单词 | hacker |
释义 |
复数:hackers 例句释义: 黑客,骇客,电脑黑客,电脑骇客 1. One hacker can easily hand out a copy of his illegal third party tool to all his friends with just a simple file transfer. 一个黑客可以很容易失控了他的非法第三方工具复制到所有的朋友,只需简单的文件传输。 ko.yj328.com 2. The risk is not always somewhere else. The risk to the merchant is not always the customer or hacker, it might be an employee. 但风险不总存在于别处。商人的风险不总是存在于顾客或黑客一方,可能来自内部雇员。 portal.vsharing.com 3. Just for a minute, the hacker seemed anxious to prove that he or she had some sense of morality. 没一会儿,黑客就急于想我证明他是多么有道德。 www.bing.com 4. A hacker can get away with the most outrageous stupid plays merely because he is doing what everyone expects of him. 一个臭球即使打得再愚蠢糟糕也没人责怪,只是因为这在人们的意料之中。 www.bing.com 5. The easy choice was to join the proprietary software world, signing nondisclosure agreements and promising not to help my fellow hacker. 容易的选择是加入私有软件世界,签署保密协议并承诺不去帮助我的黑客伙伴。 www.gnu.org 6. Finally, it had to be secure, even in the hostile hacker --and virus filled environment of the Internet. 最后,它必须是安全的,哪怕是在到处是心怀敌意的黑客和病毒的互联网络环境中也如此。 dict.veduchina.com 7. He is not the only person to see an affinity between the open-source hacker ethos and Christianity. 认为公开来源的网络思潮与基督教义有密切关系的人不止斯巴达罗一个。 www.ecocn.org 8. A comprehensive, yet easy to use network protection software, you can ensure that your computer is not by any hacker intrusion. 一个全面,却又复杂易用的网络攻护软件,可以确保您的计算机没有被免何黑主侵扰。 www.fachun.net 9. The reporter, witnessing the goings-on , couldn't make sense of it. He kept urging Hacker - Killer to ask more questions. 好奇记者在旁边看的一楞一楞的,不断的催促骇客杀手继续问下去。 dictsearch.appspot.com 10. But now a laboratory in Cambridge, England, has found a way to turn a hacker's screen instantly blank if he infiltrates the network. 不过如今一家位于英国剑桥的实验室已找到法子让渗入网络的黑客一无所获。 www.ecocn.org 1. It's difficult to prove just how much loss or gain was attributed to the hacker. 这是很难证明有多大损失或收益的主要原因是由于黑客。 ko.yj328.com 2. The report caused immediate consternation before it was discovered that it had been posted by a hacker. 该报道一发布立即引起慌乱,随后证实是黑客所发布的。 www.hxen.com 3. However, in his spare time Jeff still continues his activities as a hacker because he considers it a way to expand his knowledge. 不过,工作之余,他仍继续黑客活动,因为他认为这是一种扩展知识的途径。 rrting.com 4. If the software giant has really found a hacker-proof way of storing records online, then the benefits of Health Vault are clear. 如果软件巨子真正找到了在线储存记录的防黑客技术,那么“健康库”的好处就显而易见了。 news.koolearn.com 5. Mr Cousteix told the presiding judge that he did not consider himself a hacker "in the strict sense of the term. " Cousteix告诉首席法官称他并不认为自己是“严格意义上”的黑客。 dongxi.net 6. To be truly secure, the reports must be kept offline in some sort of secure location, lest the hacker tamper with the report. 要真正安全的,报告必须保持在安全的位置某种离线的,以免黑客篡改的报告。 blog.chinaunix.net 7. However, according to investigators, said the scope of the invasion of hacker crime so far, "is obviously still only arrogance here. " 不过,据调查人员表示,入侵的黑客迄今作案范围“显然仍只限于张目浏览”。 www.englishtang.com 8. To retrieve it, a hacker would have to hoodwink the user into dragging and dropping an object across the PC's screen. 要得到它,黑客们不得不诱骗用户拖拽电脑显示器显示的某个对象。 www.bing.com 9. you can learn it all by yourself as a closet hacker, and be just as good (or better) at it than they are. 你也能作为一个黑客自学它,并且能做的和他们一样棒。 knlvz.com 10. The atmosphere of the game is excellent, with the dark desktop screen giving you a sense of the hacker working in a dark room, hidden away. 游戏的氛围做得很好,黑暗的桌面给你隐蔽于小黑屋中的黑客的体验。 wiki.fcctt.org 1. As someone who used to be a hacker myself, I can say that in the age of the web, no one is truly safe from the cyber threat. 作为一名曾经的黑客,我敢说在这个网络的时代,任何人都无法真正躲过网络威胁。 dongxi.net 2. the sense of power over the machine eventually corrupts the computer hacker and makes him into a not very desirable sort of programmer. 任意摆布电脑所带来的权力感,最终诱使黑客堕落,成为一个声名不佳的程序员。 iask.sina.com.cn 3. How the hacker bursts into new system remaining the same conduct does not know. 黑客如何闯入新的系统仍旧不为人知。 goabroad.zhishi.sohu.com 4. The combination would overwhelm the browser, giving a hacker access to all data on the PC after a user clicks on a malicious link, he said. 在用户点击一个恶意链接之后,黑客就能访问用户个人电脑上的全部数据。 cn.reuters.com 5. If you are not a hacker yourself, it may help you cope with our eccentricities if you think of us as being brain-damaged . 如果你自己不是黑客,那么,把我们想象成脑部有缺陷的人有助你面对我们的古怪。 dictsearch.appspot.com 6. A hacker can be anyone with a deep interest in computer-based technology; it does not necessarily define someone who wants to do harm. 黑客可以是任何对基于计算机的技术有浓厚兴趣的人;它未必定义想进行伤害的人。 www-128.ibm.com 7. The iPhone was the first phone that a Luddite could figure out in seconds and a hacker could tinker around with for endless hours. iPhone是第一台外行人能够迅速学会使用的手机,而黑客却要花很多小时去摆弄它。 www.bing.com 8. Odds are that if you're reading this article to begin with you're already a self-identified life hacker to a certain degree. 区别只在于你是读了本文才开始,还是你在某种程度上已经是一位自认的生活黑客。 www.bing.com 9. Again, if stolen the session cookie can be used to get a hacker into the system and access someone else's session state. 同样,如果失窃,会话cookie将可被用来使黑客进入系统并访问别人的会话状态。 