hackers 

99388
单词释义
n.黑客(秘密窥视或改变他人计算机系统信息)
hacker的复数
词根词缀记忆/谐音联想记忆 补充/纠错
巧记速记
谐音记忆
海客… * → hackers
词根记忆
ha… * → hackers
词性拓展记忆 / 词形拓展记忆
原形:hacker复数:hackers
词组和短语补充/纠错
hacker attack 黑客攻击
单词例句
The hacker designed a computer virus.
这个黑客设计了一种电脑病毒。
This hacker had managed to get into the system.
这一个黑客设法侵入了系统。
The tackers broke into the Pentagon's security system last night.
昨晚有黑客闯入五角大楼的安保系统。
The hacker managed to breach the company's firewall and access sensitive data.
这名黑客成功突破了公司的防火墙,获取了敏感数据。
After hours of coding, the programmer identified and fixed a potential security flaw that could have been exploited by hackers.
经过几个小时的编码,程序员识别并修复了一个可能被黑客利用的安全漏洞。
The hacker used social engineering tactics to trick employees into revealing their login credentials.
该黑客使用社会工程学手段诱骗员工泄露他们的登录凭证。
Ethical hackers, also known as white hat hackers, help organizations improve their cybersecurity by finding vulnerabilities legally.
道德黑客,也称为白帽黑客,通过合法地发现漏洞帮助组织提升网络安全。
The cybercrime unit is working tirelessly to track down the hacker responsible for the major data breach.
网络犯罪部门正在不遗余力地追踪造成重大数据泄露的责任黑客。
In the movie, the protagonist is a skilled hacker who uses his abilities for good, stopping cyber attacks on critical infrastructure.
电影中的主角是一名技术高超的黑客,他用自己的能力做好事,阻止了对关键基础设施的网络攻击。
Companies often hire penetration testers, or ethical hackers, to simulate attacks and test the strength of their digital defenses.
公司常聘请渗透测试员或道德黑客来模拟攻击,测试其数字防御的强度。
The hacker forum was taken down by law enforcement agencies after a lengthy investigation.
经过长时间的调查,执法机构关闭了这个黑客论坛。
A group of anonymous hackers claimed responsibility for the website defacement, demanding better privacy laws.
一群匿名黑客声称对网站篡改负责,并要求出台更好的隐私保护法律。
With the rise of cryptocurrency, there has been an increase in hacking attempts targeting digital wallets.
随着加密货币的兴起,针对数字钱包的黑客攻击企图有所增加。
Be it smart light bulbs or self-driving vehicles, these devices have vulnerabilities that hackers could exploit," said Ian Lim, field chief security officer of Japan and Asia-Pacific at Palo Alto Networks, a global cybersecurity leader.
全球网络安全领导者Palo Alto Networks的日本和亚太地区现场首席安全官Ian Lim表示:“无论是智能灯泡还是自动驾驶汽车,这些设备都存在黑客可能利用的漏洞。
Another 44 percent of respondents said that IoT devices are micro-segmented within security zones — an industry best practice where organizations create tightly controlled security zones on their networks to isolate IoT devices to prevent hackers from moving laterally on a network.
另有44%的受访者表示,物联网设备在安全区内进行了细分——这是一种行业最佳实践,组织在其网络上创建严格控制的安全区,以隔离物联网设备,防止黑客在网络上横向移动。
The hostile attacks included network traffic attacks, hacker attacks and unfair scalping.
Hackers are very attracted to the high profile and value of online streaming services, said Patrick Sullivan, director of Akamai's Security Technology and Strategy.
Four Democratic senators have reportedly expressed concern that video surveillance cameras and the automated aspects of railway cars may be the tools of spies or hackers.
Facebook said 15 million people had their accounts compromised after hackers stole their sensitive information including their names, phone numbers, emails and other contact details, while 14 million users were illegally accessed for their user names, gender, religion, geographic location, birthday, work and education status.
The world's largest social media announced on Sept 28 that attackers exploited a vulnerability in Facebook's code that would allow hackers to steal access tokens used by Facebook users as login digital keys and then take control of their accounts.
"The security issue could let hackers steal Facebook access tokens used by Facebook users as login digital keys and then take control of their accounts, Facebook said in a blog post.
"Entering a new era of big data, cybersecurity will become as important as money, and online data will become a key target of criminals and hackers," Qi said.
NAIROBI — Governments and corporations should invest in cloud computing that promises better data storage and retrieval options while protecting it from intrusion by hackers, a Huawei executive said on Thursday in a commentary published by Kenya's daily newspaper People.
