進行竊聽的 的英文怎麼說

中文拼音 [jìnhángqiètīngde]
進行竊聽的 英文
intercepting
  • : 進構詞成分。
  • : 行Ⅰ名詞1 (行列) line; row 2 (排行) seniority among brothers and sisters:你行幾? 我行三。where...
  • : Ⅰ動詞(偷) steal; pilfer Ⅱ副詞(暗中; 偷偷 地) secretly; surreptitiously; furtively Ⅲ代詞[書面語] (謙指自已) i
  • : 動詞1 (用耳朵接受聲音) hear; listen 2 (聽從; 接受) obey; accept; heed 3 (治理; 判斷) superv...
  • : 4次方是 The fourth power of 2 is direction
  • 進行 : 1 (開展) be in progress; be underway; go on 2 (從事) carry on; carry out; conduct; make 3 (...
  • 竊聽 : eavesdrop; wiretap; bug; intercept; tap竊聽電話機 detectophone; 竊聽錄音機 dictograph; 竊聽器 bug...
  1. His apartment was bugged, his telephone tapped; he was put under surveillance and tested with provocateurs.

    套房被裝上了器,電話被偵,他受到跟蹤,並由假裝外國特務試探。
  2. Two hours later, our nerves frayed, the tap was successfully installed, and gave us the essential base coverage of makarios.

    過了兩個小時,在精神高度緊張情況下,器終于成功地安好了,使我們對馬卡奧斯必不可少監視。
  3. The wiretapping for national security purposes in 19691971 clearly complied with the administrative and legal procedures in effect at the time.

    在1969到1971年間出於國家安全目,是明確符合當時生效政和法律程序
  4. I was asked to microphone victor's flat, where the interview was to take place.

    我被要求在維克托公寓房間里安裝器,因為會見將在那裡
  5. Meanwhile, the paper also discusses some methods to improve the polishing processes, i. e. using the liquid - drop method to monitor the remaining width of the cladding in time. finally, the feasibility of the three kinds of coupling method ? fbt, hf acid etching and the side - polishing are discussed and compared

    最後,對熔融拉錐法、氫氟酸腐蝕法和邊研磨法三種方法了分析與比較,得出一套比較適用於光纖設計方案。
  6. This scheme of dividing area makes the network and borders between systems clear, and will help to install the security devices. in dispatch center, security devices such as firewall, physical partition device are installed, and between dispatch centers, encrypting devices will be installed

    具體地說,在同一地點不同安全區之間採用防火墻、隔離裝置等邊界防護設備橫向隔離以抵禦非法訪問、拒絕服務等類型攻擊,不同地點同一安全區之間採用加密認證等手段,以抵禦數據在野外傳輸時可能遭遇、偽造、篡改等類型攻擊。
  7. To help protect the data transferred between clients and servers from eavesdroppers, you should encrypt it by using digital certificate technology

    為了幫助保護客戶端和服務器之間傳輸數據免於被取,您應該使用數字證書技術對數據加密。
  8. The quantum communication can be divided into two stages : in the first stage, the quantum communication is conducted and cryptographic key communication is finished through the quantum channel ; in the second stage, the negotiation of cryptographic key is achieved in order to measure whether any bug exists or not, and then confirms the final cryptographic key, at this time the quantum communication is accomplished

    在bb84協議中,量子通信實際上由兩個階段完成:第一階段通過量子通道量子通信,密鑰通信;第二階段在經典通道中,主要負責密鑰協商,探測者是否存在,然後確定最後密鑰。
  9. Integer solution of government networks security aiming at hidden trouble of network security is studied thoroughly in this paper, such as host computer of government network may be attacked by illegal in break, sensitivity data may be revealed or modified, information of intranet to internet may be wiretapped or tampered, etc. firstly, the security of government network, consisting of security analysis of risk, requirement, strategy and target of government are analyzed

    本文針對電子政務系統網路中主機可能會受到非法入侵者攻擊,網路中敏感數據有可能泄露或被修改,從內部網向公網傳送信息可能被他人或篡改、系統工作效率可能受到嚴重影響等安全隱患,對電子政務系統網路安全整體解決方案了深入研究。
  10. In the latest judicial rebuke of the bush administration ' s tactics against terrorism, a federal judge in detroit ruled thursday that warrantless wiretapping of u. s. citizens violates the constitution and federal law

    最近法庭再次對布希政府反恐手段了譴責,底特律市一個聯邦法院法官在上周四裁決,布希政府對普通民眾實施未被授權政策違反了美國憲法和聯邦法律。
分享友人