1. Mallory can now impersonate Bob and steal information from him.
Mallory现在可以模仿bob并盗取他的信息。

来自互联网

2. Online attackers want to control other PCs or steal information.
联机的攻击者想要控制另外的PC或偷窃信息。

来自互联网

3. But the word hacker is also used to describe a person who tries to steal information from computer systems.
但是,黑客一词也用于形容试图从计算机系统非法窃取信息的人。

来自互联网

4. To steal information from a person is called plagiarism. To steal information from the enemy is called gathering intelligence.
从一个人那里偷取信息叫剽窃,从敌人那里偷取信息叫搜集情报。

来自互联网

5. The enemies they're battling slip into computer systems to steal information or wreak havoc and then slip out without being detected.
他们与之抗衡的敌人先是潜进计算机系统窃取信息或者制造破害,然后逃走,而这整个过程都没有被发现。

来自互联网

6. Attackers use network technology, illegally intrude computer system, steal information, tamper data, and bring heavy losses to enterprises.
攻击者利用网络技术,非法入侵他人计算机系统,窃取信息、篡改数据,给企业造成巨大损失。

来自互联网

7. Our systems are targeted by criminals, foreign intelligence services and other malicious actors seeking to exploit our people, corrupt our systems and steal information.
我们的系统就是犯罪分子,外国情报机构以及那些恶意破坏分子攻击的目标,他们企图想利用我们的人民,破坏我们的系统和窃取我们的信息。

来自互联网

8. Our enemies are at work around the clock and around the globe looking for ways to steal information, disrupt business, extort money and maliciously interfere with normal daily life.
我们的敌人是在日以继夜的工作,在全球范围内寻找方法来窃取信息,扰乱业务、勒索钱财和恶意干扰正常的日常生活。

来自互联网

9. He then lays out a body of ethics to help think about how to respect other peoples' data, offering some specific directives (Don't steal information) and also more general thoughts (Motive matters).
他随后又列出了许多帮助人们思考应该如何尊重他人信息的道德规范,并且提出了某些具体的指导(如:不要窃取信息)和更笼统的见解(如:动机很重要)。

来自互联网

10. When these smartphones and laptops log on to the networks which are not real, hackers can easily steal their private information.
当这些智能手机和笔记本电脑登录到不真实的网络上时,黑客可以很容易地窃取他们的私人信息。

来自互联网

11. Since injected scripts can access any part of the DOM tree, they can, among other things, steal password information from the text field of login forms.
因为注入脚本可以访问dom树的任何部分,所以它们可以从登录表单的文本字段中窃取密码信息。

来自互联网

12. The hacker can steal sensitive information from residual data that has not been purged from re-allocated instance resources within a virtual machine.
黑客可以从虚拟机中重新分配的实例资源中获取还没有清除的残留数据,从中窃取敏感的信息。

来自互联网

13. The Georgia Tech report also cautions against the use of hijacked computers, called botnets, to steal personal information from your online accounts and then sell that info to marketers.
佐治亚理工学院的报告还警告说,要防范被劫持的计算机,即所谓的僵尸网络,窃取您网上帐户的个人信息,然后卖给市场上的倒卖分子。

来自互联网

14. Why does anyone think criminals won't be able to use the same system to steal bank account and credit card information, use it to launch other attacks or turn it into a massive spam-sending network?
为什么任何人都觉得犯罪分子不会使用同一个系统来盗取银行账户和信用卡信息,利用它发动其它攻击或者将它变成巨大的垃圾邮件发放网络?

来自互联网

15. Upgrading after a hacker USES this exploit to steal your information is simply too late, especially if you hold sensitive customer data.
在黑客们利用这个盗取你信息之后升级就完了,特别在你持有敏感用户数据的时候。

来自互联网

16. According to the New York Times, the flaw enabled keystroke logging software to be installed, making it an easy trick to steal identity information and passwords.
这个漏洞出现在浏览器里,允许按转键盘记录软件,因而用户很容易被骗取身份信息和密码。

来自互联网

17. A single person was able to steal the personal information of millions of people.
一个人就可以盗窃数百万人的个人信息。

来自互联网

18. Of course, the primary goal of Torpig is to steal financial information like credit card Numbers and bank logins.
当然,Torpig的首要目的是窃取用户的财务信息。这些信息包括信用卡号,银行帐号等等。

来自互联网

19. Facebook accounts can be compromised by an attacker who might steal this information from another site-or guess it by trying many combinations in succession (a so-called brute-force attack).
Facebook的账户可以被黑客破解,通常黑客可能从其他网站盗取或是通过尝试很多种组合(所谓的强力攻击)来猜测这些登录信息。

来自互联网

20. And because this credit card scam doesn't steal the actual card, just the information on the card, it's useless if it can't be used at an e-retailer like Amazon.
因为这种信用卡诈骗并没有盗取实体卡,只是盗取了卡上的信息,因此在像亚马逊之类的电子零售商那里是无法使用的。

来自互联网

21. The goal of the XSS attack is to steal the client cookies or any other sensitive information that can identify the client with the Web site.
XSS攻击的目的是盗走客户端cookies,或者任何可以用于在Web站点确定客户身份的其他敏感信息。

来自互联网

22. The movie, about a group of men led by Leonardo DiCaprio who steal and place information in people's dreams, has a twisting plot that has taken some viewers multiple screenings to fully appreciate.
该片讲述了一群人在莱昂纳多•迪卡普里奥(Leonardo DiCaprio)所饰演角色的带领下,盗取人们梦境中的信息,同时也将信息植入他们的梦境。

来自互联网

23. Some free or low cost applications are designed to serve ads to users; others are designed to steal personal information from users or track their Internet browsing habits.
某些免费或低价的应用在设计上都会向用户推送广告:其他一些则会处心积虑盗窃用户的个人信息或跟踪其互联网浏览习惯。

来自互联网

24. Some free or low cost applications are designed to serve ads to users; others are designed to steal personal information from users or track their Internet browsing habits.
某些免费或低价的应用在设计上都会向用户推送广告:其他一些则会处心积虑盗窃用户的个人信息或跟踪其互联网浏览习惯。

来自互联网