hacker in 中文意思是什麼

hacker in 解釋

  • hacker : n. 黑客〈指非法侵入他人計算機網路並進行各種破壞者〉。
  • in : adv 1 朝里,向內,在內。 A coat with a furry side in有皮裡子的外衣。 Come in please 請進來。 The ...
  1. See ronald dworkin, no right answer ? in law, morality, and society, essays in honour of h. l. hart, p. m. s. hacker and j. rax eds., clarendon press oxford, 1977, pp58 - 59

    關于憲法解釋與法律解釋的具體區別可參見韓大元: 《論合憲性推定原則》 , 《山西大學學報》 (哲學社會科學版) 2004年第3期。
  2. It ' s from a hacker friend of mine in moscow

    我在莫斯科的一位黑客朋友發來的信息
  3. Trend of hacker culture in the open source movement

    開放源碼運動中的黑客文化思潮
  4. Hacker high school is a program run by the university of la salle in barcelona, spain

    駭客高中是西班牙巴塞隆那的拉薩爾大學主辦的課程。
  5. This trinity was well - known in hacker circles

    崔妮蒂在駭客圈裡挺有名氣的
  6. In the multitudinous intrusion event, the hacker often gain control of the target computer through exploiting essential system process, and leaves trojan horse or back door in the system after a successful intrusion, which provides a shortcut for next access. therefore the process detection for the exploited system process and the trojan horse is important topics in the intrusion detection field

    在眾多的入侵事件中,黑客往往通過感染關鍵系統進程獲得目標主機的系統權限,並在成功入侵后在目標主機留下木馬、后門作為下次入侵的捷徑,所以對這些受感染的系統進程以及木馬、后門進程進行檢測是入侵檢測技術研究的重要課題之一。
  7. Next, this paper introduces four kinds of hidden information security trouble existed in network media by detailed cases, which is, false and harmful information spreading ; consequent taking place of network leakage of confidential information ; the overflow of computer virus ; and hacker attack and network information campaigns

    網路媒體作為一個新生事物,針對網路媒體的法律法規的相對滯后,大眾對網路媒體概念也相對模糊混亂,這也使網路媒體面臨的安全問題得不到足夠的重視,缺乏相應的解決方法。
  8. As any new technological revolution brings us convenience and puzzle in ethics as well, network is not fierce floods and savage beasts, but it is a double scissors. lt has brought about positive influence but also inevitably some bad effects such as news spread unchecked, trash polluted, network addictation, hacker action even computer crime. how to promote the teenagers news techonology knowledge and take them moralty and intellect

    就像任何新技術革命在給我們帶來便利的同時,也會給人類帶來倫理道德上的困惑一樣,網路不是洪水猛獸,但它卻是一把「雙刃劍」 。它在給青少年帶來積極影響的同時,也不可避免會造成一些負面效應如信息泛濫,垃圾污染,游戲網戀,網路上癮,黑客行為,乃至網路犯罪。
  9. Only understand hacker ' s technique deeply, we can distinguish friend and enemy and make harm to benefit, we can ensure and improve network security to be developed in good health

    深入了解黑客技術,作到知己知彼,化害為利,對于保證和促進網路安全的健康發展肯定是一件十分有益的。
  10. By properly preparing the material that falls in, a hacker should be able to program the hole to perform any desired computation

    只要適當地準備好要擲入的材料,駭客將能夠為黑洞設計程式來執行任何要求的運算。
  11. In the research counterplan of hacker ' s attack, i carefully analyse the whole process of attack, so i study out the countermeasure

    在研究黑客攻擊的安全性問題時,以一個黑客攻擊監控網路的全過程仔細分析研究了黑客攻擊手段,這樣就研究出具有針對性的防禦對策。
  12. The type of threat i ' m talking about is one against your digital assets ; this can be anything from a hacker claiming that they have already stolen confidential information, to a former employee alleging that a trojan horse is already in your environment and could be triggered at any time