msdn2.microsoft.com 10. The former brought the risk that the company could quietly fix the problem, yielding nothing for the clever hacker who brought it to light. 前者的风险是,对方可能会悄悄把问题解决掉,而指出问题的聪明黑客则一无所得。 www.ftchinese.com 1. How did a hacker group that rejects definition develop such a strong visual brand? 一个拒绝自我定义的黑客集团如何会拥有如此强大的视觉形象? www.bing.com 2. by properly preparing the material that falls in , a hacker should be able to program the hole to perform any desired computation. 只要适当地准备好要掷入的材料,骇客将能够为黑洞设计程式来执行任何要求的运算。 www.ichacha.net 3. "My colleague Francis Crick used to say that God is a hacker, not an engineer, " Dr. Ramachandran said. “我的同事FrancisCrick总说上帝是个黑客,而不是工程师,”Ramachandran博士说。 www.bing.com 4. He suspected some kind of hacker assault and had spent the weekend helping to shore up the company's systems. 他怀疑有某类黑客在发起攻击,于是利用这个周末来帮助维护该公司的系统。 www.bing.com 5. The disconnect between the structure and the model can be big enough to enable a determined hacker to pry open a larger hole. 结构与模型的分离足以使意志坚定的黑客打开一个较大的漏洞。 www.ibm.com 6. Lyon, his hacker handle, is the head of a department in a major state-owned telecommunications firm and declined to disclose his real name. Lyon是电信国企的一名部门负责人,但他拒绝透露他的真实姓名。 cn.reuters.com 7. Kanerva's algorithm was so mathematically clean and crisp that it could be roughly implemented by a hacker into a computer one afternoon. 卡内尔瓦的算法是如此简洁清晰,以致于某个计算机高手用一个下午就能大致地实现它。 www.bing.com 8. He was even more convinced that Hacker-Killer had not given him the "authentic copy" . 这下子好奇记者更加确信骇客杀手没有拿给他『正版』。 122.116.69.108 9. So, you must do two things: Think like the hacker, and invest in good processes that allow you to stay one step ahead. 因此您必须做两件事:像黑客一样思考问题,并在良好流程方面进行投资,以实现抢先一步的优势。 www.ibm.com 10. The hacker messaged all my online friends, explaining that "I" was overseas, had run out of money and needed help. 那人给我所有在线好友发消息说“我”在国外花光了钱需要帮助。 www.bucter.com 1. Big time! A hacker broke into the company's files and got all her personal information. You really think it's completely safe? 不只呢!有个黑客侵入了网络公司的计算机档案,取得她全部的个人数据。你真的觉得这种交易方式十分安全吗? talk.oralpractice.com 2. The only shadow was the darkweb, a vast, anonymous alt-Internet, a haven for pedophiles or hacker types. 唯一的一点空隙是一个阴暗的网络——一个庞大的匿名的高阶互联网,一个黑客的天堂。 www.bing.com 3. A comprehensive, yet easy-to-use network protection software, we can ensure that your computer is not used by any hacker intrusion. 一个全面,却又简单易用的网络防护软件,可以确保你的计算机不被任何黑客侵扰。 dict.bioon.com 4. The network trap system observes and records how the hacker scans and invades the system, by tempting the potential hacker to invade itself. 网络诱骗系统通过引诱潜在的黑客入侵自身系统,观测并记录黑客如何探测并侵入系统,捕获他们的踪迹。 epub.cnki.net 5. Example: "By exploiting loopholes in the system, the hacker was able to cause great damage. " 黑客利用系统中的漏洞造成了严重的损失。 blog.hjenglish.com 6. One form of hacker attack even involves feeding bad data to ARP tables, a practice known as ARP poisoning. 黑客攻击的一种形式就包括修改恶意数据到ARP映射缓存,即所谓的ARP中毒。 www.bing.com 7. Despite millions of dollars in research funding, no hacker has been able to coax a machine to walk across a room under its own intellect. 尽管已在研发上投入了千万巨资,还没有哪位计算机高手可以摆弄出一台靠自己的智能穿过房间的机器。 dongxi.net 8. To the hacker mind, though, the word "foolproof" is but a challenge. 然而,在黑客们的心目中,“十分简单”这个词不过是一个挑战而已。 www.ecocn.org 9. You're a lowlife for wanting to do such things and a moron for asking a hacker to help you. 想要这样做,说明你是个卑鄙小人;想找个黑客帮你,说明你是个白痴! dictsearch.appspot.com 10. Malicious code can be hidden in fonts that automatically load when a user opens a PDF file, allowing a hacker to take control of the device. 恶意代码可以隐藏在字体中,当用户打开PDF文档时自动加载,从而允许黑客完全控制手机。 www.bing.com 1. The archetype of the "hacker" or "computer enthusiast" is still here, but in the best films, that archetype has evolved. 黑客或是电脑发烧友的原型依然在这里依然可以找到,但是,这些原型随着电影的发展也在不断的进化。 www.bing.com 2. It was a curious document in the midst of the legalese and financial models: an earnest, plainspoken mix of media theory and hacker mythos. 这是一篇不同寻常的文档,夹杂着法律术语和金融模式:满腔热忱且直言不讳相融合的媒体理论兼黑客神话。 www.bing.com 3. As Hacker found, there has been a gradual erosion in the economic security of the middle class. 就像Hacker发现的那样,中产阶级的经济安全逐渐削退。 www.bing.com 4. Unfortunately many journalists and writers have been fooled into using the word hacker to describe crackers. 很不幸,很多新闻工作者和作家都搞混了,他们用黑客这个词来形容骇客。 www.hxen.com 5. The Bank shall be responsible for the damage caused by hacker's invasion into the bank's computer or related equipments. 骇客入侵银行之电脑或相关设备者所发生之损害,由贵行负担。 www.b2bank.com.tw 6. Though of course you don't have to be a CS major to be a hacker; I was a philosophy major in college. 但其实你不需要在大学里学计算机就可以做一个黑客,比如我在大学里学的是哲学。 www.bing.com 7. Your mobile phone invades signal system as a result of the hacker, batteries is about to detonate. 你的手机由于黑客侵入信号系统,电池即将被引爆。 www.qyweb.org 8. It does, however, open up the possibility of a client-side hacker injecting a different value for author. id. 但是,这样做留下了一个漏洞,使客户端的黑客有机会为author.id注入不同的值。 www.ibm.com 9. "Comodo Hacker" claims also to have cracked security at three other (so far unnamed) issuers. “科莫多黑客”还声称破坏了其他三家证书网站的安全系统(迄今为止还没公布名称)。 www.ecocn.org 10. So a hacker can assume one of those people's identities and reference things that have happened in my professional life. 