Install firewall program for computer, prevent individual account information to suffer hacker filch.
為電腦安裝防火墻程序, 防止個人賬戶信息遭到黑客竊取.
期刊摘選
China rejects as nonsense that it a hacker haven.
中國對它是黑客天堂的說法嗤之以鼻.
期刊摘選
Wanna be a hacker and hack Google? Go to Lanxiang!
一則留言說,想成為黑客、黑掉谷歌?
期刊摘選
Caldwellwondered whether the hackers on the Hacker Underground Board, The HUB, would miss him.
考德威爾不知道是否黑客對地下黑客局, 樞紐的地位, 會懷念他.
期刊摘選
Any problems with hacker is breaking your code?
那黑客能破解你們的密碼 嗎 ?
期刊摘選
Our website is temporarily down due to hacker attack, will resume later.
本公司網站因遭黑客入侵破壞, 將在短期內恢復運作.
期刊摘選
Digital symbol Fetishism manifests itself in digital crime, digital virus, digital hacker, and digital indulgence, etc.
數字化符號拜物教的表現形式主要有數字化犯罪 、 數字化病毒 、 數字化黑客 、 數字化沉溺等.
期刊摘選
Why does Tara Kiniski believe this is not the hacker the ICS team must catch?
為什么塔拉?吉尼斯基相信這個不是ICS小組應該抓住的黑客?
期刊摘選
Armitage offers to cure Case's neurological damage in exchange for his services as a hacker.
阿米利奇以治療凱斯作為交換凱斯幫他們去侵入破壞別人電腦的報酬.
期刊摘選
This hacker designed a computer virus that was hard to manage.
這個電腦黑客設計了一種難以對付的病毒.
期刊摘選
Network security protection from hacker attacks.
保護網絡安全,免受黑客攻擊.
期刊摘選
There is virtually no unbreakable code, given enough Red Bull and a dedicated hacker.
事實上, 只要有足夠的紅牛和一個有恒心有毅力的黑客,世上便沒有牢不可破的代碼.
期刊摘選
Police have identified the hacker as a college student.
警方已經確認這名黑客是一個大學生.
期刊摘選
Knowledge is power, thieves learned to become a computer hacker!
知識就是力量, 小偷學會了電腦變成了黑客!
期刊摘選
The hacker Broke into the Bank's computer system.
“黑客”戰(zhàn).用于攻擊計算機系統(tǒng).
期刊摘選
There is a lot of cases of the attack of hacker and computer virus around world.
世界各地不斷發(fā)生因網絡病毒和黑客攻擊導致系統(tǒng)癱瘓的情況.
期刊摘選
The birth and development of hacker culture go sideside with that of information technology.
黑客文化的出現與發(fā)展是和信息技術的產生與發(fā)展同步的.
期刊摘選
Attack Detection able to detect and block hacker attacks.
AttackDetection可偵測及阻止黑客攻擊你的電腦.
期刊摘選
The hacker will be embedded in these computers in the future the tool bag place requires.
黑客會在這些計算機中植入日后攻擊目標所需的工具.
期刊摘選
Antivirus and antispyware programs cannot protect your computer from hacker attacks like a personal firewall does.
防病毒和反間諜程序無法保護您的計算機不受黑客的攻擊一樣的個人防火墻的.
期刊摘選
These websites are open to hacker attack.
這些網站很容易遭黑客入侵.
期刊摘選
The police spent a long time tackling the hacker who ruined the network.
警方花了很長時間對付那個毀壞了電腦網絡的黑客.
期刊摘選
One is security: such systems will be vulnerable to all sorts of hacker attacks.
有一個是安全: 此類系統(tǒng)易受各式各樣的黑客攻擊.
期刊摘選
This is one grooms the hacker grooms the advertisement word of Ban Taotao atelier.
這是一個培訓黑客培訓班濤濤工作室的廣告詞.
期刊摘選
So while there're plenty of hackers who could start startups, there's no one to invest in them.
出自-2015年12月閱讀原文It does not produce computer hackers and nerds.
出自-2015年12月閱讀原文"I'm going to leave it to those who are in mathematics to work out the ways to make their subject interesting and exciting so students want to take it," Hacker says.
2018年12月六級真題(第二套)閱讀 Section C"I'm going to leave it to those who are in mathematics to work out the ways to make their subject interesting and exciting so students want to take it," Hacker says. "All that I ask is that alternatives be offered instead of putting all of us on the road
2018年12月六級真題(第二套)閱讀 Section CAndrew Hacker, for the record, remains skeptical.
2018年12月六級真題(第二套)閱讀 Section CAndrew Hacker, Queens College political science professor, thinks that advanced algebra and other higher-level math should be cut from curricula in favor of courses with more routine usefulness, like statistics.
2018年12月六級真題(第二套)閱讀 Section CInstead, Hacker is pushing for more courses like the one he teaches at Queens College: Numeracy 101.
2018年12月六級真題(第二套)閱讀 Section CSuch courses, Hacker argues, are a remedy for the numerical illiteracy of adults who have completed high-level math like algebra but are unable to calculate the price of, say, a carpet by area.
2018年12月六級真題(第二套)閱讀 Section CI found, as Hacker observed years before, that most wives want their husbands to be, first and foremost, conversational partners, but few husbands share this expectation of their wives.
2010年考研真題(英語二)閱讀理解 Section ⅡThe pattern was observed by political scientist Andrew Hacker in the late 1970s.
2010年考研真題(英語二)閱讀理解 Section ⅡWe often hear media reports that an unauthorized hacker has been able to access a computer database and to alter information stored there.
2013年考研真題(英語二)完形填空 Section Ⅰ"true hackers subscribe to a code of ethics and look down upon crackers"