"Entering a new era of big data, cybersecurity will become as important as money and online data will become a key target of online criminals and hackers.
Hackers often use China's cloud platforms to launch attacks, said the report, adding that 78.8 percent of all the recorded DDoS attacks on targets in China were initiated from cloud platforms.
Since these vehicles are highly intelligent and networked, there is the possibility that hackers could break into the system and pose a great danger to road safety, Zeng said.
Charlie Miller and Chris Valasek, the world-renowned white-hat hackers and security experts, shared their views on securing self-driving cars at the conference.
"Hackers can attack the intelligent connected vehicles and control the braking systems through cellular network, Bluetooth and CD player," Miller said.
He said that since these vehicles are highly intelligent and networked, there is a possibility that hackers could break into the system and pose a great danger to road safety.
One of the biggest problems for driverless cars is that hackers may enter the vehicles' operating system, according to Deng Feng, co-founder of Northern Light Venture Capital.
He says that, since these vehicles are highly intelligent and networked, hackers might invade the system, thereby posing dangers to road safety.
他说,由于这些车辆高度智能化并联网,黑客可能会侵入系统,从而对道路安全构成威胁。
Another big problem is that hackers may enter the vehicles' operating system.
Ant Group is training its proprietary AI technologies to simulate hacker invasions in a bid to enhance risk-detection capabilities and thus boost its defensive resilience.
Once attacked and controlled by hackers, the consequences can be catastrophic," Zhou said.
Many current AI systems are actually fragile and it's easy for hackers to forge," Tian said.
"Software vulnerabilities are inevitable…Once attacked and controlled (by hackers), the consequences can be catastrophic.
Exploiting these vulnerabilities, hackers could remotely control millions of cars produced by the car company after 2017, Zhou noted.
"Once attacked and controlled by hackers, the consequences may be catastrophic," Zhou, whose security company is known for its anti-virus software, said.
Each such block is connected to those before and behind it, making it difficult to tamper with because a hacker would need to change the block containing that record and all those linked to it to avoid detection.
Diana Kelley, the cybersecurity field chief technology officer at Microsoft Corp, said hackers will increasingly use AI to make malware more destructive.
As the internet of things and cloud greatly expand the number of devices and the amount of data they gather, the area of attack by hackers widens just as sharply as well.
But the increased volumes and the vast variety of data makes it more tempting for hackers and criminals.
"From my knowledge with my Chinese colleagues, the investment in the Chinese banking industry is rising on the security topic because of the risk consciousness and the hackers … Today, the question is no longer 'if you will be attacked' but 'when you will be attacked'.
"Loopring is the protocol for building decentralized exchanges, it enables people to have control over their own crypto-assets during the whole trading process instead of giving their money to centralized platforms which can be the targets of hackers," he said.
In addition to implementing the Cybersecurity Law which came into effect in June 2017, Chinese police have intensified the fight against hackers and hacking activities.
The Ministry of Public Security announced last month that law enforcement officers nationwide solved 2,430 criminal cases involving hackers since the beginning of 2022, leading to the detention of more than 7,000 suspects.
China has been a prominent victim of cyberattacks, with hackers and criminal groups frequently targeting its critical information infrastructure and key industries.
考试真题例句(机器翻译仅供参考)
全部
考研
六级
四级