这样,黑客能猜想到部分这些人的特点和关于个人安全信息,那也就是我专业的部分内容。 www.bing.com 1. I had not given up yet, I seemed to find a bunch of hacker news articles that seemed relevant to my entrepreneurism. 不过我并没有放弃,我好像找了一堆貌似跟我的创业有关的黑客资讯文章。 dongxi.net 2. Huger said that Symantec has so far only observed a limited number of hacker attempts to exploit the vulnerability in PowerPoint. Huger称,赛门铁克迄今只发现了少量利用PowerPoint漏洞发动的攻击。 cn.reuters.com 3. But the word 'hacker' is also used to describe a person who tries to steal information from computer systems. 黑客是指人还试图窃取电脑系统资料。 bbs.putclub.com 4. FBI is trying to track down the hacker. FBI正在努力追踪黑客。 edu.chinalawinfo.com 5. In Aug 2010, a Chinese hacker disclosed a trick with a Unicode control character used to mislead people into running an executable file. 在2010年8月,一个中国黑客揭示了一个使用Unicode控制字符来误导人们点击可执行文件的骗术。 blog.sina.com.cn 6. Last thing I wish to do is put this info into tickets, so if the hacker gets access again, he now has all my info. 我最想做的是投入门票这个信息,因此,如果黑客获得访问再次,他现在有我的所有信息。 ko.yj328.com 7. Once it has its grips on the system, it proceeds to create an HTTP server and download malware onto the computer from hacker web sites. 一旦它将自己植入系统中,它会着手创建一个HTTP服务器,并从一些黑客网页中下载恶意软件到电脑中。 www.bing.com 8. Levy eulogized him as ``the last true hacker'', a description which happily proved incorrect. 利维惋惜地称其为“最后一个真正的黑客”,幸好事实证明利维错了。 www.bing.com 9. It might have an ugly impact to consider hacker actions an "act of aggression" , a "crime against peace" . 这也可能会产生负面影响,使得人们认为骇客的行为是“激进行径”或是“破坏和平的罪行”。 zh.globalvoicesonline.org 10. Honeypot is a real system, which is leaky and specially used to be attacked by hacker. 蜜罐是一个在网络上专门让黑客攻击的、带有漏洞的真实系统。 dictsearch.appspot.com 1. Databases available from other federal agencies include e-fingerprints of computer hacker tools and of child pornography. 其他联邦机构公布的资料库,还包括电脑骇客程式与儿童色情图片的电子指纹。 edba.ncl.edu.tw 2. Scanning: Scanning, or footprinting, is part of the initial information-gathering process for a hacker. 扫描:扫描或跟踪足迹(footprinting)是黑客的初始信息收集过程的一部分。 www.ibm.com 3. The hacker admitted that he was working for the MPAA, and that his job was to steal confidential e-mail, and other company secrets. 黑客承认受雇于MPAA,工作是窃取机密邮件和其他公司机密。 www.ecocn.org 4. His (Bill Gates) intensely competitive approach has poisoned the collaborative hacker ethos of the early days of personal computing. 他[比尔·盖茨]这种激烈的竞争取向,已经伤害电脑早期发展时代那种骇客通力合作的文化特质。 home.soufun.com 5. While there's no denying that there are hackers out there with bad intentions, they make up only a small percentage of the hacker community. 不可否认,确实有不怀好意的黑客,但是在黑客家族里,他们只占了一小部分。 www.bing.com 6. Thanks to the media, the word "hacker" has gotten a bad reputation. 由于媒体的宣传,黑客一词臭名昭彰。 www.bing.com 7. man dmesg isn't all that helpful if you're not a kernel hacker. 如果您不是对内核特别熟悉,mandmesg没有什么用处。 www.ibm.com 8. China insists its massive Internet population is non-threatening. Indeed, its most notorious hacker is now fostering a cuddly image. 中国坚持说其庞大的互联网人口不具有威胁性。的确,中国曾经最恶名远扬的黑客现在正在塑造一个亲切的形象。 www.bing.com 9. That group identifies itself on its website as an alliance of internet security professionals with links to other hacker groups. 该组织在自己的网站上声称,自己是一个与其它黑客组织有联系的网络安全专家联盟。 www.ftchinese.com 10. But in a commentary, the Global Times hit out at "some foreignmedia" for interpreting the program as a breeding ground for a "hacker army" . 但是《环球时报》在一篇评论中,对“一些国外媒体”将该计划解读为筹建“黑客部队”的说法进行了猛烈抨击。 www.bing.com 1. All a hacker would need to do is pass the correct token or header, and the hacker would not be challenged for authentication. 黑客需要做的全部事情就是传送正确的标记或header,系统不会要求他们进行身份验证。 www.ibm.com 2. To a hacker, a closed door is an insult, and a locked door is an outrage. 对于黑客来说,关着的门就是一种挑衅,而锁着的门则是一种侮辱。 m.udpwork.com 3. In their statement, the Guardian's international partners lined up to slam the 40-year-old former computer hacker. 在他们的陈述里,卫报的国际搭档狠狠地抨击这个40岁的前电脑黑客。 www.bing.com 4. Nevertheless, last week the company abruptly threatened to pull out after suffering hacker attacks believed to have originated in China. 尽管如此,上个星期这家公司却突然威胁要退出中国,在遭受具信是来自中国的黑客的攻击后。 blog.sina.com.cn 5. In fact, it is to be a hacker to invade a system to open convenient door greatly. 事实上,它是为黑客侵入系统大开方便之门。 www.nwpu.net 6. One important consideration is whether the attack is the work of a lone hacker, a criminal group or a government. 着重考虑网络攻击事件是由单个黑客所为,还是犯罪团伙或者政府的故意操纵行为。 www.bing.com 7. Right, at least until some creative hacker comes up with a new way to wreak havoc. 同意——至少可以持续到更聪明的黑客有新方法兴风作浪的时候。 www.bing.com 8. Therefore, someone compares those stimulants as a "cancer" , are "underworld" and "the hacker of the sports community" . 因此,有人把兴奋剂比喻为“毒瘤”,是“黑社会”,是“体坛黑客”。 www.chinaenglish.com.cn 9. After all, you'd have to be right every time, whereas, the hacker, with infinite patience to probe your defenses, only has to be right once. 毕竟您必须每次都正确,而黑客在耐心攻破您的防御时,只需要对一次就行了。 www.ibm.com 10. A good example of this genre would be a standard hacker type attack. 黑客攻击就是这类攻击手法的典型例子。 bbs.pediy.com 1. So how on earth has Apple's playful hacker spirit manifested into such a culture of fear? 