Malicious hackers use ActiveX as an opportunity to exploit users. All this is then sent back to the hackers who use it for their corrupt purposes. 黑客使用 NFC支持的设备来记录RFID芯片中所有未加密的数据,然后通过无线信号进行广播。Hackers use NFC-supported devices that record all the unencrypted data from the RFID chips and then broadcast through wireless signals. 据“泰晤士报”报道,这些黑客使用 的方法与中国军方过去的攻击类似。 According to the Times, the methods these hackers used were similar to past attacks by the Chinese military. 黑客使用 DDoS攻击转移安全人员注意力,以便他们可以从账户窃取敏感信息或钱财。Hackers use DDoS attacks to distract security staff so that they can steal sensitive information or money from accounts.". Combinations with other parts of speech
黑客使用 “GetTranscript”程序,该程序允许您在线查看税务历史记录。Hackers used “Get Transcript” program, which allows you to check tax history online. 首先,它包含战胜或者至少降低黑客使用 的标准软件工具的有效性:调试器和反汇编程序。 First, it contains techniques to defeat, or at least reduce the effectiveness of, the standard software tools that the hacker uses : debuggers and disassemblers. 尤其是在网络钓鱼邮件诈骗依然是黑客使用 的头号手段之时,Cylance的软件就是网络安全空间的游戏规则改变者。 Especially when phishing email scams are still the number one method hackers use , Cylance's software is a gamechanger in the cybersecurity space. 举一个例子,Akamai观察黑客使用 称为"admin"授权网络视频录像机SSH隧道的帐户。 In one example, Akamai observed hackers using an account called"admin" to authorize an SSH tunnel to a network video recorder. 了解黑客使用 的各种方法也可以帮助企业更有效地培训其数字安全团队。 Knowing the various methods hackers use can also help you to train your team in digital security more effectively. 目前还不清楚为什么,黑客使用 的已编码的字符串,这有效地向任何人透露他们的目标。 It's unclear why the hackers used the encoded strings, which effectively reveal their targets to anyone.”. 而早在2009年10月,黑客使用 恶意软件瞄准瑞士外交部,进入了它的电脑系统,从而顺利获得一系列敏感文件的访问权限。 In October 2009 hackers used malware to target the Swiss foreign ministry, entering its computer network and accessing various sensitive documents. 黑客使用 该网络发送垃圾邮件和启动拒绝服务攻击,并可能将该网络租给其他网络犯罪分子。The hacker uses the network to send spam and launch Denial of Service attacks, and may rent the network out to other cybercriminals. 这包括黑客使用 恶意代码,可以在购买时窃取客户的付款信息。 This includes hackers using malicious code that can steal customers' payment information as they make their purchases. 高级黑客使用 一些复杂的(以及一些不太复杂的)算法来尝试随机猜测您的密码。 Advanced hackers use some sophisticated(and some not very sophisticated) algorithms to try and randomly guess your password. 黑客使用 网络爬虫来查找网站文件夹中的所有文件,主要是HTML和Javascript。Hackers use Web Crawlers to find out all the files in a website's folder mostly HTML and Javascript files. 研究人员认为,这些黑客使用 的是一个中国黑客团队之前使用过的工具,中方回应。 The researchers said the hackers used tools previously used by a Chinese hacking group. 位的短密钥也有同样的问题,甚至104密钥也是如此,会被黑客使用 数据捕获软件攻破。 The same concept holds true for a short 40-bit key, even 104-bit, key that can be compromised by hackers using data capture software. 研究人员认为,这些黑客使用 的是一个中国黑客团队之前使用过的工具。 The researchers said the hackers used tools previously used by a Chinese hacking group. 原因是黑客使用 “数据URI”,将合法地址插入假域。 The reason is that hackers use "data URI" which inserts a legitimate address into the fake domain. OIG在报告中说,黑客使用 “一个被破坏的外部用户系统”来访问JPL任务网络。 The OIG report said the hackers used "a compromised external user system" to access the JPL missions network. 这是因为黑客工具产生相同的有效载荷和攻击模式,并且许多黑客使用 它们,无论其帽子的颜色如何。 These tools generate the same payloads and attack patterns, and many hackers use them, regardless of the color of their hat. 这是因为黑客工具产生相同的有效载荷和攻击模式,并且许多黑客使用 它们,无论其帽子的颜色如何。 This is because hacking tools generate the same payloads and attack patterns, and many hackers use them, regardless of the color of their hat. 黑客使用 垃圾邮件来传播木马,在大多数情况下,Chanitor通过银行木马侵入到受害者的机器设备里。Crooks use spam email to spread the trojan, and in most cases, Chanitor infects victims' machines with banking trojans. 该公司表示,黑客使用 的工具和技术同之前使用中文的网络间谍组织相似。 The reports indicated the techniques used by the hackers were similar to those previously associated with Chinese cyberespionage agents.Wireshark经常被黑客使用 ,因此许多网络管理员都对此持谨慎的态度。 Wireshark is regularly used by hackers and so many network administrators are wary of it. 在系统中创建一个供黑客使用 的后门;更改日志文件;. Create a"backdoor" into the system for the hacker's use ; alter log files; 去年,研究人员发现黑客使用 BITS“通知”功能传播恶意软件并保持系统持久性能。 Last year, researchers identified hackers who used a BITS“notification” feature to deliver malware and maintain system persistence.
Display more examples
Results: 28 ,
Time: 0.0175