Kimoon Kim, senior architect at Pepperdata:“Kubernetes is software that manages many server computers and runs a large number of programs across those computers..
使用此功能,其他用户可以启动您的计算机并使用您建立的帐户自动登录。
By using this feature, other users can start your computer and use the account that you establish to automatically log on.
他们开发专有的软件系统,设计和生产芯片,开发计算机并创造构成互联网基础的设施。
They developed proprietary software systems, designed and manufactured chips, built computers and created the infrastructure that made the Internet possible.
转到并禁用一堆启动项,然后重新启动计算机并注意其影响。
Go and disable a bunch of startup items, and then restart your computer and notice the impact.
病毒编写者使用这些工具来帮助接管计算机并隐藏他们的工作。
Virus writers use these tools to help take over computers and hide the presence of their work.
这是因为您的防火墙负责阻止任何外部的控制您的计算机并获得访问信息的尝试。
This is because your firewall is responsible for fending off any external attempts to control your computer and gain access to the information on it.
黑客和政府有办法进入您的计算机并打开视频和摄像头。
Hackers and governments have ways of getting into your computer and turning on the video and cameras.
Uninstall Flash Player, restart your computer, and install the latest version of Flash Player before continuing with the recommendations in this article.
请确保您的音频接口已连接至计算机并拥有的电量供应(如有必要,请使用电源)。
Make sure that your audio interface is connected to the computer and receives enough power(use a power supply if necessary).
隐蔽式病毒可以感染计算机并使其处于休眠状态,直至攻击者收回该病毒。
Stealth viruses can infect a computer and lay dormant until summoned by the attacker.
重新启动计算机并通过访问查找版本|FlashPlayer页面来验证FlashPlayer安装。
Restart the computer and verify the Flash Player installation by visiting the Find Version| Flash Player page.
他是一个犯罪策划者,拥有计算机并找到了无法找到的东西。
He was a criminal mastermind with computers and finding things that weren't meant to be found.
修复:重置PRAM重新启动计算机并立即按住options-command-P-R键。
To reset the PRAM, start up the computer and immediately press and hold command-option-P-R.
驾车人士呼吁删除将病毒上传到计算机并窃取人们细节的“超速电子邮件”.
Motorists urged to delete scam‘speeding email' which uploads virus onto computer and steals people's details.
这样,攻击者便可连接到计算机并使用该计算机作为代理以访问其网络资源。
This can potentially allow an attacker to connect to the computer and use it as a proxy to gain access to its network resources.
在有人攻击计算机并安装间谍软件后,攻击者会向间谍软件发送命令以将数据发送回给他们。
After someone hacks a computer and installs spyware, the attacker then sends commands to the spyware to send data back to them.
English
Bahasa indonesia
日本語
عربى
Български
বাংলা
Český
Dansk
Deutsch
Ελληνικά
Español
Suomi
Français
עִברִית
हिंदी
Hrvatski
Magyar
Italiano
Қазақ
한국어
മലയാളം
मराठी
Bahasa malay
Nederlands
Norsk
Polski
Português
Română
Русский
Slovenský
Slovenski
Српски
Svenska
தமிழ்
తెలుగు
ไทย
Tagalog
Turkce
Українська
اردو
Tiếng việt