    我正在談的的威脅類型依靠你的數字資產;這可能是聲稱已經偷了機密信息的黑客,以前的職工聲稱一個特洛伊木馬已經存在於你的環境中,並能在任何時候觸發。
  13. The first intentional artifacts of the hacker culture ? the first slang lists, the first satires, the first self - conscious discussions of the hacker ethic ? all propagated on the arpanet in its early years

    對黑客文化進行有意識的整理記錄第一批術語列表、第一批諷刺文學、對黑客倫理主動進行討論這些全都萌生在早年的阿帕網上。
  14. Topic : ethics in the eyes of a white hat hacker

    題目:黑客的商業道德觀
  15. However, owing to its opening, the information which is published on internet subject to many attacks, such as unauthorized wiretapping, intercepting, destroying, copyright infringing, abusing, hacker attaching and virus infecting, etc. because digital information on internet can be copied, modified and transmitted, copyright infringing on internet is becoming more and more serious ; now information tech is used more and more in the society, domain that internet concerns spreads fast, it play an important role in many fields, such as bank, business, government, army and so on. in these fields, demand of keeping secret is increasingly imminent

    然而正是由於它的開放性給在internet上發布、傳輸的信息帶來了巨大的威脅:網上的信息會被非法竊聽、截取、篡改或破壞;由於internet上的數字化信息可以被很方便地復制、修改和傳播,因特網上侵權問題越來越嚴重;並且,隨著社會日益信息化, internet所涉及的領域越來越廣,在諸多領域起了非常重要的作用,如銀行系統、商業系統、政府部門和軍事領域,這些領域對信息的安全保密要求也日益迫切。
  16. In the mitnick affair a hacker infiltrated into many departments ' networks, which threatened the security of the country

    在米尼克事件中,一個駭客潛入許多部門的電腦網路,這對國家的安全構成了威脅。
  17. In technological part, it begins with maintaining physical security, network security, system security, data security, application security and user security, and then takes proven actions, that include authentication, password checking, access control, anti - virus, firewall, leak scan, ids, security audit, anti - hacker, backup mechanism and etc. in organization sketch part, the different positions are arranged by insisting the rule of the minimum right. in management sketch part, a series of effective regulations are settled, according to the chinese governmental laws and the regulations of the agricultural bank of china. now, the plan has been preliminarily applied into the practice

    在技術層面上,從維護銀行網路信息系統物理安全、網路安全、系統安全、應用安全、用戶安全等方面出發,採用了成熟、適用的安全技術措施,包括;身份認證、密碼、訪問控制、防病毒、防火墻、漏洞掃描、入侵檢測、安全審計、防黑客入侵、同城災難備份等技術;在組織結構上,堅持權限最小化原則,設置不同的崗位,對每個崗位的安全職責進行了明確的界定;在管理體繫上,依據法律法規,制定了行之有效的規章制度。
  18. Technology is practicable in this case, yet while your pc link onto the internet, the pc may be infected with hacker or virus further to jeopardize the card reader application inside of your computer as well as the safety of the related medical information. therefore, it s better to avoid using the same computer without safety protection to link to the medical health insurance network and internet

    技術可行,但個人電腦連接internet后,將可能遭受駭客入侵或電腦病毒感染,並可能危害個人電腦內讀卡機應用及相關醫療資訊之安全,因此,最好避免連接健保醫療網與連接internet共用同一部未受安全保護之個人電腦。
  19. Who ' s doing this ? a foreign power or some computer hacker in his garage

    是誰乾的?其他國家還是車庫里的什麼黑客
  20. At the same time, it also realizes interaction among ids, honeypot and firewall. this article also brings forward the embedded honey technology projects, which enhances the network camouflaging effect and increases hacker ' s work remarkably. besides, it sets forth the concept of lan simulation for the first time and mocks every network service to attract the attention of hacker in order to let them attack the dummy net

    在863計劃- - -黑客監控系統中,提出了嵌入式honey的技術方案,增強了欺騙效果,顯著的增大了黑客的工作量,進一步提出了局域網模擬的概念,設計和實現了模擬局域網,用一臺或少量幾臺主機模擬出了一個網路,並模擬出了各種網路服務,用以吸引黑客的注意力,誘使黑客攻擊虛擬網。
分享友人