hackers

美 [ˈhækərz]英 [ˈhækəz]
  • n.黑客(秘密窥视或改变他人计算机系统信息)
  • hacker的复数
hackershackers

hackers

频次

  • 1
    N-COUNT (尤指盗取他人计算机系统中保密信息的)黑客
    A computer hacker is someone who tries to break into computer systems, especially in order to get secret information.

  • 2
    N-COUNT 黑客(指沉迷于电脑之中,无暇顾及其他的电脑迷)
    A computer hacker is someone who uses a computer a lot, especially so much that they have no time to do anything else.

  1. New technology should provide a secure firewall against hackers .

    新技术应该能提供安全可靠的防火墙抵御黑客袭击。

  2. Hackers are said to have started a computer virus .

    据说黑客们已经开始传播一种新的电脑病毒。

  3. Your vital account information lives on the second track , which hackers try to capture .

    你的重要帐户信息存储在第二个轨道上,黑客试图捕获的就是这些信息。

  4. Andrew Hacker , for the record , remains skeptical .

    郑重声明,安德鲁·哈克仍持怀疑的态度。

  5. Hackers then sold the data to a second group of criminals operating in shadowy corners of the web .

    黑客随后将这些数据卖给了在网络阴暗角落活动的第二批罪犯。

  6. Instead , Hacker is pushing for more courses like the one he teaches at Queens College : Numeracy 101 .

    相反,哈克正在推广更多像他在皇后学院教授的一门课程:《算数101》。

  7. " We hear on all sides that we 're not teaching enough mathematics , and the Chinese are running rings around us , " Hacker says .

    “我们听到各方都说我们并没有教授足够的数学知识,而中国人显然胜过我们,”哈克说道。

  8. " I 'm going to leave it to those who are in mathematics to work out the ways to make their subject interesting and exciting so students want to take it , " Hacker says .

    “我会把它留给那些从事数学工作的人,让他们想出方法使数学变得有趣、让人兴奋,以便学生们愿意接受这门课,”哈克说道。

  9. Credit and debit cards , though , are going to be with us for the foreseeable future , and so are hackers , if we stick with magstripe technology .

    不过,在可预见的未来,信用卡和借记卡将与我们同在,而如果我们坚持使用磁条技术的话,黑客也将一直存在。

  10. Hacker 's argument has met with opposition from other math educators who say what 's needed is to help students develop a better relationship with math earlier , rather than teaching them less math altogether .

    哈克的论点遭到了其他数学教育家的反对,他们认为需要的是帮助学生更早地学好数学,而不是全然地教授学生较少的数学知识。

  11. Andrew Hacker , Queens College political science professor , thinks that advanced algebra and other higher-level math should be cut from curricula in favor of courses with more routine usefulness , like statistics .

    皇后学院政治学教授安德鲁·哈克认为,应去掉高级代数和其他高等数学课程,改而支持设置诸如统计学之类较为常规的实用课程。

  12. Such courses , Hacker argues , are a remedy for the numerical illiteracy of adults who have completed high-level math like algebra but are unable to calculate the price of , say , a carpet by area .

    哈克认为,这种课程对于算数差的成年人是一种补教措施,他们虽然学了像代数这样的高等数学,但却无法按面积计算比如地毯之类的价格。

  13. In several recent incidents , hackers have been able to obtain massive information of credit-debit - or prepaid-card numbers using malware , i. e.malicious software , inserted secretly into the retailers ' point-of-sale system — the checkout registers .

    在最近发生的几起事件中,黑客通过在零售商销售点系统的收银台上秘密插入恶意软件获得了大量的信用卡、借记卡或预付卡号码信息。

  14. That 's why 2014 is shaping up as a major showdown : banks , law enforcement and technology companies are all trying to stop a network of hackers who are succeeding in stealing account numbers , names , email addresses and other crucial data used in identity theft .

    所以在2014年,一场重大决战正在形成:银行、执法部门和科技公司都在试图阻止正在成功窃取账号、姓名、电子邮件地址和其他用于身份盗窃的关键数据的黑客网络。

  15. If Apple is forced to write code that lets the F.B.I. get into the Phone 5c used by Syed Rizwan Farook , the male attacker in the San Bernardino attack , who would be responsible if some hacker got hold of that code and broke into its other devices ?

    如果苹果公司被迫编写代码让联邦调查局进入圣贝纳迪诺袭击者赛义德·里兹万·法鲁克用过的iPhone5c的话,如果某个黑客获取了这些代码、用来入侵其他设备,那谁来负责呢?

  16. Also , because the smart home system allows its owner to get home information from anywhere , it leaves the home easy to be attacked by hackers , who may secretly use or change the information in the system .

    另外,由于智能家居系统允许其主人从任何地方获取家庭信息,这使得家庭很容易受到黑客的攻击,黑客可能会秘密使用或更改系统中的信息。

  17. This site was attacked by a hacker last week .

    上周这个网站被黑客攻击了。

  18. The computer hacker wrote that he was from Russia .

    这个计算机黑客自称他来自俄罗斯。

  19. Arranging a meeting with the hackers took weeks againoff-again email exchanges .

    通过几星期电子邮件往来安排见面,他们最终同意了

  20. They think of viruses that infect an organization from the outside.They envision hackers breaking into their information vaults .

    他们考虑来自外部的感染公司的病毒,他们设想黑客侵入到信息宝库中

  21. This paper discusses the formation of innovation behavior of hacker culture .

    论述了黑客文化中创新性行为的形成原因。

  22. Security for information system and prevention from hacker

    信息系统安全和对黑客入侵的防范

  23. This paper presents the importance of hacker tracking and general tracking methods .

    介绍了黑客行为跟踪的重要性以及常用的跟踪方法。

  24. Design and Implementation of the Precaution System Against Hacker Attack

    黑客入侵防范体系的设计与实现

  25. Its products cover anti-virus , network security and hacker protection .

    其产品覆盖反病毒,网络安全和黑客防卫。

  26. Security : In this age of hackers , security has added significance .

    安全性:在现在这个充满黑客的时代,安全性的重要性越来越明显。

  27. The Phenomenon of Hacker and its Implications in the Legal Culture

    黑客现象及其法文化意蕴

  28. Hacker , Network Security and Information War

    黑客、网络安全与信息战

  29. What would happen if hackers tried to take down the system at multiple points ?

    如果有黑客从多个节点攻击我们的电力系统,那么又会发生什么情况?

  30. A good example of this genre would be a standard hacker type attack .

    黑客攻击就是这类攻击手法的典型例子。