phishing是什么意思,phishing中文翻譯,phishing發(fā)音、用法及例句
?phishing
phishing發(fā)音
英:[?f????] 美:[?f????]
英: 美:
phishing中文意思翻譯
n. 網(wǎng)絡(luò )釣魚(yú)(通過(guò)互聯(lián)網(wǎng)或電郵騙取他們身份證件、銀行賬號等以**金錢(qián))
phishing常見(jiàn)例句
1 、Despite high-profile examples of internet security breaches, such as the recent incident of phishing email scams,───盡管互聯(lián)網(wǎng)安全隱患重重,比如最近發(fā)生的多起網(wǎng)絡(luò )釣魚(yú)郵件和垃圾郵件,
2 、At the same time also opposed to phishing and malicious software protection.───同時(shí)還包括反對網(wǎng)絡(luò )釣魚(yú)和惡意軟件的保護功能。
3 、Related: Can you spot a cleverly disguised phishing e-mail?───相關(guān)信息: 你能否找到巧妙偽裝的網(wǎng)絡(luò )釣魚(yú)電子郵件?
4 、Phishing is the malicious practice of luring you into disclosing your personal information, such as your bank account number and password.───網(wǎng)絡(luò )仿冒是一種引誘您泄露個(gè)人信息(如銀行帳號和密碼)的惡意行為。
5 、This update resolves a performance issue with the Internet Explorer Phishing Filter when visiting web pages that contain multiple frames or when multiple frame navigations occur quickly.───安裝此更新可解決造訪(fǎng)多框架網(wǎng)頁(yè)或多框架瀏覽迅速發(fā)生時(shí),Internet Explorer網(wǎng)路釣魚(yú)篩選器可能發(fā)生的效能問(wèn)題。
6 、Phishing - the act of falsifying the identity of a known brand or organisation to steal personal details - is one of the biggest threats to personal online security, according to AOL.───根據AOL統計,網(wǎng)絡(luò )釣魚(yú)即假借知名公司的名義對電腦用戶(hù)進(jìn)行詐騙,**用戶(hù)個(gè)人信息的行為是個(gè)人網(wǎng)絡(luò )安全的最大威脅。
7 、Vishing An ingenious new type of phishing scam that uses VoIP telephony to entrap its victims is emergered.───網(wǎng)上話(huà)音欺騙一種剛剛出現的頗有創(chuàng )意的網(wǎng)上釣魚(yú)式欺騙新類(lèi)型,它利用IP**誘騙受害者。
8 、Similar to phishing, smishing uses cell phone text messages to deliver the "bait" to get you to divulge your personal information.───與網(wǎng)絡(luò )釣魚(yú)方式類(lèi)似,**詐騙通過(guò)手機文字信息放“餌”以誘使你泄露個(gè)人信息。
9 、-- China's largest 3 C shopping mall site Jing-dong of the Customer Service Department staff recently Youdian Fan, the original phishing sites targeting them.───本報訊 國內最大的3C購物網(wǎng)站京東商城客服部的工作人員最近有點(diǎn)煩,原來(lái)釣魚(yú)網(wǎng)站盯上了他們。
10 、There is also new protection against phishing (the use of fraudulent e-mail messages that might trick you into divulging personal information).───此外,還有一種新的網(wǎng)絡(luò )仿冒(使用欺詐性電子郵件誘使您透露個(gè)人信息)防范功能。
11 、Pharming is more insidious than the better-known phishing scam because a pharm redirects a user’s request for a legitimate URL to a phony Web site.───無(wú)誘餌欺騙比更出名的釣魚(yú)式欺騙還要陰險,因為無(wú)誘餌欺騙將用戶(hù)對合法URL(**)的請求轉到假冒的網(wǎng)站。
12 、A number of phishing attacks also surged up .in June.───很多釣魚(yú)式的攻擊也迅速增長(cháng)。
13 、Configuring the fake phishing web site to record any input data that the user submits (such as usernames and passwords), silently log them and then forward the user to the real web site.───將假冒的釣魚(yú)網(wǎng)站配置成記錄用戶(hù)提交的所有數據并進(jìn)行不可察覺(jué)的日志,然后將用戶(hù)重定向到真實(shí)的網(wǎng)站。
14 、Phishing att ...───Hotmail曝逾萬(wàn)密碼.