那么,苹果的黑客精神到底是如何变成一种恐惧文化的呢? www.bing.com 2. at least until some creative hacker comes up with a new way to wreak havoc. 至少在某个采用新的途径来实施攻击的黑客高手出现之前。 bbs.ebigear.com 3. But its has admitted that the weakness exploited by the hacker was known to IT security experts. 但索尼已承认,IT安全专家们已经知道了此次黑客所利用的弱点。 www.ftchinese.com 4. The hacker can use a flawed hypervisor to identify the neighbors of a healthy virtual machine and monitor their activity. 黑客可以利用有缺陷的系统管理程序识别健康的虚拟机的邻居并监视它们的活动。 www.ibm.com 5. The Word 97 Template Security Patch prevents a hacker from exploiting this vulnerability. Word97TemplateSecurity修正程式能防止骇客利用范本的弱点。 www.microsoft.com 6. Details of a computer that has been hacked into and can be controlled externally by a hacker can be bought for between $6 and $20. 一台遭到入侵并可以由黑客从外部控制的电脑的详细信息,售价在6美元至20美元之间。 www.ftchinese.com 7. Often abbreviated MITM, such attacks are when a hacker tries to get in between a user and an encrypted or secure service. 这类攻击通常被简写为MITM(ManInTheMiddle),是黑客试图切入用户同加密服务或安全服务之间的一种攻击。 www.bing.com 8. The computer hacker failed to completely cover his tracks and was arrested a couple days later. 那名计算机骇客没有彻底湮灭证据,一、两天后就被捕了。 edu.sina.com.cn 9. He adheres to a self-styled "hacker ethic, " which justified any computer intrusion as long as the motive is pure. 他坚守自称的“电脑窃贼伦理”,认为只要是动机纯正,任何入侵电脑的行为都是正常的。 www.bing.com 10. Then, you've got to do some hacker testing. 然后还要进行某种黑客式的测试。 www.ibm.com 1. Iranian dissidents are not alone in their struggle, however, as several sympathetic hacker groups have been working to keep them online. 但伊朗的异见人士并非孤军奋战,一些对其同情的黑客组织也在不遗余力的帮助他们可以始终在线。 www.bing.com 2. In September, the nude self-portraits fell into the hands of a hacker and quickly began making the rounds on Twitter and other Web sites. 9月,这些自拍不雅照落到了黑客手上,并以很快的速度在Twitter和各大网站上流传起来。 www.hjenglish.com 3. The attack, thought up by hacker Samy Kamkar, exploits shortcomings in many routers to find out a key identification number. 这种由黑客萨米·卡门卡想出来的攻击方法,利用存在于很多路由器中的众多漏洞,查出一个关键的身份识别号。 www.bing.com 4. Today firewall is used for to protect the computer network to exempt is must been authorized personnel's harassment and hacker's invasion. 今天的防火墙被用来保护计算机网络免受非授权人员的骚扰与黑客的入侵。 zhidao.wangchao.net.cn 5. Assange, 39, a former computer hacker now at the center of a global controversy after WikiLeaks released a trove of classified U. 阿桑奇,现年39岁,曾经是一名计算机黑客,在维基泄密发布一系列机密的美国外交电报之后,此人一直颇受争议。 www.bing.com 6. The rest is a cakewalk for the hacker to log on to the banking Web site with the victim's credentials. 这样,黑客就轻而易举地利用了受害者的凭证登录到网银站点。 www.ibm.com 7. Nevertheless, last week the company abruptly threatened to pull outafter suffering hacker attacks believed to have originated in China. 尽管如此,上周Google还是突然地威胁要退出中国市场,因为他们受到了确信是来自于中国的黑客攻击。 www.bing.com 8. A hacker thus needs to sell his find quickly, which requires the verification process to be streamlined. 因此黑客需要快速将自己的发现卖出去,这就要求证实程序的效率要快。 blog.sina.com.cn 9. But when a hacker produces a new capability on Linux, any number of people can use it without taking it away from anyone else. 但是当黑客做出一个破解版的linux的时候,任何数量的人都可以使用它而不从别人那把它拿走。 www.bing.com 10. While I can only see a couple of news stories on my screen on newspond, on Hacker News I can see about twenty. 要么我去newspond,一屏只能看到几条新闻,要么我到HackerNews,可以看到差不多20条。 www.bing.com 1. Torrentspy later sued the MPAA because an alleged hacker, hired by the MPAA, retrieved private information from the BitTorrent indexer. 稍后,Torrentspy起诉了MPAA,宣称一名受雇于MPAA的黑客,从BitTorrentindexer中窃取了私人信息。 www.ecocn.org 2. Yesterday afternoon, in a protest group also outgoing message display, Taobao may encounter hacker attack. 昨日下午,在一个抗议QQ群中也传出消息,显示淘宝可能遭遇黑客攻击。 bbs.cnqr.org 3. The DMZ should be a "naked" -- and thus hostile -- environment for any potential intruder or hacker. 对于任何可能的入侵者或攻击者来说,DMZ是一个“无保护的”——“不利的”——环境。 www.ibm.com 4. they often remain unaware of the damage their child could cause with freely available hacker programs or peer-to-peer file sharing software. 但他们却没有意识到自己的孩子凭借免费取得的黑客程序或点对点档案分享软件可能会造成的破坏。 www.jukuu.com 5. Personal identity information, employee and business data - all the things a hacker may scours your computer looking for is there. 私人身份信息,员工和商业数据-所有这些数据一名黑客都会从你的计算机一扫而空。 dictsearch.appspot.com 6. Trojans are malicious programs that hide themselves on your PC, record your passwords, and then send them to the hacker. 木马程式是一种会潜入用户个人电脑、暗自记录用户密码,并将所收集资讯送回骇客手上的恶意程式。 www.chinapost.com.tw 7. But if a thief or hacker dug into an Android device, there isn't going to be much geodata saved on the smartphone to digitally stalk you. 但如果窃贼或黑客去钻研一台Android设备,就不会在智能手机上发现太多能够数字追踪到你的地理数据。 dongxi.net 8. Our resident hacker Tyler Gilles notes that it's pretty simple - it has only four methods. 我们的平民黑客TylerGilles指出,该API其实相当简易——只包含4个函数方法。 www.bing.com 9. Therefore, we have to keep the transformed messages in the network from being stolen, spoofed and changed by the hacker. 因此,要保证这些在网上传送的敏感信息不被窃取、假冒和篡改。 www.fabiao.net 10. Doing so creates a larger target for a hacker to potentially exploit and increases your security risk. 否则可能为黑客提供可利用的更大目标,并增加安全风险。 