypted data, because even if encrypted data are filched, copied, or peculated, attackers are incapable of understanding these data in that they are incapable of decrypting these data

    在目前的技術條件下,保護數據和信息最行之有效的方法就是將它們加密后再存儲在數據庫中,因為加了密的數據和信息,即使被竊取、被拷貝、被截獲,獲者因無法破解竊取的密文而無從知曉它們對應的機密數據。
  18. Often, a bony, lanky black spider will crawl around your web site, wiggle its little feet in excitement, gather up your e - mail address and store it near its pinchers

    通常,一隻瘦長的「黑蜘蛛」會在網站周圍徘徊,興奮地揮舞著腿腳,竊取你的電子郵箱地址。
  19. The law protects trade secrets from wrongful appropriation

    法律保護商業秘密不被非法竊取
  20. A thief brazenly stealing a pistol from a display case at an elvis exhibit at presley ' s graceland estate

    一名小偷「光明正大」地在貓王埃爾維斯?普雷斯利博物館的展櫃中竊取了一把手槍。
分享友人