What is the translation of " CRYPTOMINING " in Chinese? S

Examples of using Cryptomining in English and their translations into Chinese

{-}
  • Political category close
  • Ecclesiastic category close
  • Programming category close
Cryptomining software could be used to steal corporate secrets.
挖矿软件还可用来窃取公司机密】.
For two years, I owned a cryptomining machine and didn't even know it.
两年来,我拥有一台加密机,甚至不知道它。
Cryptomining is profitable right now because cryptocurrencies are valuable.
加密现在是有利可图的,因为加密货币很有价值。
Windows and Linux Kodi users infected with cryptomining malware.
Windows,LinuxKodi用户感染Cryptomining恶意软件.
We detect the cryptomining campaign as JS: InfectedMikroTik.
我们将该挖矿恶意活动检测为JS:InfectedMikroTik。
By early 2018, 90% of all remotecode execution attacks were associated with cryptomining.
到2018年初,90%的远程代码执行攻击都与加密货币挖矿有关。
For two years, I owned a cryptomining machine and didn't even know it.
在两年的时间里,我一直拥有着一台加密货币挖矿机器,但我却不知道。
As bitcoin jumped in value up to $20,000 in 2017,it became a prime target for cryptomining attacks.
年比特币价值高达20,000美元,成为加密攻击的主要目标。
The number and quality of ready-made cryptomining tools means that criminals don't need to be technically skilled.
现成加密货币挖矿工具的数量和质量意味着罪犯无需多少技术。
With the growing IoT landscape,PC users are no longer the sole victims of cryptomining malware.
随着物联网领域的发展,个人电脑用户不再是加密恶意软件的唯一受害者。
Anti-cryptomining extensions can also be used to pick up both authorized andunauthorized cryptomining on a machine.
反加密扩展也可用于在计算机上获取授权和未授权的加密
Last year, for example, CSO's predictions for 2018did not anticipate the rapid rise of cryptomining.
比如说,去年,CSO网站对2018年的预测就没料想到加密货币挖矿的快速上升。
Cryptomining attackers use similar techniques to other attacks in terms of infection, evasion and persistency.
加密货币挖矿攻击者在病毒感染、逃避机制和攻击持久性方面使用了与其他攻击类似的技术。
Like so many attacks we have witnessed lately,it ended up with the attacker utilizing the server's resources for cryptomining Monero.
就像我们近期发现的许多攻击一样,攻击者最终目的都是为了利用服务器的计算资源来挖门罗币。
Malicious cryptomining appears to be far less dangerous to the user than other forms of malware, such as ransomware.".
恶意加密对于用户而言似乎比其他形式的恶意软件(如勒索软件)要危险得多。
As systems are patched, and advanced threat solutions are updated to better identify cryptomalware,the effectiveness of cryptomining decreases.
随着系统的修补,高级威胁解决方案的更新以更好地识别加密软件,加密的有效性会降低。
Cryptomining code has also been hidden in web browser extensions and other tools that hijack a user's processor.
Cryptomining代码也隐藏在Web浏览器扩展和其他劫持用户处理器的工具中。
If all that sounds like a lot of technical mumbo-jumbo, just know this: The cryptomining process uses your company's devices for someone else's gain.
如果所有这些听起来像是很多技术性的,那请记住一点:加密过程使用你公司的设备来获取别人的收益。
Cryptomining chips accounted for 76% of original equipment manufacturer(OEM) sales, an increase of 115% over the earlier quarter.
加密采矿芯片占(原始设备制造商)OEM营收的76%,较上一季度增长115%。
If all that sounds like a lot of technical mumbo-jumbo, just know this: The cryptomining process uses your company's devices for someone else's gain.
如果所有这些听-安卓刷量-起来像是很多技术性的,那请记住一点:加密过程使用你公司的设备来获取别人的收益。
To protect against cryptomining attacks, organizations must first ensure their systems are fully up to date with all relevant patches.
要防止加密货币挖矿受到攻击,组织方就必须首先确保他们的系统更新所有相关补丁。
Interpol is celebrating after a region-wide operation led to a drastic reduction in thenumber of routers in southeast Asia infected with cryptomining malware.
国际刑警组织(Interpol)正在庆祝一项区域范围内的行动,该行动导致东南亚感染加密恶意软件的路由器数量大幅减少。
However, it's not without consequences: cryptomining malware can slow your home network to a crawl while running up serious energy bills.
然而,这并不是没有后果的:加密恶意软件会让你的家庭网络慢如蜗牛,同时还会导致严重的能源账单。
Check Point's“Cyber Attack Trends:2018 Mid-Year Report” reveals 42% of organizations globally hit by cryptomining attacks, while sophisticated Gen V attacks on cloud infrastructures grow.
CheckPoint最近发表的《网络攻击趋势:2018年中报告》显示,全球42%的组织受到加密货币挖矿软件攻击,对云基础设施的第五代攻击日益增长。
Generally, the cryptomining malware responsible for such malicious activities are designed to use just enough system resources to remain unnoticed as long as possible.
通常,负责此类活动的恶意挖矿软件旨在使用足够的系统资源来尽可能长时间不被注意。
Palo Alto Networks' WildFire platform hasidentified roughly 470,000 unique types of cryptomining malware, not including those delivered through web-based JavaScript activities.
PaloAltoNetworks的WildFire平台已经识别出大约470,000种独特类型的加密恶意软件,不包括通过基于Web的JavaScript活动提供的那些。
Results: 26, Time: 0.0348

Top dictionary queries

English - Chinese