office.microsoft.com 1. In a developed national in economy has an suite of registration of birth system One day, a hacker rush in the centre of registration. 在一个经济发达的国家有一套先进的出生登记系统,每一个婴儿出生时,他们的家长会在网上为他们的孩子进行登记。 zhidao.wangchao.net.cn 2. To 'own' something in hacker slang is to take control of it. “拥有”这个词,用黑客的行话来说也就是控制。 www.bing.com 3. Open this version the goal is, tells everybody, the safe is not the hacker, I Hope everybody does not want the casual hack otherswebsite! 开这个版的目的是,告诉大家,安全并非黑客,希望大家不要随便黑别人网站! bbs.secdst.net 4. After inputting password, the hacker deleted some files in database, download new software and installed it in the desktop. 输入密码后,黑客删除了数据库中的一些文件,下载了新的软件安装在那个台式计算机上。 www.bing.com 5. Then there's also the legality of taking action against a hacker who has compromised a machine, after all the heavy forensics are done. 然后还有对已经损害一台机器的一位黑客采取行动的合法性,终究沉重的辩论学被做。 bbs.et8.net 6. Using a network of computers (dubbed zombies) controlled by a single master machine, the hacker tries to overwhelm a website's servers. 利用一个由单一主机控制的电脑网络(称为僵尸网络),黑客竭力地颠覆一个网站的服务器。 www.bing.com 7. But if the hacker is in a friendly country's (or in U. S. A. ) computer system and pretend be off-line, what to do? 但是如果黑可在一个友好的国家——或在美国——的计算机系统上佯装离线,那可如何是好? www.tdict.com 8. A prominent hacker claims to have unlocked the Apple iTunes music store's copy protection system. 一个突出的骇客声称已上锁一事苹果音乐商店的拷贝保护系统。 www.2getnews.com 9. Global Network reporter Liang reported that South Korean authorities had often been the target of hacker attacks on neighboring countries. 环球网记者李亮报道,韩国当局此前经常将遭黑客攻击的矛头指向邻国。 www.englishtang.com 10. Doing so creates a target for a hacker to potentially exploit and increases your security risk. 否则可能会为黑客创建可利用的目标,并增加安全风险。 office.microsoft.com 1. Software that looks complex is much more impressive to other hackers, venture capitalists, and non-hacker friends and family. 对于其他的黑客,风险投资商,以及非黑客的朋友和家人,越复杂的软件越让人印象深刻。 www.bing.com 2. Ethical hacking is a hacker that works on behalf of a company to expose weaknesses on their own network. 道德黑客是黑客时,对公司暴露自己的网络上的弱点代表作品。 www.bing.com 3. It's become fashionable to steer people away from postsecondary education. Andrew Hacker on why society does that at its peril. 让人们远离大学教育已经成为一种时尚,安德鲁哈克认为这么做会给社会带来危害。 www.bing.com 4. Without breaking the encryption, a hacker can infer significant information from the context in which the ciphertext is stored. 黑客无需进行解密,即可根据存储密文的上下文推断出重要信息。 msdn2.microsoft.com 5. It's hard to tell whether you're a good hacker, especially when you're young. 在你还年轻的时候,想要搞明白自己是不是真正优秀的黑客是很困难的。 www.bing.com 6. The term computer hacker first showed up in the mid-1960s. 计算机黑客这个名词最初是出现在20世纪60年代中期。 www.bing.com 7. A hacker could easily try to gain access to the site with any number of common last names. 于是黑客就可以通过任意数量的常见姓氏,很容易地获得站点的访问权限。 www.ibm.com 8. As you can see, the hacker changes the query's logic by entering the malicious code as his userid. 如您所见,黑客将恶意代码作为其userid输入,修改了查询语句的逻辑。 www.ibm.com 9. Dynamic analysis works in a way very similar to the one a hacker would employ when attacking an application. 动态分析工作的方法与黑客在攻击一个应用程序时所使用的方法十分相似。 www.ibm.com 10. The hacker controls them at a predetermined time to bombard the target server with useless, but intensive resource consuming requests. 黑客在预定义的时间控制他们用没有价值但却非常消耗资源的请求来轰击目标服务器。 www.ibm.com 1. A hacker can easily associate an operationally significant IP address to a false MAC address. 一个黑客可以只做简单的操作就将一个重要的IP地址和一个错误的MAC地址绑定。 www.bing.com 2. Another great resource for new users of Linux or UNIX is the Jargon File (also known by some as The New Hacker's Dictionary). 对于Linux或UNIX的新用户,还有一份极好的参考资料—Jargon文件(有人称之为新黑客的字典)。 www.ibm.com 3. The best were recruited by the army's elite hacker units, which reportedly disrupted South Korean and U. S. government Web sites in 2009. 最好的学生会被军队的精英黑客部队挑走,据说2009年韩国和美国政府网站被黑就是他们的杰作。 www.bing.com 4. Last Tuesday Rowenna Davis sent an email to her own email account to try to contact the hacker. 上周二,RowennaDavis给自己的邮箱发了封邮件,希望能联系到黑客。 www.bing.com 5. Constraining and validating user input is essential in a Web application to prevent hacker attacks that rely on malicious input strings. 在Web应用程序中,要阻止依赖于恶意输入字符串的黑客攻击,约束和验证用户输入是必不可少的。 msdn2.microsoft.com 6. Facebook's new Washington office, designed to look like a hacker's lair, with walls of faux construction rubble, is a work in progress. Facebook在华盛顿的新办公室尚未完工。这里故意设计得像是一个黑客窝,壁用假的建筑废料装饰。 c.wsj.com 7. Creating something bad deliberately, whether the creator is a teenage hacker, a terrorist or a rogue state, is a different matter. 故意创造一个有害生物,无论创造者是青少年黑客,恐怖分子还是一个流氓国家,情况就另当别论。 www.ecocn.org 8. That way, if a server is compromised, the hacker will gain access to only a specific set of services. 如此,一旦服务器缺乏抵抗力,黑客也将只能访问到一组特定的服务。 www.bing.com 9. "The score alone is not reason to refer, " Hacker, who does not useTeenScreen, told Psychiatric News. “分数不是转诊的理由的唯一理由,”Hacker告诉《精神病学新闻》,他本人不用少儿普查项目。 www.bing.com 10. But then, most science and engineering and software development isn't done by original genius, hacker mythology to the contrary. 话说回来,大多数科学、工程和软件的成果都不是来自原创天才,恰恰相反,是锐意进取铸就了神话。 www.bing.com 1. Our system may be subject to virus infections at any time, hacker intrusion, which can cause us huge loss. 