The crime appears to be part of a broad computer attack on global banking.
盗贼似乎在对全球银行开展广泛的计算机攻击,这起犯罪事件就属其一。
JACK BAUER famously does whatever it takes to save America from disaster, be that disaster nuclear, biological or computer attack.
JACK BAUER以拯救美国于各式灾难而闻名于世,不论这些灾难是核泄漏,生化危机还是计算机攻击。
The goal of the computer attack tools, the report said, is "to deny an adversary access to information essential to conduct combat operations."
报告认为,设计这些电脑攻击工具的目的是“阻挠敌方获得基本信息以开展军事行动的能力”。
In the cyberworld, this rule means you couldn't plan a massive computer attack, even on a military network, without regard for the civilian computer networks that would be affected by that attack.
在虚拟空间里,这个规则意味着你不能规划一个庞大的计算机网络攻击,即使是一个军事网络,也不能够排除民用网络受到牵连。
I have no idea why a boomerang is attacking a plant or whether the magical hovering computer monitor is aiding in the attack or fleeing the scene.
我不知道为什么回力镖会攻击植物,也不知道神奇的悬停电脑显示器是在协助攻击还是逃离现场。
In the case of an attack, military advisers suggested the advantage of being able to operate one computer from another terminal.
在遭受攻击的情况下,军事顾问说明了能从另一个终端操控一台计算机的优势。
Realize, though, that this attack is not reserved strictly for the realm of computer and digital security.
然而我们要认识到,这种攻击并不仅仅存在于计算机和数字安全领域。
However, one computer security expert said that even an attack of this size did not necessarily have to be the work of a large or powerful group.
不过,一名计算机安全专家称,即使是这样大规模的攻击也不一定来自大型或有势力的组织。
A more practical location for this attack is near the shopper's computer or the server.
这种攻击的比较可行的方案是在购物者计算机或者服务器的附近。
Once the attack begins, websites can try to trace the sudden flood of traffic back to the source computer and filter it out, but even that's a complex process.
一旦攻击开始,网站可以尝试追踪突发洪水般的流量找到源计算机并对此加以过滤,但这是一个复杂的过程。
Modern societies are ever more reliant on computer systems linked to the Internet, giving enemies more avenues of attack.
现代社会越来越依赖于有网络连接的计算机系统,这增加了敌人的攻击途径。
Media companies only concentrate on the hackers who attack computer systems rather than the defenders, so some people use the term "hacker" to mean only attacking hackers.
媒体公司只关注那些攻击计算机系统的黑客,而往往忽视那些计算机的保卫者,所以有些人就使用术语“黑客”表示只进行攻击的黑客。
The amount of information now available online about individuals makes it ever easier to attack a computer by crafting a personalised E-mail that is more likely to be trusted and opened.
如今网上大量唾手可得的个人信息使得攻击电脑更加容易,方式是仿造一个更能取得信任并能打开的电子邮件。
When connecting your computer to a network, it becomes vulnerable to attack.
当把您的计算机连接到网络上时,就有了受攻击的可能性。
In a buffer overflow attack, the hacker takes advantage of specific type of computer program bug that involves the allocation of storage during program execution.
在缓冲溢出攻击中,黑客利用了程序执行期间存储分配中的特定计算机程序漏洞。
That same dark side of human nature ensures that there will always be those who misuse computer technology to attack, intrude, and otherwise attempt to do harm to computer systems.
人类邪恶的一面使得总有人会滥用其计算机技术去实施攻击和入侵,那么就是试图去破坏计算机系统。
A new program aims to put the squeeze on malicious software that can disable, infiltrate or transform a computer system into an unwitting zombie - before the cyber attack ever materializes.
一种新的程序旨在对恶意软件施加压力,该程序可以在网络攻击开始之前以禁用,渗透或变换的方法阻止计算机在不知情的情况下成为一个僵尸电脑。
Zero-day attack Computer threats that prey on software weaknesses developers had not identified.
是指电脑被攻击是因为电脑软件上有开发者没有发现的缺陷,从而被黑客利用;
Richard Lawless, a Pentagon official, recently said China had developed a "very sophisticated" ability to attack American computer and Internet systems.
五角大楼官员理查德·劳里斯最近称,中国练就了袭击美国网络系统的“高明”本领。
Most computer security analysts did not cite a specific source of the attack on Twitter.
大多数计算机安全分析都没有提及针对Twitter的具体攻击来源。
A ping flooding attack is a simple DDoS attack in which a computer sends a packet (ping) to another system with the intention of uncovering information about services or systems that are up or down.
ping洪水攻击是一种简单的DDoS攻击。在这种攻击中,一个计算机向另一个系统发送一个包(ping),以找到关于服务或系统的信息。
Internet service providers say they're rarely able to identify the master computer behind a DDoS attack.
互联网服务供应商说,在DDoS攻击后,他们很少能查到僵尸电脑网络的主控计算机。