黑客病毒

  • 网络Hacker virus
黑客病毒黑客病毒
  1. 浅议网络安全与黑客病毒的防范

    On Internet Safety and Hacker and Virus Guard

  2. 能进入系统的后门黑客病毒。

    A backdoor hack into that system .

  3. 互联网上黑客病毒泛滥,信息恐怖、计算机犯罪等威胁日益严重,仅仅运用传统网络安全产品已经无法满足信息安全的需求。

    With the flooding of hacker and virus at Internet , the increasingly serious threatener of information terror and cyber crime , traditional network security products cannot satisfy information security requirements .

  4. 随着Internet技术的不断发展,互联网在给人们带来各种有益信息的同时,黑客、病毒以及恶意破坏等不良因素也随之滋生蔓延,给人类合理有效地利用互联网带来了很大不便。

    With the development of the internet in these years , bad factors such as hackers , viruses , hostile demolition grow as the internet brings people so many kinds of beneficial information .

  5. Microsoft在WindowsXPSP2中提供了一些新的安全性和保密性增强功能,从而更好地保护计算机免受黑客、病毒以及其他联机威胁的攻击。

    Microsoft has made new security and privacy enhancements in Windows XP SP2 to help better safeguard computers from hackers , viruses , and other online threats .

  6. 缓冲区溢出问题是广泛存在的安全隐患,也经常被黑客和病毒利用,C语言是目前被广泛使用的程序设计语言,它同样存在缓冲区溢出问题。

    The problem of buffer area overflow exists in most places and it has been often used by the hackers and the viruses . The C program language is now widely used and has some problems of buffer area overflow , too .

  7. 试论当前网络黑客、病毒的攻击及常见漏洞

    On the Current Network Hackers , Virus Attacks and the Common Vulnerability

  8. 黑客与病毒的泛滥,给系统带来不可估量的损失。

    Overspread of hacker and virus can bring immensurable loss to the computer system .

  9. 反黑客、病毒是网络安全的重要内容。

    To oppose hacker and to prevent virus are the important content of network secure .

  10. 这个软件可以保护您的计算机系统不受黑客和病毒的损害。

    The software can protect that Hackers and virus can 't destroy your computer system .

  11. 如果一台计算机受到黑客或者病毒攻击,那么其中重要的个人信息和软件就有可能丢失。

    If a computer is attacked by a hacker or virus , it could lose important personal information and software .

  12. 最后,它必须是安全的,哪怕是在到处是心怀敌意的黑客和病毒的互联网络环境中也如此。

    Finally , it had to be secure , even in the hostile hacker & and virus filled environment of the Internet .

  13. 网络财务管理的实施面临着技术落后,内控制度不完善以及企业外部的竞争对手、网络黑客和病毒等三大风险。

    The implementation of financial network management is faced with some environmental risks like laggard technology , faulty internal control , competitors , network hackers , viruses etc.

  14. 计算机网络具有开放性、互联性等多样性,而且存在着技术上的弱点及人为因素,致使网络容易受到黑客、病毒等的攻击。

    The network features not only openness and interactiveness but also weakness both in technique and human factors , which causes it vulnerable to the attack of hackers and viruses .

  15. 应从黑客、病毒及信息安全、网络安全的法律防范四方面建立电子政务的安全法律环境。

    In this article four demonstrations about hackers , virus , information security and networks security are put forward on how to build the secure environment of e-government service in law .

  16. 做到绝对安全的网络是不存在的,能做到的是:尽可能增大黑客或病毒的攻击难度,使其不能在预期时间内攻破系统而选择放弃;

    The experiences tell us that the perfect network does not exit , however we can increase the difficulty of attack so that hackers have to give up without breaking into the system after their expected time .

  17. 笔者从计算机的速度快,交易实时性的特点入手,对信息滞后和决策、黑客和病毒、内部人员的管理不善等各种风险和危害进行了分析;

    To start with the swiftness and real time characteristics of the computerized trade , a variety of risks and harmfulness are analyzed , such as communication delay , decision-making , hackers , viruses and the poor management in internal staff .