15 、Phishing is the luring of sensitive information through e-mail, such as passwords and other personal information, by an attacker masquerading as someone trustworthy.───網(wǎng)絡(luò )仿冒是指攻擊者偽裝成某個(gè)可信賴(lài)的身份,通過(guò)電子郵件騙取敏感信息(例如密碼和其他個(gè)人信息)。
16 、The general belief of SSL providing security is precisely why many of the newer phishing scams that use SSL are tricking people into giving up personal information.───對SSL提供安全的普遍信心正好是為什么一些新網(wǎng)絡(luò )釣魚(yú)詭計使用SSL哄騙人們放棄個(gè)人信息的原因。
17 、In the To line, type the e-mail address of the company to whom you are reporting the phishing message.───在“收件人”行中,鍵入您要向其舉報網(wǎng)絡(luò )仿冒郵件的公司的電子郵件地址。
18 、New Phishing Attacks Eliminate Need for Target Web Site───新的網(wǎng)頁(yè)篡改攻擊已不需要目標網(wǎng)站
19 、In any phishing attack scenario, it is the social engineering skills of the perpetrator, which determine the phishing attempts' success rate.───對于任何一個(gè)一般的釣魚(yú)攻擊來(lái)說(shuō),成功概率的高低決定于犯罪者運行社會(huì )工程學(xué)技能的好壞(因此實(shí)際成功的幾率并不高)。
20 、In some cases, organizations involved in phishing attacks were contacted directly, or the incident data was forward to the local CERT .───在一些案例中,我們與被涉及網(wǎng)絡(luò )釣魚(yú)攻擊的組織進(jìn)行了直接聯(lián)系,或者將這些攻擊相關(guān)的數據轉交給當地的應急響應組織。
21 、phishing attacks───phishing攻擊
22 、Abstract: With the development of internet,as one form of network cheats,phishing has brought a great deal of economy loss to enterprise and individual user.───摘 要: 隨著(zhù)網(wǎng)絡(luò )應用的迅速普及,“網(wǎng)絡(luò )釣魚(yú)”形式的網(wǎng)絡(luò )欺詐案件給不少企業(yè)和個(gè)人用戶(hù)帶來(lái)了巨大的經(jīng)濟損失。
23 、" When the potential victim clicks on the e-mailed link, the redirector checks all the phishing sites, identifies which are still live, and invisibly redirects the user to one.───當受害者點(diǎn)擊這些鏈接后,重定向系統就會(huì )檢查所有的詐騙站點(diǎn),找出其中仍然有效的鏈接,然后誘使受害者訪(fǎng)問(wèn)這些站點(diǎn)。
24 、For that reason, my research group at Carnegie Mellon University is studying the best ways to teach people to recognize and avoid phishing scams.───因此,我在美國卡內基美倫大學(xué)的研究團隊,正在研究教導大家辨認并避開(kāi)網(wǎng)釣郵件的最佳方式;
25 、Some phishing emails threaten a dire consequence if you don't respond.───如果你不回應,一些“網(wǎng)絡(luò )釣魚(yú)”電子郵件還以可怕的后果恐嚇你。
26 、As early as last December, Symantec began monitoring to the Beijing Olympics-related phishing spam.───早在去年12月,賽門(mén)鐵克便開(kāi)始監測到與北京奧運相關(guān)的網(wǎng)頁(yè)仿冒垃圾郵件。
27 、SP2 contains a new Phishing Protection feature to be used with the Outlook Junk Email Filter.───SP2包含新的網(wǎng)絡(luò )仿冒保護功能,可以與Outlook垃圾郵件篩選配合使用。
28 、The application's components also enable users to protect their computers against currently unknown threats and phishing, and to restrict users' access to the Internet.───應用程序的組成部分還使用戶(hù)能夠保護自己的計算機免受目前未知的威脅和網(wǎng)絡(luò )釣魚(yú),并限制用戶(hù)的上網(wǎng)。
29 、The 2007 Microsoft Office system helps to mitigate these risks to help protect you from homograph attacks used in phishing schemes.───2007 Microsoft Office System有助于降低這些風(fēng)險以幫助您抵御仿冒騙術(shù)中使用的形似字攻擊。
30 、Scams involving the design and hosting of fake webpages for phishing attempts, as well as the “mailer” applications used to send phishing e-mails, are also popular.───干系到設計的欺詐、為進(jìn)行網(wǎng)絡(luò )釣魚(yú)而布置的虛假網(wǎng)頁(yè)以及通常會(huì )發(fā)送“釣魚(yú)”郵件的“郵件**”程序同樣都是非常流行的手段。
31 、How Office helps protect you from phishing schemes───Office如何幫助您防御網(wǎng)絡(luò )仿冒騙局
32 、When the phishing e-mails go out, all include a link to yet another site, a "central redirector.───然后詐騙者發(fā)出釣魚(yú)郵件,它們都包含一個(gè)實(shí)際上指向其它站點(diǎn)的鏈接。
33 、Warm Reminder: Be careful! Phishing emails are spreading again.───提提您:請各位小心,欺詐郵件再次出現!
