非法入侵 的英文怎麼說

中文拼音 [fēiqīn]
非法入侵 英文
illegal intruding
  • : Ⅰ名詞1 (錯誤) mistake; wrong; errors 2 (指非洲) short for africa 3 (姓氏) a surname Ⅱ動詞1 ...
  • : Ⅰ名詞1 (由國家制定或認可的行為規則的總稱) law 2 (方法; 方式) way; method; mode; means 3 (標...
  • : Ⅰ動詞1 (進來或進去) enter 2 (參加) join; be admitted into; become a member of 3 (合乎) conf...
  • : Ⅰ動詞(侵入) invade; intrude into; infringe upon Ⅱ形容詞(接近) approaching Ⅲ名詞(姓氏) a surname
  • 非法 : illegal; unlawful; illicit
  1. Iran's role in western strategy was to pose a barrier to soviet encroachment that could not be surmounted short of all-out invasion.

    伊朗在西方戰略中的作用是對蘇聯的犯構成一道屏障,除全力,否則無逾越。
  2. Vernon dersley : i demand that you leave at once. you are breaking and entering

    弗農?德思禮:我要你立刻離開,先生。你這是民宅。
  3. A conclusion can be drawn that the land market in the rural area and the urban area in our country are dissevered by the faulty land right system and the binary economic structure engendered due to the history cause. such land institution lead to many problems in the land resource allocation. firstly, the land in the rural area should shift, in order to meet the need of the urbanization, the development of the group enterprise and the change of labor structure in the rural area, but there are obstructions in the legal system, which lead to farmland and construction land shifting illegally

    在這種制度安排下導致我國土地資源配置中出現諸多問題:城市化的發展、鄉鎮企業發展以及農村勞動力結構變化都要求農村土地市,但是律上卻存在著障礙從而導致農地農化和建設用地自發交易;在不完全的土地產權體系中農村集體和農戶利益受到害;國家利益隨著劃撥土地市而大量流失;在割裂的土地市場制度下土地價格體系也出現城鄉割裂,農村集體土地不論是農用地還是農用地的價格都未得到科學的界定和規范。
  4. Why is internet so frangible ? after analyzing many events of network attacks and invalid intrusions, we found that the frangibility of internet is due to lack of the firewall to protect the network security

    造成internet網路不安全局面的原因很多,網路攻擊和非法入侵的手段也很多,但是究其根本原因,是缺乏一個能保證網路高度安全的防火墻。
  5. Unlawful incursion has been threatening the safety of computer network system

    摘要非法入侵一直威脅著計算機網路系統的安全。
  6. Crime of unlawful invasion into and destruction of information system of computer have been regulated respectively in section 285 and 286 of chinese criminal code. but convictions are very few in our present adjudication practice, which plays an inharmonious notes in comparison to current computer crimes and relative research waves pushed forward by scholars

    我國刑第285條、第286條規定了計算機信息系統罪和破壞計算機信息系統罪,但是國內對此兩罪的司判決卻常少見,這與計算機犯罪的現狀和學界對計算機犯罪的研究熱潮是不協調的。
  7. Another drug might incapacitate the mechanisms the bacteria use to divert lipids from the host cell to the chlamydial vacuole, halting the trespassers ' ability to hide

    另一種藥物,則是造成披衣菌挪用宿主細胞脂質的機制失效,使得這些非法入侵者無藏匿。
  8. In doing this it may change the state of the incoming or outgoing traffic to hide the identity of machines or prevent unauthorized access

    在執行過程中,它可能會改變輸或輸數據流的狀態,以此隱藏機器的具體信息或防止非法入侵
  9. With the evolution of network technologyjnternet takes more and more great part in our life. in the same time, the security of network become the focus of people. the traditonal method used for defence is adopt as strategy of prohibit, such as firewall, encrypt, access control, security system e. t. these methods all have some impact on defence, but from the view of system security management. but they are not enough only for defence. intrusion detection system can detect outside attack or misuse, it is an kind of logical compensation for defence

    隨著網路技術的迅速發展,網路日益成為人們生活的重要部分,與此同時,黑客頻頻網路,網路安全問題成為人們關注的焦點,傳統安全方是採用盡可能多的禁止策略來進行防禦。目前採用的手段有防火墻、加密、身份認證、訪問控制、安全操作系統等,這些對系統非法入侵都起到一定的作用。然而從系統安全管理角度來說,僅有防禦是不夠的,還應採取主動策略。
  10. Criminal trespassing, reckless endangerment.