  18. 由于网络具有联结形式多样性、终端分布不均匀性、开放性、无边界性、自由性等特征,致使网络易受黑客和病毒的攻击,给社会、学校带来了巨大的损失。

    Because the network has joint characteristic and so on form multiplicity , terminal distribution nonuniformity , openness , boundless nature , freedom , causes the network easily the hacker and virus 's attack , for the society , the school has brought massive loss .

  19. 完善的安全策略,避免黑客攻击和病毒侵袭;

    Perfect security strategies to avoid attacks of hackers and viruses .

  20. 通常,计算机黑客和电脑病毒利用安全漏洞入侵计算机系统。

    Usually hackers or computer virus intrude a computer system by security holes .

  21. 因此,本文只谈论了网络伦理中,最为人们关注的计算机犯罪、网络黑客、计算机病毒、软件盗版、侵犯隐私权五个方面的问题。

    Computer crime , Internet hacker , computer virus , software pirating , infringement on the right of privacy are focused on in this paper .

  22. 如何使企业内网免受黑客和计算机病毒的入侵,已经成为企业信息化建设所要考虑的重要事情之一。

    How to make enterprise networks from hackers and computer virus invasion , has become one of the important things of the enterprise information construction .

  23. 另外,整个网络需要接入国际互联网,因此本方案设计了以下措施防止外部黑客和网络病毒的入侵。

    Also the community network will connect to internet , so it is an important requirement to prevent outside hacker , and network virus invasion .

  24. 本文分析上网涉及的安全问题,介绍了关于密码安全、黑客攻击、病毒破坏诸方面的预防措施。

    This article analyses the security problems related to Internet , and then mainly discusses the precautionary measures to protect password , to prevent Internet from hacking and virus damage .

  25. 随着互联网的发展,网络环境下的数据库系统面临着黑客攻击、病毒感染等一系列威胁,如何保证数据的保密性、完整性、可靠性和可用性是个复杂问题。

    With the development of Internet , database system in network is threatened by the attack of hackers and viruses . How can we guarantee the confidentiality , integrity , reliability and availability of data ?

  26. 最近几年以来互联网发生的重大黑客或是病毒事件,基本上都是由于软件漏洞的存在而导致的,而缓冲区溢出漏洞一直是安全漏洞的最常见的一种形式。

    Hacking incidents and virus incidents happened in recent years were mainly caused by the software vulnerabilities , and at the same time , Buffer overflow vulnerability has been a security vulnerability of the most common form .

  27. 由于国内的网络安全发展比较迟,黑客入侵和病毒攻击的手段层出不穷,网络安全主动防护模型还需进一步完善和提高。

    Because network security is a relatively fresh topic for many people in our country and because the varieties of means adapted by hackers have been changing constantly , this active protection module for network need further improvement .

  28. 人们在享受了种种物质和精神文化的同时,也正受到日益严重的来自网络的安全威胁,诸如网络的数据窃贼、黑客侵袭、病毒侵入、甚至系统内部的泄密者等。

    People are enjoying all kinds of material and spiritual culture , however , we are also subject to increasingly serious security from the network threats , such as network data theft , hacking attacks , viruses , intrusion , even those leakage form inside .

  29. 电脑病毒亦然。但不是微生物而是电脑程序。黑客设计的病毒程序会像疾病一样在电脑间传播一旦电脑感染了病毒,它会删除文件、私发邮件、甚至把私人信息泄露给犯罪分子。

    Computer viruses are no different.Instead of germs , they are computer programs.These programs are usually designed by criminals to multiply and spread from computer-to-computer like a disease.If one makes it to your computer , it can erase your files , send emails without your permission or even communicate sensitive info to criminals .

  30. 尽管从NSA泄露的工具未被用来创造“想哭”病毒本身,但这些工具确实帮助黑客加速了该病毒的传播,对世界各地机构造成了严重破坏。

    While the leaked NSA tools were not used to create the ransomware itself , they did help hackers to accelerate its distribution , creating havoc for organisations around the world .