我们的系统随时可能遭受病毒的感染、黑客的入侵,这都可以给我们造成巨大的损失。 www.22826.com 2. This frighteningly simple procedure enables the hacker to cause a variety of networking woes, described next. 这种恐怖而又简单的攻击使攻击者给网络带来了巨大的危害,后面将会描述到。 www.bing.com 3. How discusses disposes the personal computing, the website, the server security, Prevented the virus, the hacker invade. 讨论如何配置个人电脑、网站、服务器安全,防止病毒、黑客入侵。 www.flstx.com 4. In this case, the hacker has spliced the names of the user tables in the database to the original query of the Products table. 在这种情况下,黑客已将数据库中用户表的名称接合到Products表的原始查询。 www.cnblogs.com 5. Reported that the "hacker" in the attack when the CIA contractor staff will send a malicious message containing identity information. 报道说,“黑客”在攻击中情局承包商工作人员时便发送了包含身份信息的恶意邮件。 www.englishtang.com 6. Of course, as a hacker I can't help thinking about how something broken could be fixed. 当然,作为一个骇客,遇到问题总是会想如何解决。 www.bing.com 7. As well as protection enterprise's secret information not hacker and industrial spy's invasion. 以及保护企业的机密信息不受黑客和工业间谍的入侵。 www.pclwsj.com 8. Austin Heap, a 26-year-old hacker born in Ohio, decided to develop anticensorship software to foil the authorities' efforts. 奥斯丁?西普,一个出生自俄亥俄的26岁黑客为了对抗政权者的行为,决议开发一个反注册软件。 bbs.ecocn.org 9. Or maybe a freelance hacker who wants to settle down and start making your skills pay off? 或你是想要稳定下来发挥所长的对电脑科技有热情的自由业? www.toeic900.com.tw 10. The more complexity in the DMZ, the more potential targets of attack and compromise you present for the hungry and salivating hacker. DMZ中越复杂,暴露给饥渴和垂涎欲滴的攻击者的可攻击目标就越多。 www.ibm.com 1. Even then, if a hacker were to listen to and then delete a message, you'd have little way of knowing. 但是,如果一个黑客窃听并删除了你的语音留言,你根本无从察觉。 www.bing.com 2. Mr Hacker argues that the defining economic shift of recent times has been the increasing instability facing American families. 雅阁布先生认为,最近一段时期,比较明确的经济转向就是美国家庭面临的不断上升的不稳定性。 www.ecocn.org 3. This helps prevent the execution of exception handlers introduced by a runtime hacker attack. 这有助于防止执行由运行时黑客攻击引入的异常处理程序。 technet.microsoft.com 4. Professor Hacker discussed the ominous trend lines in an interview. JacobHacker教授在一次采访中讨论了这一趋势不佳。 www.bing.com 5. a hacker infiltrated into many departments' networks, which threatened the security of the country. 在米尼克事件中,一个骇客潜入许多部门的电脑网路,这对国家的安全构成了威胁。 hk.dictionary.yahoo.com 6. Once, he logs onto quick buck website, discover this website flaw is more, used hacker technology to have charge. 有一次,他登录快钱网站,发现该网站漏洞比较多,便采用黑客技术进行了攻击。 itzhe.cn 7. A "hacker" is an excellent computer user who spends his free time reading the secret files of others. “黑客”是利用空余时间阅读他人秘密文件的高技能计算机使用者。 www.hsyh.pudong-edu.sh.cn 8. But Amoroso and other recruiters say they also look for computer scientists with a hacker's mentality. 不过阿莫罗索和其他招聘者也表示,他们也在寻找拥有黑客心态的电脑科学家。 www.kekenet.com 9. The phrase "online security guard" , which literally means "white clan" in Chinese, is the opposite of "black clan" or hacker. “网络卫士”在中文中的名称叫做“白客”,也就是“黑客”的反义词。 edu.sina.com.cn 10. But other trends are at work, says Mayer, including spammers picking up hacker techniques and applying them to the junk mail business. 但是其他的趋势仍在演变中,梅耶说,包括垃圾邮件加快了黑客技术并将它们应用于邮寄宣传品的业务之中。 wenwen.soso.com 1. It is thought up of by themselves or another hacker, but reflects something major that they have done. 它想出了由自己或另一音译,但它们主要反映了辛劳。 zhidao.baidu.com 2. he sells his skills as a hacker to a company that repairs flaws in systems to prevent break-ins by hackers of all kinds. 他把自己的黑客技术卖给从事修补系统缺陷公司以防止各处黑客入侵。 rrting.com 3. Amid this pressure the hacker underground, riven by squabbles and splits over personality and policy, has turned on itself. 这些地下黑客组织不光面临着外界压力,在个性和政策上的争执分歧也让自己焦头烂额,引火烧身。 www.ecocn.org 4. Generate Random Passwords, Exclusive Anti-Hacker Keyboard to protect you against keyloggers. 产生随机密码,独家防黑客键盘保护您免受键盘记录程序。 xtdownload.com 5. But when a remote hacker obtains a large list of hashed passwords from a server or database, we're in trouble. 但是当一个远程黑客从服务器或者数据库拿到了一长串hash过的密码时,我们就有麻烦了。 www.infoq.com 6. Worms, viruses and the external hacker were once perceived as the biggest threats to computer systems. 蠕虫、各种病毒和外来黑客曾经一度被认为是电脑系统的最大威胁。 zhidao.baidu.com 7. It's a sunny April afternoon, and Lee is dressed in a monkey-head T-shirt from hacker outfitter ThinkGeek. 这是一个四月阳光明媚的下午,李穿着黑客服饰店ThinkGeek卖的套头衫。 www.bing.com 8. In addition, handled and unhandled exceptions should always offer minimal information that might assist the hacker in his efforts. 此外,已处理的异常和未处理的异常应该始终将提供的可能有助于黑客攻击的信息减到最少。 www.cnblogs.com 9. Security experts note that the profit that can be made from these activities is driving the rapid rise in virus and hacker attacks. 安全专家认为这一系列活动后面隐藏着利益因素,它驱使病毒及黑客攻击事件不断上升。 dream4ever.org 10. A hacker looks for inside instance resources to get a victim's personal information. 黑客可以在实例资源中寻找受害者的个人信息。 www.ibm.com 1. Assistant to setup firewall policy, monitor the network system security, to avoid virus, hacker and any. 协助设置防火墙策略,监控网络系统的安全性,避免病毒,黑客和任何未经授权的访问。 www.jober.cn 2. Same goes for a hacker who gains remote access to the consolidated. db file. 一个获得许可远程访问统一格式.db文件的黑客也是如此。 