What is the translation of " TO THE HACKER " in Chinese?

Noun
与黑客
到黑客
的黑客

Examples of using To the hacker in English and their translations into Chinese

{-}
  • Political category close
  • Ecclesiastic category close
  • Programming category close
Then go to the hackers you meet with specific questions.
然后再去向你遇到的黑客请教特殊的问题。
Millions british data are being threatened due to the hackers.
百万英国数据正在因黑客威胁.
According to the hacker, at least one person has already purchased data for Dubsmash.
名黑客称目前已经有一人购买了Dubsmash的数据库。
But experts and government alike warn against ceding to the hackers' demands.
但专家和政府都提醒不要顺从黑客的要求。
That money is now transferred to the hacker and the server thinks you made the transaction.
这笔钱现在会转账给黑客,服务器认为你做了交易。
An AT& T storeemployee in Connecticut relocated her phone number to the hacker.
康涅狄格州的AT&T商店员工将她的电话号码重新安置给了黑客
Luckily for him, his photos were not of any concern to the hacker, but other people might not be so lucky.
幸运的是,他的照片与黑客无关,但其他人可能不会那么幸运。
The malware works by hacking into banks and businesses andmaking rogue financial transfers that are eventually funneled back to the hackers.
其工作原理是侵入银行和企业并进行流氓财务转账,最终转到黑客名下。
Thankfully for him, his images were not of any issue to the hacker, however other individuals may not be so lucky.
幸运的是,他的照片与黑客无关,但其他人可能不会那么幸运。
They're a one-size-fits-all gadget and if any phones are the victim ofcybercrime then all of that data becomes accessible to the hacker.
它们是一个万能的小工具,如果任何手机成为网络犯罪的受害者,那么黑客就可以访问所有这些数据。
Fortunately for him, his photographs weren't of any concern to the hacker, however different folks won't be so lucky.
幸运的是,他的照片与黑客无关,但其他人可能不会那么幸运。
Griffith has contributed to the hacker magazine 2600, which tweeted Friday that his arrest amounted to“an attack on all of us.”.
格里菲斯是撰稿人的黑客杂志2600发表声明说,他的被捕是“对我们所有人的攻击”。
If installed on an internal computer,Loki can use ICMP to phone home to the hacker outside of the network.
如果安装在内部电脑上,Loki可以使用ICMP回叫网络外的黑客
AT&T reportedly cut off access to the hackers only after they managed to steal“substantial funds” from Terpin.
据报道,AT&T在黑客从特平账户窃取“大量资金”后,才切断了对他们的访问。
When Jeff Moss started Defcon in 1993,it was unheard of to bring kids to the hacker conference in Las Vegas.
当杰夫•莫斯(JeffMoss)1993年启动Defcon时,天辰app客户端没有听说过他会带孩子们去拉斯维加斯参加黑客大会。
Nginx has not yet responded to The Hacker News emails or released any public statements on the situation.
目前,Nginx尚未对TheHackerNews的相关问题做出回应,也未就此事发表任何公开声明。
Alternatively, the hacker crafts a fake email from alegitimate sender with instructions to transfer funds to the hacker's ghost account.
或者,黑客制作来自合法发件人的假电子邮件,其中包含将资金转移到黑客幽灵帐户的指令。
In January 2015, API suddenly announced that due to the hacker attack, all investors lost 1.2 billion dollars in a flash.
年1月,API突然宣布,因遭受“黑客攻击”,所有投资者的12亿美元资金瞬间赔光了。
Virus or trojans are malicious software programs which get installed into the victim's system andkeeps sending the victims data to the hacker.
病毒或特洛伊木马是恶意软件程序,它们被安装到受害者的系统中并不断将受害者数据发送给黑客
Users are unaware that they are giving permission to the hacker and not the authentic app they believe they're using.
而用户对此毫无察觉,没有意识到他们是在授予黑客权限,而不是他们认为正在使用的真实应用程序。
Some former News International employees' names and mobile phone numbers havebeen given out on Twitter by people affiliated to the hacker collective Anonymous.
一些前新闻国际雇员的名字和移动电话号码,已被黑客组织Anonymous成员在Twitter上泄漏。
Facebook similarly said that it deleted accounts linked to the hackers and notified others who were in contact with those accounts.
Facebook也发表声明指出,该网站删除了与朝鲜黑客有关的账号,并提醒与这些账号发生过联系的其他用户。
Virus or trojans are malicious software programs which are installed into the victim's computer system andkeeps sending the victim's data to the hacker.
病毒或特洛伊木马是恶意软件程序,它们被安装到受害者的系统中并不断将受害者数据发送给黑客
Other computers acted as relay points,sending the stolen data back to the hackers and disseminating orders for the network.
其他计算机充当中继点,将窃取的数据发送回黑客并传播网络的命令。
According to The Hacker News, the intruders managed to steal the names, email addresses, dates of birth, and hashed passwords of around 4,500 people.
根据《黑客新闻》,入侵者设法窃取了大约4,500人的姓名,电子邮件地址,出生日期和哈希密码。
Every day the BugDrop malware sends the sound files to a Dropbox file,where it's uploaded to the hackers for further analysis.
每天,BugDrop恶意软件都将这些音频文件发送给一个Dropbox文件,上传给黑客做进一步分析。
This infected device then serves as a DDoS master to the hacker, and using it the hacker begins to search for more vulnerable IoT devices.
这个被感染的设备然后用作黑客的DDoS主机,并且使用它,黑客开始搜索更易受攻击的IoT设备。
Many modern breaches involve software that becomes resident on your network andthen tries to send sensitive data to the hacker's system via the Internet.
许多现代泄露涉及软件:软件驻留在网络上,然后尝试将敏感数据通过Internet发送到黑客的系统。
According to the Hacker News Hiring Trends ranking, companies are increasingly interested in Python skills which dominate the list, followed by JavaScript and Golang.
HackerNews招聘趋势根据HackerNews招聘趋势排名,公司对掌握Python技能的人员越来越感兴趣,其次是JavaScript和Golang。
Theoretically, someone could hack into the blockchain and alter the record to make it look likeprevious bitcoin transactions transferred money to the hacker's account.
理论上来说,有人可以黑进区块链,改变记录,使之看起来像以前的比特币交易记录,并将资金转移到黑客的账户中。
Results: 3843, Time: 0.0361

Word-for-word translation

Top dictionary queries

English - Chinese