1. Mallory can now impersonate Bob and stealinformation from him.
Mallory现在可以模仿bob并盗取他的信息。
来自互联网
2. Online attackers want to control other PCs or stealinformation.
联机的攻击者想要控制另外的PC或偷窃信息。
来自互联网
3. But the word hacker is also used to describe a person who tries to stealinformation from computer systems.
但是,黑客一词也用于形容试图从计算机系统非法窃取信息的人。
来自互联网
4. To stealinformation from a person is called plagiarism. To steal information from the enemy is called gathering intelligence.
从一个人那里偷取信息叫剽窃,从敌人那里偷取信息叫搜集情报。
来自互联网
5. The enemies they're battling slip into computer systems to stealinformation or wreak havoc and then slip out without being detected.
他们与之抗衡的敌人先是潜进计算机系统窃取信息或者制造破害,然后逃走,而这整个过程都没有被发现。
来自互联网
6. Attackers use network technology, illegally intrude computer system, stealinformation, tamper data, and bring heavy losses to enterprises.
攻击者利用网络技术,非法入侵他人计算机系统,窃取信息、篡改数据,给企业造成巨大损失。
来自互联网
7. Our systems are targeted by criminals, foreign intelligence services and other malicious actors seeking to exploit our people, corrupt our systems and steal information.
8. Our enemies are at work around the clock and around the globe looking for ways to stealinformation, disrupt business, extort money and maliciously interfere with normal daily life.
9. He then lays out a body of ethics to help think about how to respect other peoples' data, offering some specific directives (Don't stealinformation) and also more general thoughts (Motive matters).
10. When these smartphones and laptops log on to the networks which are not real, hackers can easily steal their private information.
当这些智能手机和笔记本电脑登录到不真实的网络上时,黑客可以很容易地窃取他们的私人信息。
来自互联网
11. Since injected scripts can access any part of the DOM tree, they can, among other things, steal password information from the text field of login forms.
因为注入脚本可以访问dom树的任何部分,所以它们可以从登录表单的文本字段中窃取密码信息。
来自互联网
12. The hacker can steal sensitive information from residual data that has not been purged from re-allocated instance resources within a virtual machine.
黑客可以从虚拟机中重新分配的实例资源中获取还没有清除的残留数据,从中窃取敏感的信息。
来自互联网
13. The Georgia Tech report also cautions against the use of hijacked computers, called botnets, to steal personal information from your online accounts and then sell that info to marketers.
14. Why does anyone think criminals won't be able to use the same system to steal bank account and credit card information, use it to launch other attacks or turn it into a massive spam-sending network?
15. Upgrading after a hacker USES this exploit to steal your information is simply too late, especially if you hold sensitive customer data.
在黑客们利用这个盗取你信息之后升级就完了,特别在你持有敏感用户数据的时候。
来自互联网
16. According to the New York Times, the flaw enabled keystroke logging software to be installed, making it an easy trick to steal identity information and passwords.
这个漏洞出现在浏览器里,允许按转键盘记录软件,因而用户很容易被骗取身份信息和密码。
来自互联网
17. A single person was able to steal the personal information of millions of people.
一个人就可以盗窃数百万人的个人信息。
来自互联网
18. Of course, the primary goal of Torpig is to steal financial information like credit card Numbers and bank logins.
当然,Torpig的首要目的是窃取用户的财务信息。这些信息包括信用卡号,银行帐号等等。
来自互联网
19. Facebook accounts can be compromised by an attacker who might steal this information from another site-or guess it by trying many combinations in succession (a so-called brute-force attack).
20. And because this credit card scam doesn't steal the actual card, just the information on the card, it's useless if it can't be used at an e-retailer like Amazon.
22. The movie, about a group of men led by Leonardo DiCaprio who steal and place information in people's dreams, has a twisting plot that has taken some viewers multiple screenings to fully appreciate.
23. Some free or low cost applications are designed to serve ads to users; others are designed to steal personal information from users or track their Internet browsing habits.
24. Some free or low cost applications are designed to serve ads to users; others are designed to steal personal information from users or track their Internet browsing habits.