    非法入侵,蓄意毀壞財物
  11. Criminal trespassing, reckless endangerment

    非法入侵,蓄意毀壞財物
  12. Archive the data and store it offline, limiting the amount of data that can be compromised if your webserver is breached

    將他們放在一個離線的機器上作為存檔,並對這些數據的數量做一個限制防止萬一這些機器被非法入侵
  13. By september 2004 mr annan was openly calling the invasion of iraq illegal, which in turn provoked complaints from republicans that he was trying to influence that year ' s american presidential election

    2004 . 9安南公開宣稱美國非法入侵伊拉克,此舉招致共和黨人的不滿,他們斥責安南意圖干涉當年的總統大選。
  14. Hack the planet this programme surveys the world of hacking, from the basic methods employed by hackers, the safety of on - line shopping, to hackers with ethical and consumer concerns

    本節目將介紹非法入侵電腦這圈子的世界,包括駭客使用的基本方,網上購物的安全,亦將討論有關于關注道德及消費者的駭客這問題。
  15. For the moment, how to prevent network system from illegal attack and destruction, how to protect confidential data from been filched - network security - is becoming more and more important

    但是,如何防止網路系統遭到未授權的非法入侵和破壞,如何保護機要、敏感數據不被竊取或復制,仍是網路安全中的重要問題。
  16. Recent years, more than 60 % user networks have been inbreaked. the computer networks have the great risk. the desire of the networks for different type of users is different

    近十年來,由於計算機系統遭到破壞所造成的損失逐年急劇上升,世界上逾六成的用戶曾遭各種非法入侵,計算機網路信息系統存在著極大的風險。
  17. Integer solution of government networks security aiming at hidden trouble of network security is studied thoroughly in this paper, such as host computer of government network may be attacked by illegal in break, sensitivity data may be revealed or modified, information of intranet to internet may be wiretapped or tampered, etc. firstly, the security of government network, consisting of security analysis of risk, requirement, strategy and target of government are analyzed

    本文針對電子政務系統網路中的主機可能會受到非法入侵者的攻擊,網路中的敏感數據有可能泄露或被修改,從內部網向公網傳送的信息可能被他人竊聽或篡改、系統工作效率可能受到嚴重影響等安全隱患,對電子政務系統網路安全整體解決方案進行了深研究。
  18. In the face of network attacks, virus attacks and malicious threats, how to make the electronic information network systems can not be the illegally invasioned, keep the data secure and protect the safe operation of network equipment, has become an issue in hand

    面對網路攻擊、病毒襲和人為破壞等各種威脅,如何使電子政務信息網路系統不被非法入侵,保護數據安全和網路設備的安全運行,成為一個亟待解決的問題。
  19. Static security techniques work on preventing invalid access of system, but they probably bring unknown loss when genuine network attacks occur, especially novel network attacks

    靜態安全技術對防止系統非法入侵起到了一定作用,但在真正的網路攻擊行為發生時,尤其是在遭受新型的網路攻擊方攻擊時,系統可能會遭受到不可預料的損失。
  20. At present, the public security and traffic police computer network ’ s main technical measures taken to deal with the network security are the firewall, the security route, cryptographic application and etc. they are useful to prevent the unauthorized access to some extent, but the main hidden defect of public security and traffic police network is from the authorized users ’ mistake or vicious operation

    目前,公安交警計算機網路解決網路安全主要採取的技術手段有防火墻、安全路由器、加密應用等。它們對防止系統非法入侵有一定的效果。而交警網路的主要安全隱患是來自內部合用戶的誤操作或惡意操作。
分享友人