stealing data 中文意思是什麼

stealing data 解釋
挪用數據
  • stealing : n. 1. 偷竊,盜竊;欺騙。2. 【棒球】偷壘。3. 〈pl. 〉 贓物。adv. -ly 偷偷地,不知不覺地,暗中。
  • data : n 1 資料,材料〈此詞系 datum 的復數。但 datum 罕用,一般即以 data 作為集合詞,在口語中往往用單數...
  1. With the rapidly development of computer network technology and the widely use of network technology in every walk of life, people transmit data through computer network more and more frequently, including all kinds of secret information ( for example, military secret ; bussiness secret ; personal private information ). today, as a result of poor security of our network system, we can not prevent the transmittied information from stealing and modifying unlawful. thus, the computer network technology is applied to our daily life restrictedly. recently, many network applications with voip ( for example msn messenger ; dialpad ; distributed multipoint multimedia conferences ) take no measures to encrypt their data

    隨著計算機網路技術的迅猛發展和網路技術在各行各業中的廣泛應用,人們通過計算機網路傳輸數據日益增加,其中包含了各種機密信息(例如軍事機密信息、商業機密信息、個人隱私信息等) 。由於目前的網路系統缺乏足夠的安全性,不能有效防止網路上所傳輸的信息被非法竊取和修改,因而極大地限制了計算機網路技術在日常工作中的應用。當前,基於voip技術的各種網路應用,如msnmessenger , dialpad ,以及一些分散式多媒體會議系統,竟然未採取任何加密措施
  2. Jeffrey bedser, chief operating officer of icg inc., a security company, said his firm has had clients that " have had consultants and contractors, including janitors, all the way up to senior executives stealing the data, trading the data or selling the data.

    經營電腦安全業務公司icg inc .的首席運營官jeffrey bedser稱,公司真有這樣的客戶,上至企業高管人員下至看門守衛都在設法從公司數據庫找到數據與他人交換,或出售給第三方。
  3. This web page is used for stealing credit card numbers, pin - codes, passwords and other personal data

    該網頁被用來竊取信用卡號,身份證號,密碼和其它的私人資料
  4. For the public, it was jaw - dropping : an america online engineer accused of entering his company ' s data banks and stealing 92 million e - mail addresses that allegedly were sold by a middleman to but for many on the front lines of

    當美國公眾對聽到美國在線公司america online的軟體工程師闖入公司數據庫,盜走9200萬個電子郵箱地址,並通過中間人售給垃圾郵件發送者的消息后驚訝萬分。
  5. Exterior threats include the malicious code, denial of service, stealing and juggling data during transmission ; internal threats include privacy leakage, illegal access and modification. all these threats must be solved during the system construction

    外部威脅包括數據在傳輸中可能被竊取和篡改,惡意代碼,和拒絕服務( dos ) ;內部威脅包括了對系統代碼的竊取和修改,員工有意和無意的訪問、修改一些他們沒有權限訪問的數據。
分享友人