Examples of using Hackers use in English and their translations into Vietnamese
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
required to assess systems, the tools hackers use and how to fix vulnerabilities.
Zero-day attacks are frequently delivered via malicious emails, and hackers use them to gain unauthorised access and steal sensitive information.
One of the most common methods we see hackers use is called brute force hacking.
The Angler Exploit Kit is a Web-based utility toolbelt that hackers use to test the defenses of a user's computer.
Hackers use software vulnerabilities and human error to
Several hackers use the Storm Worm to build a botnet
Some hackers use the Storm Worm to create a botnet
Hackers use different techniques to fool an IDS in different ways.
Here are the most likely methods that hackers use to hack your passwords.
Hackers use computer programs that scroll through common names to compile possible user names, and then send spam emails to those usernames.
In this free suite, you get a tool named aircrack that hackers use to crack WPA or WEP passwords.
Spear Phishing is a method which hackers use to target and make victims think that they received a legal email from a familiar entity that they often exchange information.
The new version is designed to stymie some common attack vectors that hackers use when they probe PCs for bugs in the PDF format, or in a viewer application.
Actually, it is the truth that many hackers use so-called key logger to hack people's computer and then they can steal their important files.
In many cases the owner of the website doesn't have a clue that this is happening, hackers use clever ways to hack into a website and add the code that is visible under certain conditions.
To gather hard evidence about the tools hackers use to swipe passwords, Google collaborated with University
If people cannot get to know themselves by their own efforts, perhaps the same technology the hackers use can be turned around and serve to protect us.
worms, trojans and other harmful computer programs hackers use to wreak destruction
worms, Trojans, and other harmful computer programs that hackers use to destroy and access sensitive information.
dangers today are online, where predators, cyberbullies, and hackers use kids to gain access to your home computer.