dongxi.net 3. Upgrading after a hacker uses this exploit to steal your information is simply too late, especially if you hold sensitive customer data. 在黑客们利用这个盗取你信息之后升级就完了,特别在你持有敏感用户数据的时候。 www.bing.com 4. Intrusion detection which protects system actively from hacker's attacks is a new technique during these two decades. 入侵检测技术是近20年来出现的一种主动保护系统、免受黑客攻击的新型网络安全技术。 www.13191.com 5. This can protect a computer against known malicious programs that could allow a hacker to steal personal information. 这样可将已知恶意程序拒之门外,以防黑客窃取个人信息。 chinese.wsj.com 6. Ginseng is sessional , ma Long still the hand is holding notebook computer in both hands, "Fight with the hacker " . 参会期间,马龙依然手捧着笔记本电脑,“与黑客作战”。 dictsearch.appspot.com 7. Such targeted 'phishing' expeditions involved sending booby-trapped emails to people who have information a hacker is seeking. 在这种针对特定目标的“钓鱼”攻击中,黑客向拥有其所要信息的人士发送设置了陷阱的电子邮件。 c.wsj.com 8. One hacker also allegedly downloaded a sexually compromising photo of one artist and used it to blackmail her. 警方称其中一名黑客还下载了某女明星的私人亲密照片并对其勒索。 www.chinadaily.com.cn 9. "Hacker Croll" was identified as the source of the controversial files, though. 但该名男子被认定为这些文件的源头。 www.bing.com 10. Responsibility for the breach was claimed by LulzSec, a hacker group that called DDoS its "least powerful and most abundant ammunition" . 一个名为LulzSec的黑客组织声称对这起攻击负责,称DDoS是它“威力最小、但最充足的弹药”。 www.ftchinese.com 1. Professor Hacker explained that the percentage would naturally tend to rise or fall with improvements or a deterioration in the economy. JacobHacker教授解释到这一比例自然会随着经济情况改善或是崩溃或涨或降。 www.bing.com 2. What is believed to be the country's biggest hacker training site has been shut down by police in Central China's Hubei province. 中国最大黑客培训网站已被湖北省(中国中部省份之一)警方关闭。 www.transcn.org 3. The status authentication system special status, enables it already to become hacker's numerous arrows. 身份认证体系的特殊位置,使得其早已成为黑客的众矢之的。 www.qk114.net 4. NO ONE SEES A HACKER, A SLASHER AND AN ARSONIST HERE. WHY BE AFRAID OF MERE THINGS? 拥有这些不会成为电脑黑客、电锯狂魔或纵火犯。那为什么仅仅害怕这个呢? bbs.1store.com.cn 5. It acted like a hacker, invading personal computers and data. 就像黑客那样,入侵个人电脑及数据。 www.i21st.cn 6. " Hacker " warfare, in which computer systems are attacked. “黑客”战。用于攻击计算机系统。 dict.veduchina.com 7. You must be careful about storing data on the client side and exposing the functions to a hacker who can get the data. 您必须当心将数据保存在客户端会将函数暴露给能够获得数据的黑客。 www.ibm.com 8. Your mobile phone invades a warning as a result of the hacker. 你的手机由于黑客侵入警告。 www.qyweb.org 9. Can you imagine if your medical charts ended up in some random hacker's hands and then sold to the highest bidder? 你能想象你的病例信息落入了某个电脑黑客手中,然后又被卖给其他人,会是什么样子么? www.bing.com 10. Summary: With hacker attacks in the news frequently these days, we all know that computer security needs to be taken seriously. 简介:由于黑客攻击最近在新闻中屡有报导,我们都知道需要认真地对待计算机安全问题。 www.ibm.com 1. Also, you might recall that this is how a hacker got access to Sarah Palin's Gmail account in 2008. 这个案例可能令你想起2008年萨拉.佩林的Gmail被黑事件。 dongxi.net 2. On some forum, a problem is " China most belle hacker " the attention that the card draws many netizens. 在某论坛上,一篇题为“中国最美女黑客”的帖子引来不少网友的关注。 itzhe.cn 3. His idea is to have a portable pentesting platform wherever you go instead of a "lazy hacker" computer setup. 他的想法是提供一个可移植的pentest平台,您可以直接利用这个平台,而不用再经历懒惰的黑客计算机的设置过程。 www.ibm.com 4. Trojan Horse is a hacker program. It contains two parts: client end (server) program and control end program. 木马是一种黑客程式,它一般由两个程式组成:用户端(伺服器)程式及控制端(控制器)程式。 wishdaemon.com 5. Websites of independent vote monitors and news websites fell under simultaneous hacker attacks before the start of voting Sunday. 周日投票开始前,独立选举监督者的网站和新闻网站同时遭到黑客攻击。 chinese.wsj.com 6. Kelly: He was the prototypical hacker! 凯利:他简直就是黑客的祖师爷! www.bing.com 7. Robert Lay: You hacker you. Thanks for always hooking me up, and flicking off paparazzi. 你真是棒透了,谢谢你常约与我碰面也帮我应付狗仔。 dict.veduchina.com 8. Invasion and every virus's hacker encroachment and structure build safe fire prevention wall system. 黑客的入侵和各病毒的侵害以及构建安全防火墙系统。 wenwen.soso.com 9. Was Hacker worried about cheapening her brand's image by linking it to cartoon characters? 与卡通人物联手后,哈克是否担心会降低自己品牌的形象? www.ftchinese.com 10. Citi revealed the hacker attack, which it detected a month ago, to the Financial Times after the paper made inquiries. 英国《金融时报》发文称,该报向花旗提出询问后,该公司才透露了这一上个月就已发现的黑客攻击事件。 www.forbeschina.com 1. Mr. Li fished these hacker forums for usable lines of code, settling on script for a worm called Nimaya. 李俊在这些黑客论坛寻找可用的代码,最后选中了一个名为“Nimaya”的病毒脚本。 cn.wsj.com 2. Kocher fully expects that the hacker community to attack BD and that its backup mechanisms will be needed. Kocher完全预料到黑客社区会攻击BD ,因而必须有后备机制。 www.bing.com 3. There are (usually) security measures in place to prevent this from happening, but no security is one hundred percent hacker-proof. 此外,电子邮件系统通常采用一些安全措施来防止类似的入侵,然而百分之百“黑客免疫”的安全措施并不存在。 www.bing.com 4. Simply put, XSS exploits holes in the code to introduce a hacker's executable code into another user's browser session. 简单地说,XSS利用代码中的漏洞来将黑客的可执行代码引入另一个用户的浏览器会话中。 msdn2.microsoft.com 5. Caldwellwondered whether the hackers on the Hacker Underground Board, The HUB, would miss him. 