THE ATTACKER CAN - 翻译成中文

[ðə ə'tækər kæn]
[ðə ə'tækər kæn]
攻击者能够

在 英语 中使用 The attacker can 的示例及其翻译为 中文

{-}
  • Political category close
  • Ecclesiastic category close
  • Programming category close
The attacker could use this information in subsequent attacks against the system.
攻击者可以利用此信息对系统进行进一步攻击。
The attackers can get access to the personal information of millions of people.
攻击者可以获取数百万人的个人信息。
The attackers can get access to the personal information of millions of people.
攻击者可以访问数百万人的个人信息。
By making this determination, the attacker could decide whether or not to continue the attack.
通过这些判断,攻击者可以选择是否继续进行攻击。
The attacker could execute code that hides the attack and the victim may never know his machine was compromised.
攻击者可以执行隐藏攻击的代码,这样受害者可能永远都不知道他的设备是否被盗用。
The attacker could be a disgruntled employee or an outsider using services located behind-the-firewall and perimeter security defenses.
攻击者可能是一位有不满情绪的员工,或者是利用防火墙内服务和周边安全防御的外部人员。
This means the attackers can remotely run any malware on the targeted system or server via their evil DNS service.
这意味着攻击者可以通过其恶意的dns服务,在目标系统或服务器上,远程执行任何恶意软件。
If a user with administrative privileges subsequently logs on to the system, the attacker could run arbitrary code in kernel mode.
如果具有管理特权的用户随后登录该系统,攻击者可在内核模式下运行任意代码。
Cybereason believe the attackers could have been on compromised networks for as long as seven years.
Cybereason认为,攻击者可能在被入侵的网络上潜伏长达7年之久。
This way the attackers can build a map of interactions with various people- and identify the victim's social and professional circles.".
通过这种方式,攻击者可以建立一张与各种人互动的地图,并识别受害者的社会和专业圈子。
The attackers could abuse hijacked websites for various purposes, including spamming, phishing, and other direct or indirect money-making schemes.
攻击者可能出于各种目的滥用被劫持的网站,包括垃圾邮件、网络钓鱼和其他直接或间接的赚钱计划。
In particular, the attackers can use this new attack technique to read information which was supposed to be safe and encrypted.
具体来说,攻击者可以使用这种新颖的攻击技术来读取先前被认为已经安全加密的信息。
Cybereason believes the attackers could have been on compromised networks for as long as seven years.
Cybereason认为,攻击者可能在被入侵的网络上潜伏长达7年之久。
The attacker could sell this information to advertising companies or could leverage it to deliver specific content to the targeted users.
攻击者可以将此信息出售给广告公司,或者利用它向目标用户提供特定“内容”。
The attacker could then manipulate the victim into unknowingly performing actions on the target website.
然后攻击者可以操纵受害者在目标网站上不知不觉地执行操作。
To exploit the vulnerability, the attacker could send specially crafted SMB messages to the Windows Search service.
要利用此漏洞,攻击者可以向WindowsSearch服务发送特制的SMB消息。
As they are tough to detect, the attackers can easily use botnets and rootkits to modify and access your personal information.
由于攻击者难以发现,攻击者可以使用僵尸网络和rootkit来修改和访问您的个人信息。
By doing this, the attackers can then change their device to look like a keyboard or mouse and remote control your laptop.
通过这样做,攻击者可以改变他们的设备,使其看起来像键盘或鼠标,并远程控制你的笔记本电脑。
The attackers can be divided into two groups by their attack characteristic(see Figure 3).
攻击者可以通过其攻击特性分为两组(见图3):.
With a few infected computers, the attackers can easily increase the range of their crimes and impact both small and large-sized organizations.
少数被感染的电脑,攻击者可以轻易增加犯罪的范围,影响小型和大型组织。
结果: 57, 时间: 0.0334

The attacker can 用不同的语言

单词翻译

顶级字典查询

英语 - 中文