Examples of using Intercepts in English and their translations into Vietnamese
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
It intercepts all requests coming into your business and allows you to block ports, narrow the traffic
The NSA routinely receives- or intercepts- routers, servers and other computer network
a malicious actor intercepts the Bluetooth signal,
It works with a server which sends the game's packets to all other players that are logged in, but which intercepts and replaces packets so the game uses online IP addresses in its LAN player list.
the NSA has sometimes searched communications from Americans who have not been suspected of wrongdoing- though an NSA official says the agency uses"very precise" searches to avoid those intercepts as much as possible.
It's what's known as a“man-in-the-disk” attack: an app on your phone looks for requests to download something from the internet and intercepts that request to download something else instead, unbeknownst to the original downloading app.
It intercepts all requests to the real server to see if it can fulfill the requests itself If not,
UPAS Kit is a Spybot virus that unauthorizedly intercepts, collects and exfiltrates personal information,
Routers, switches, and servers made by Cisco are booby-trapped with surveillance equipment that intercepts traffic handled by those devices and copies it to the NSA's network, the book states.
They sifted through communications intercepts, tapped informants in Taiwan and China,
Mallory again intercepts, deciphers the message using her private key, possibly alters it if she wants,
the purpose of the Thaad system, which detects and intercepts incoming missiles at high altitudes, is to track missiles launched from China.
If a hacker intercepts the connection during the communication, the connection will simply break and the hacker will
If a hacker intercepts connections in the process of exchanging information, then the connection stops
The targets are chosen by commanders who rely on voice intercepts, satellites, human intelligence, high-altitude surveillance planes and the analysis of people such as Courtney.
activating webcams and microphones, recording every victim with a keylogger, which intercepts Skype calls
traces and intercepts any intercontinental ballistic missiles(ICBM) from North Korea.
traces and intercepts any intercontinental ballistic missiles(ICBM) from North Korea.
incidents took place in February, May and July of that year and involved Chinese fighter jets making what the US considered to be"unsafe" intercepts of Navy surveillance planes.
disinformation to protect the real sources, which could have been anything from intercepts to the Pakistani government itself,” he said.