stolen information 中文意思是什麼

stolen information 解釋
竊取的資料
  • stolen : adj. 偷得的;偷走的。 stolen goods 贓物,賊贓。
  • information : n. 1. 通知,通報,報告。2. 報導,消息,情報。3. 資料,知識,學識。4. 【自動化】信息,數據。5. 【法律】起訴,告發。adj. -al
  1. He was old - fashioned about cash, and always insisted on using his own portamento for fear of information in his card being stolen using his counterparty s portamento, notwithstanding the privacy protection device now built in to all smart cards

    對于現金,他比較傳統,即使所有聰明卡都有私隱保障裝置,他仍然堅持用自己的輕便錢箱,以免被交易對手盜取卡上的資料。
  2. With the fleet development of mobile communication industry, the security and secrecy of information has been becoming more and more vital. nowadays, the security of communication is of great importance to confirm the safety of business information. on the situation that the mobile phone has been diffusely applied, the hidden safety troubles of mobile phone should not be ignored ( such as wire tapping, imitated handset station, blue teeth connection, in exchange with electromagnetic wave, the back door of handset, lost & stolen & lost control of mobile phone, safety of non - tone increment operation of mobile phone and cell phone virus )

    據統計,目前我國gsm網路[ 1 ] [ 13 ]已覆蓋全國絕大部分地區,用戶數已超過2 . 6億,並且還在高速增長;隨著手機應用的普及,手機存在的安全隱患及面臨的威脅日益突出(如主動竊聽、假冒機站、藍牙連接、電磁波交換、手機后門、手機被盜、丟失或短時失控、手機非話增值業務安全以及手機病毒等) ,手機安全問題已成為當前急需解決的重要問題。
  3. The type of threat i ' m talking about is one against your digital assets ; this can be anything from a hacker claiming that they have already stolen confidential information, to a former employee alleging that a trojan horse is already in your environment and could be triggered at any time

    我正在談的的威脅類型依靠你的數字資產;這可能是聲稱已經偷了機密信息的黑客,以前的職工聲稱一個特洛伊木馬已經存在於你的環境中,並能在任何時候觸發。
  4. It also enables them to access information on various databases, including the enhanced police operational nominal index computer system eponics for wanted or missing person checks ; transport department s driver licence integrated data system valid for vehicle information and stolen vehicle checks ; and immigration department s registration of persons system for forged id card checks

    警務人員亦可利用手提無線電通訊機和流動數據終端機登入多個數據庫,如在第二代警務處姓名索引電腦系統中檢索通緝或失蹤人士資料運輸署的車輛牌照及駕駛執照綜合資料電腦系統中檢索失車資料,以及入境事務處的人事登記系統中檢索偽造身份證資料。
  5. Completely blocking hacker attacks, trojans and other network risks, the protection of the internet account, qq passwords, online account information such as not being stolen

    徹底阻擋黑客攻擊、木馬程序等網路危險,保護上網帳號、 qq密碼、網游帳號等信息不被竊取。
  6. Some of the stolen customer information dated as far back as 2003, from customers as far away as hong kong

    一些客戶信息的失竊從時間上可追及到2003年,而受害顧客波及范圍遠至香港。
  7. Secure system : assure that the system of problem 9 services only authorized users, service cannot be denied by unauthorized users, and information cannot be stolen ( and prove it

    無故障系統:建造一個系統,每天可供上百萬人使用,而只需要一個非全時工作人員管理。
  8. Application to replace permanent resident card which has been lost, stolen, damaged, destroyed, never received, has incorrect information on it, is expiring after 10 years, or where the holder s name or other biographic information has changed since the card was issued

    -申請更換永久居留卡,凡遺失被偷損壞毀損從未接獲卡上資料有誤10年後失效持卡人名字或其他資料自發卡後有所變更。
  9. Q we have found products with original companys label in the black market ; however, these are not made by original brand company, nor do they go through the legal channel to be in the market. if we let fortune group recycle our industry waste, how does fortune group prevent similar things happened, to protect our intellectual property and related information from being stolen by the third party

    Q :我們在黑色交易市場上發現過標有原廠家品牌的產品,但是這些都不是原品牌持有廠家生產出來並通過正當渠道進行銷售的,如果我們把工業廢料交給富勤處理,富勤如何防止此類事情發生,保障我們產品中所包含的知識產權等相關信息,不會被第三方獲取?
  10. A somewhat exaggerated violence of the game, special agents to sneak into the enemy base to take away stolen information and the gangster on the streets became his first hurdle

    一款誇張而有點暴力的游戲,特種部隊的特工要潛入敵人的基地拿走被偷地情報,而街頭上的流氓就成為了他的第一道關卡。
  11. Introduction : a somewhat exaggerated violence of the game, special agents to sneak into the enemy base to take away stolen information and the gangster on the streets became his first hurdle

    一款誇張而有點暴力的游戲,特種部隊的特工要潛入敵人的基地拿走被偷地情報,而街頭上的流氓就成為了他的第一道關卡。
  12. Most importantly, cryptographic authentication information can be stolen

    最重要的是,密碼認證信息可能被盜。
  13. This comes after the department of veterans affairs admitted that personal information for millions of veterans, active - duty and guard personnel was on a laptop that was stolen

    這項提議是在美國退伍軍人事務署承認數百萬的退伍老兵、在職軍人和警務人員的存在筆記本電腦里的個人信息遭竊之後提出的。
  14. Police are appealing for information on a theft case in which two mechanical excavators were stolen from a construction site in lantau island in december 2002

    警方呼籲市民就一宗于去年十二月在大嶼山發生的地盤偷竊案提供資料,案中有兩部挖泥機被竊去。
  15. Police are appealing for information on a case in which 10 electric saws were stolen from a construction site in aberdeen earlier this month

    警方呼籲市民就本月初在香港仔壽臣山道五十七號發生的一宗地盤失竊案提供消息,案中有十把電鋸被人偷走。
分享友人