考德威尔不知道是否黑客对地下黑客局,枢纽的地位,会怀念他。 blog.sina.com.cn 6. Security is a must, no back doors, must be as hacker proof as possible. 安全是必须的,不,必须作为后门黑客尽可能证明。DDoS保护。 www.bing.com 7. Was Reenan, who later spoke of "being set up by a sinister conspiracy" and died in 2004, really a cover for a nefarious phone hacker? 死于2004年的瑞南后来声称“这是一场险恶的阴谋”,但是它当真只是给邪恶的电话黑客当了替罪羊吗? www.kle100.cn 8. An experienced hacker gaining access to Client A could also potentially find their way into Client B's data too. 经验丰富的黑客如果获取了客户A的访问权,那么他也有可能获取客户B的数据。 www.fortunechina.com 9. In hacker-speak, "own" means to take control of a device. 在黑客的语言里,”拥有“意味着控制某一个设备。 www.bing.com 10. A hacker covers his tracks so good, that there isn't much evidence to convict them. 黑客涵盖他的轨迹是那么好,没有什么大的证据定罪。 zhidao.baidu.com 1. To the life hacker, the Moral Law applies not to a figure of sovereign authority but to yourself. You are your own ruler. 对生活黑客而言,“道”并非服务于君权形象而是你自己,你就是自己的主宰。 www.bing.com 2. The hacker who vandalised the Melbourne Film Festival website shows an attitude typical of China's urban youth. 攻击墨尔本电影节网站的黑客反映了中国城市年轻人的典型心态。 www.bing.com 3. Both factors heighten the danger of a hacker break-in. 这两个因素提高了黑客入侵的危险。 www.bing.com 4. Partial media points out, baidu is probable it is to inbreak by Iranian hacker organization. 有部分媒体指出,百度很可能是遭伊朗黑客组织入侵。 pjprimer.com 5. The hacker uses the server flaw of website of the horse that be hanged and insecure setting to undertake inbreaking . 黑客利用被挂马网站的服务器漏洞和不安全设置进行入侵。 dictsearch.appspot.com 6. The GeoHot Hacker has also announced the software will work on all of the devices of the Apple Company. 黑客GeoHot也已经宣称:软件将能运行在苹果公司的所有设备上。 www.bing.com 7. Q: If my account was compromised, what information about my Real ID friends would a hacker have access to? 问:如果我的账户被盗了,那么黑客能获得我的实名交友信息吗? www.bing.com 8. The plot involves Neo (Keanu Reeves), a mild-mannered software author by day, a feared hacker by night. 电影主角包括尼奥(基努。李维斯),白天是个温文尔雅的软件工程师,夜晚是个令人生畏的黑客。 blog.sina.com.cn 9. Who you were didn't matter as much as what kind of hacker you were. 重要的不是你是谁,而是你是哪一类的黑客。 is.gd 10. Angered by the strike, Mr. Li, who was hanging out at cybercafes in Wuhan, stopped playing computer games to become a hacker. 这次轰炸激怒了正在武汉的网吧里游荡的李俊,他不再玩电脑游戏,开始成为一名黑客。 cn.wsj.com 1. Sometimes it literally is software, like Hacker News and our application system. 有时,它确实就是软件,比如HackerNews和我们的风险投资申请系统。 www.24en.com 2. But the trouble comes from another however: Prevent ab extra hacker to inbreak filch or the information in destroying a database. 但麻烦却来自另一面:阻止外来黑客入侵窃取或破坏数据库中的信息。 www.nwpu.net 3. We become a hacker, content with average performance or we give up entirely. 我们成为骇客,对于平庸表现也心满意足,或者干脆放弃。 blog.sina.com.cn 4. Imagine every hardcore hacker from every movie or television show you have ever seen: they were all in the room. 想像一下您曾经在所有电影电视中看到的每个中坚黑客分子:他们都在那里。 www.ibm.com 5. Witness the plight of Ohio woman Kelli Michetti, who literally became a computer hacker because of her husband's constant online chatting. 俄亥俄州一名叫凯丽·米切尔的妇女的困窘处境就是一个见证。由于她的丈夫经常上网聊天,凯丽成了地道的电脑黑客。 ssh.ggjy.net 6. To the popular press, "hacker" means someone who breaks into computers. 对于大众传媒来说,「黑客」(hacker)是指入侵电脑的人。 www.bing.com 7. By the time Machulis awoke, Hector Martin, a hacker from near Bilbao, Spain, had claimed the prize. 在麦彻里斯刚醒的时候,来自西班牙毕尔巴鄂附近的黑克特-马蒂已经领了奖。 www.bing.com 8. After he was released, he obtained the license plate "X HACKER" for his Nissan but he was still very much in the computer break-in business. 在他之后被释放,他获得了牌照对于他的日产“X砍劈”,但是他仍然是非常在计算机休息-在的生意方面。 dictsearch.appspot.com 9. No one sees a hacker , a slasher and an arsonist here . 没有一个人看到有一个黑客,一个断木机器和一个纵火犯在这儿。 www.bing.com 10. Hacker Safe Logo - Make your customers feel certain that their privacy won't be violated. HackerSafeLogo—让您的客户觉得隐私确实不会受到侵犯。 blog.sina.com.cn 1. Changing this setting will take effect after restarting Anti-Hacker. 该设置将在重启反黑客后生效。 kpchina.net 2. Dark Alex fits much more comfortably into the hacker mould. 亚历克斯暗适应模具黑客入从容得多。 www.cngba.com 3. How Multimedia Electronic Reading Room Avoids the "Hacker" 多媒体电子阅览室如何防止读者“黑客” service.ilib.cn 4. The hacker replaced festival information with the Chinese flag and anti-Kadeer slogans that were last night still disrupting the site. 黑客替换中国国旗和反节日信息热比娅的口号,是昨晚还是破坏网站。 bbs.huanqiu.com 5. That hacker ran into the back of my van and killed my cat. 出租车撞到了我面包车的后背,撞死了我的猫。 www.tingclass.net 6. I realize this sounds far-fetched, but if you're a Lisp hacker you'll know what I mean. 我知道这听上去有点不可思议,但如果你也是一个LISP流的黑客你就会明白我的意思了。 www.bing.com 7. After hacker attack website is procurable, carry out " hang a horse " . 当黑客攻击网站得手后,便实施“挂马”。 dictsearch.appspot.com 8. He worked as a "staff hacker" on the Emacs project and others. 他是Emacs和其他软件的“黑客实验员”。 www.bing.com 9. i started searching all the usual hacker hangouts . 我开始在骇客经常出没处搜寻。 www.ichacha.net 10. Still, even the best programmer in the world can learn something from the lowliest hacker -- a fact many of them forget. 尽管如此,即使世界上最好的程序员也可以从最低级的黑客身上学到东西―这是他们中的许多人忽略的一个事实。 www.ibm.com |
随便看 |
英汉双解词典包含2704715条英汉词条,基本涵盖了全部常用单词的翻译及用法,是英语学习的有利工具。