Examples of using Computer hacking in English and their translations into Russian
{-}
-
Colloquial
-
Official
Computer hacking and so on.
Identity theft, computer hacking.
There's computer hacking message boards, of course, but the one that he visited the most was this one.
Um… how are you at computer hacking?
There's computer hacking, and more recently, there's biohacking.
What do you call computer hacking?
A genius in computer hacking and security who can do anything on any computer, or phone.
Okay, so today we're going to learn about computer hacking.
TMI is doing full-on computer hacking and Reese Lansing knows?
You know, like… nunchaku skills,bow hunting skills… computer hacking skills.
TMI is doing phone and computer hacking and Reese Lansing knows?
Christopher Chaney from Jacksonville, Florida,later pleaded guilty in federal court to nine counts of computer hacking.
TMI is doing phone and computer hacking and Reese Lansing knows?
Several States were concerned about the potential for offenders to obtain large amounts of identity information through computer hacking.
Something to do with computer hacking and domestic intelligence gathering.
To compensate, she renamed herself Oracle andbegan using her expertise in computer hacking and weaponry to fight crime.
And I would like to bring the Treasury's attention to a common computer hacking practice called ghosting, in which the hacker only needs access to a parasite computer to get it to do his or her will.
The real challenge seems to lie in physically protecting satellite ground stations orprotecting operational systems from outside interference such as computer hacking.
Well, you do understand that computer hacking and pickax hacking are different?
However, it was noted that the definition should be broadened so as to include criminal acts whose purpose was not profit- oriented,such as terrorism and computer hacking.
She was convicted last year in Seattle for computer hacking with intent to disrupt the I.R.S.
Other forms of crime committed by organized criminals, as reported by some countries, included unlawful banking, offences related to irrecoverable credit,blackmail against business enterprises and computer hacking.
As several speakers noted,that had given way to new crimes involving computer hacking, attacks on computer networks and the abuse of the Internet for the commission of offences.
One such example is the US Department of Justice website for directing members of the public to the appropriate authorities to report computer hacking, fraud and other Internet-related crime113.
The list contains, inter alia, kidnapping, drug-related offences, graft and corruption, plunder, robbery, illegal gambling, piracy, qualified theft, swindling,smuggling, computer hacking and piracy, violations of the Consumer Act, hijacking, terrorism and securities fraud.
In contrast, the Philippines indicated that its Anti-Money-Laundering Law applied to a large number of predicate offences, including kidnapping, drug-related offences, graft and corruption, plunder, robbery, illegal gambling, piracy, qualified theft, swindling,smuggling, computer hacking and piracy, violations of the Consumer Act, hijacking, terrorism and securities fraud.
Faking a computer hack isn't that complicated.
Look, suddenly we need a door opened, or a computer hacked. McKay should be there to do it.
In this regard, today there is a numberof botnet networks and it is enough to buy stolen credit-card numbers and computers hacking became a usual method of making money.
It's like hacking a computer.