考研We often hear media reports that an unauthorized hacker has been able to access a computer database and to alter information stored there.

我们经常听到媒体报道说,一名未经授权的黑客能够访问计算机数据库并更改存储在那里的信息。

2013年考研真题(英语二)完形填空 Section Ⅰ

六级Andrew Hacker, Queens College political science professor, thinks that advanced algebra and other higher-level math should be cut from curricula in favor of courses with more routine usefulness, like statistics.

皇后学院政治学教授安德鲁·哈克(Andrew Hacker)认为,高等代数和其他更高层次的数学应该从课程中删去,而改为更实用的课程,如统计学。

2018年12月六级真题(第二套)阅读 Section C

六级"I'm going to leave it to those who are in mathematics to work out the ways to make their subject interesting and exciting so students want to take it," Hacker says. "All that I ask is that alternatives be offered instead of putting all of us on the road

哈克说:“我将把它留给那些数学专业的学生,让他们找到让他们的学科有趣和令人兴奋的方法,这样学生们就会愿意学习。”我所要求的是提供替代方案,而不是让我们所有人上路

2018年12月六级真题(第二套)阅读 Section C

六级Hacker's argument has met with opposition from other math educators who say what's needed is to help students develop a better relationship with math earlier, rather than teaching them less math altogether.

哈克的观点遭到了其他数学教育工作者的反对,他们说,我们需要的是帮助学生更早地发展与数学的关系,而不是教他们更少的数学。

2018年12月六级真题(第二套)阅读 Section C

六级Such courses, Hacker argues, are a remedy for the numerical illiteracy of adults who have completed high-level math like algebra but are unable to calculate the price of, say, a carpet by area.

哈克认为,这样的课程是对成年人数字文盲的一种补救,他们已经完成了像代数这样的高级数学课程,但无法计算地毯的价格。

2018年12月六级真题(第二套)阅读 Section C

考研I found, as Hacker observed years before, that most wives want their husbands to be, first and foremost, conversational partners, but few husbands share this expectation of their wives.

我发现,正如哈克多年前所观察到的那样,大多数妻子希望他们的丈夫首先是谈话的伙伴,但很少有丈夫对妻子抱有同样的期望。

2010年考研真题(英语二)阅读理解 Section Ⅱ

六级Instead, Hacker is pushing for more courses like the one he teaches at Queens College: Numeracy 101.

相反,哈克正在推动更多的课程,比如他在皇后学院教授的课程:算术101。

2018年12月六级真题(第二套)阅读 Section C

四级It does not produce computer hackers and nerds.

它不会产生电脑黑客和书呆子。

2015年12月阅读原文

四级So while there're plenty of hackers who could start startups, there's no one to invest in them.

所以,虽然有很多黑客可以创业,但没有人可以投资。

2015年12月四级真题(第二套)阅读 Section C

六级"I'm going to leave it to those who are in mathematics to work out the ways to make their subject interesting and exciting so students want to take it," Hacker says.

哈克说:“我将把它留给那些数学专业的学生,让他们找到让他们的学科有趣和令人兴奋的方法,这样学生们就会愿意学习。”。

2018年12月六级真题(第二套)阅读 Section C

六级In several recent incidents, hackers have been able to obtain massive information of credit-debit-(借记)or prepaid-card numbers using malware, i. e. malicious software, inserted secretly into the retailers’ point-of-sale system—the checkout registers.

在最近的几起事件中,黑客已经能够获得大量的信用借记信息-(借记)或使用恶意软件的预付卡号码,即恶意软件,秘密插入零售商的销售点系统——收银台。

2015年6月大学英语六级考试真题(三)

六级If Apple is forced to write code that lets the get into the Phone 5c used by Syed Rizwan Farook, the male attacker in the San Bernardino attack, who would be responsible if some hacker got hold of that code and broke into its other devices?

如果苹果公司被迫编写代码,让它进入圣贝纳迪诺袭击事件中的男性攻击者Syed Rizwan Farook使用的Phone 5c,如果有黑客掌握了这些代码并侵入了它的其他设备,谁来负责?

2017年12月英语六级考试真题(卷三)

六级Instead, Hacker is pushing for more courses like the one he teaches at Queens College: Numeracy 10 There, his students of “citizen statistics learn to analyze public information like the federal budget and corporate reports.

相反,Hacker正在推动更多的课程,比如他在皇后学院教授的课程:算术10在那里,他的“公民统计”学生学习分析联邦预算和企业报告等公共信息。

2018年12月6级真题第二套

四级So while there're plenty of hackers (电脑迷) who could start startups, there's no one to invest in them Do you really need the rich people?

所以,尽管有很多黑客(电脑迷) 谁可以创办初创公司,没有人可以投资

2015年12月大学英语四级考试真题(第3套)

未经许可,严禁转发。QQ交流群:688169419
0
近30天助记贡献排行榜
网友新增怎么记信息
最新查询次数奖励榜
0