黑客文 的英文怎麼說

中文拼音 [hēiwén]
黑客文 英文
leet
  • : Ⅰ名詞1 (字) character; script; writing 2 (文字) language 3 (文章) literary composition; wri...
  1. The information safety has the characteristics of the high weakness and danger, delitescence and abruptness, the diversity of the attack sources and the indeterminacy of the guarded object and the asymmetry of the main body of the safety, etc. the contents of information safety are extensive, involving politics, economy, culture, military, science, technology and resources ecosystem etc. the factor which threatens the information safety mainly includes the hackers, network crimes, the network viruses, and the garbage information, etc. the second part thoroughly analyzes the strategic position of the information safety in the national security

    信息安全具有高度脆弱性和風險性、潛伏性和突發性、攻擊源的多樣性和防範對象的不確定性、安全主體的不對稱性等特徵。信息安全的內容廣泛,涉及政治、經濟、化、軍事、科技、資源生態等領域。威脅信息安全的因素主要包括病毒、網路、網路犯罪和垃圾信息等。
  2. Trend of hacker culture in the open source movement

    開放源碼運動中的黑客文化思潮
  3. Baldwin ' s personal and literary patricides brought about internecine both to wright and himself, but it is an indispensable tache in the african - american literature progress, so its positive significance must never be overlooked

    「弒父」使賴特和鮑德溫兩敗俱傷,具有濃烈悲劇色彩,但它是美國學發展過程中的一個必然環節,觀上具有積極意義。
  4. " it was written in poor english, but the hackers asked for 50, 000, saying that it was just 5 percent of what i had made, " tew said

    圖說, "郵件是用英寫的,但英語很差。不過明確提出要5萬美元,還說這只是我賺到的5 % 。
  5. Crackers will do a simple text search for this message inside the disassembled or decompiled output and chances are, when they find it, they will be very close to your sensitive time lock algorithm

    會執行一個簡單的本搜索,在反匯編或反編譯的輸出中查找此消息;如果他們找到此消息,則他們會很快破解敏感的時間鎖定演算法。
  6. The paper exhibits several attack cases, which provide a partial but impressive view of the cyber attacks and modus operandi of hackers

    章展示了幾個攻擊案例,對網上的活動和攻擊方式可見一斑。
  7. In this paper, the shortages and limitations of the perimeter firewall and current host firewall are analyzed, the current network attacks and the methods defending against them are analyzed and discussed, the strategies of the network security in the intranet are discussed, the scarcities of the current applications for the host firewall in the intranet are analyzed, a kind of intranet host firewall model based on the techniques of tcp / ip packets filter, vpn and ids is designed and discussed deeply

    針對網路安全的現狀,分析了邊界防火墻及現有主機防火墻的不足之處;對現有的網路攻擊手段與方法進行分析研究,並對防禦這些攻擊的方法進行了研究;對企業網的網路安全策略進行討論,分析了現有主機防火墻在企業網中應用的不足,並在此基礎上,結合包過濾、虛擬專用網、入侵檢測等防火墻技術,設計了一種企業網中的主機防火墻模型,並對這一模型進行了較深入地研究。
  8. In this thesis intrusion is a conception of broad sense. it includes that crackers acquire the system control right beyond legal scope, and some behavior harmful to systems such as collection of leak information, denial of service

    中的「入侵」 ( intrusion )是個廣義的概念,不僅包括被發起攻擊的人(如惡意的)取得超出合法范圍的系統控制權,也包括收集漏洞信息,造成拒絕訪問( denialofservice )等對計算機系統造成危害的行為。
  9. To become a real hacker, you have to hack. you can ' t just sit around reading text files and hanging out on bbs ' s. this is not what hacking is all about

    想真正成為,你必須真槍實彈去做應該做的事情。你不能僅僅靠坐在家裡讀些之類的章或者從bbs中扒點東西,就能成為,這不是「」的真正含義。
  10. Then, when the product manager demands that i change the customer name from black text to navy, i can change the

    這樣,當產品經理要求我將戶姓名由本改為藏青色本時,我可以更改
  11. The concept of " cybercrime " differs from " computer crime ", its content could be divided into two categories : cybercrime in narrow sense ( i. e., crimes for computer network ) and cybercrime in broad sense ( i. e., crimes by computer network ), the former is basically consistent in the crime features of several crimes in present criminal law of china, the main problem is defining and resisting of cracker behavior

    「網路犯罪」的提法與「計算機犯罪」有相同之處,也有重要的區別。對網路犯罪的內容,本傾向于區分為對網路的犯罪和用網路實施的犯罪兩種。前者基本上與我國現行刑法規定的幾個罪名的犯罪構成相一致,這方面目前較主要的難題是對行為的界定和處理。
  12. The author sets up a diskless honeypot in chroot environment, and relates the system root directory to chroot directory with nfs, so in such a honeypot, the hackers " file access will be recorded by means of capturing network packets

    作者設置了一個更改根目錄( chroot )環境下的無盤蜜罐,利用nfs把系統根目錄與更改根目錄聯系起來,採集網路數據包就能記錄在蜜罐內對件的訪問活動。
  13. The first intentional artifacts of the hacker culture ? the first slang lists, the first satires, the first self - conscious discussions of the hacker ethic ? all propagated on the arpanet in its early years

    黑客文化進行有意識的整理記錄第一批術語列表、第一批諷刺學、對倫理主動進行討論這些全都萌生在早年的阿帕網上。
  14. Hunting the origin of technical history of hacker ' s culture

    黑客文化的技術史探源
  15. To become a real hacker, you have to hack. you cannot just sit around reading text files and hanging out on bbs ' s. this is not what hacking is all about

    要想成為真正的,要真正的去做應該做的事,而不是僅僅讀些章,並呆在bbs中。
  16. English : yomiuri shinbun : recently the web page of a japanese shinto shrine was subjected to prolonged attacks by hackers, leading to an extended stop of the services

    : 《讀賣新聞》 :日本靖國神社的網頁最近遭到的長時間攻擊,導致該神社的網頁長時間無法使用。
  17. Speech by the deputy secretary for information technology and broadcasting, mr alan siu, at the in - house congress asia pacific 2000

    資訊科技署署長劉錦洪于攻擊及防範講座上致辭的全
  18. Then, the paper studies two special psychological phenomena in the spread of present network medium. they are the receivable psychology of network advertisements and the behavioral psychology of hackers

    其次,論研究了當前網路傳播兩個特殊的心理現象,即網路廣告接受心理和行為心理。
  19. This paper firstly summarizes the traditional network information security techniques, the common intrusion methods and their countermeasures. then it discusses the intrusion detection system ' s evolution, classification, detection methods, standardization and etc. aiming at the new encountered problems about intrusion detection, this paper brings forward a design project of the intrusion detection system

    在概述傳統網路信息安全技術,常用入侵手段與防範對策,入侵檢測系統的發展、分類、檢測方法以及標準化等問題的基礎上,針對目前入侵檢測遇到的一些新問題,提出了一個入侵檢測系統的設計方案。
  20. Thanks network security, creating a culture of hackers

    打造網路安全,傳揚黑客文
分享友人