34 、The P100 stamp indicates that the message contains a URL that is present in a phishing definition file.───P100標記指示郵件包含一個(gè)在冒仿定義文件中出現的URL。
35 、The innocence of humans [gullibility?] That allows criminals to trick them into installing malware on their machines, responding to phishing attacks, etc.───人的純真[易受騙?]易受罪犯哄騙而在機器上安裝惡意軟件,響應網(wǎng)絡(luò )釣魚(yú)攻擊,等等。
36 、From the artist:"The former Phish bassist assimilates free-form rock&roll, calypso, pop and funk, showcasing an unexpected side to his songwriting."───免責聲明:本站數據全部由蜘蛛程序自動(dòng)抓取而來(lái),且僅提供文章鏈接及部分摘要信息,文章所持觀(guān)點(diǎn)和本站無(wú)關(guān),請點(diǎn)擊原文鏈接查看原作者和出處!
37 、Phishing can carry significant economic costs for the victims and rewards for the perpetrators.───仿冒可以帶來(lái)巨大的經(jīng)濟損失,給受害者和獎勵為肇事者。
38 、On the PC, the early viruses were eventually joined by Trojans, worms, spyware and most recently phishing attacks.───以個(gè)人電腦為例,最早的病毒誕生之后,就陸續出現特洛伊木馬、蠕蟲(chóng)、**軟體,到現在最新的釣魚(yú)攻擊。
39 、Since most of the phishing emails come through spam, get a spam filter and install on your computer.───由于大部分的垃圾郵件,通過(guò)網(wǎng)絡(luò )釣魚(yú)電子郵件來(lái),得到你的電腦安裝垃圾郵件過(guò)濾.
40 、But he said people should not rely on it, as it will not be able to detect all phishing sites.───但用戶(hù)不應該完全依賴(lài)這個(gè)軟件,因為它無(wú)法診斷出所有全部含有“網(wǎng)絡(luò )釣魚(yú)”惡意代碼的網(wǎng)站。
41 、Our group also develops automatic filters that can identify likely phishing attacks.But in this work, too, we have found that human responses can be critical to a filter's success.───我們團隊也研發(fā)了自動(dòng)過(guò)濾器,能辨識可疑的網(wǎng)釣攻擊,但在研發(fā)過(guò)程中,我們發(fā)現使用者的反應才是過(guò)濾器成功與否的關(guān)鍵。
42 、The protection measures aim to prevent AOL members from falling for phishing scams by blocking access.───AOL所提供的保護手段,就是通過(guò)阻止對‘釣魚(yú)’網(wǎng)站的訪(fǎng)問(wèn)而使其用戶(hù)免遭毒手。
43 、Compares URL addresses with the phishing database.───將URL地址和網(wǎng)絡(luò )釣魚(yú)數據庫中地址進(jìn)行比較。
44 、The Junk E-mail Filter also automatically evaluates each incoming message to discover whether it might be suspicious, potentially fraudulent, or part of a phishing attack.───垃圾電子郵件篩選也會(huì )自動(dòng)評估每個(gè)傳入的郵件以確定其是否可疑、是否具有潛在欺詐性或是否是phishing攻擊的一部分。
45 、I know what a phishing scam is, lady, go to hell.─── 我知道釣魚(yú)詐騙的套路 ** 見(jiàn)鬼去吧
46 、Phishing attacks can result in a user divulging sensitive information, including financial information, that can result in a loss of privacy or money.───受到網(wǎng)絡(luò )仿冒攻擊的用戶(hù)可能會(huì )泄露敏感信息(包括金融信息),導致隱私或財產(chǎn)遭到侵害。
47 、The programs that used a combination of blacklists and heuristics fared much better, with one detecting almost 90 percent of phishing attacks from the beginning of our test.───并用黑名單和經(jīng)驗法則程式的表現則好多了,其中一種在測試一開(kāi)始就能偵測到將近九成的網(wǎng)釣攻擊。
48 、Peter Cassidy, a spokesman for the Anti-Phishing Working Group, said phishing first surfaced early this decade and took off in 2003.───彼得卡西迪公司的一位發(fā)言人對反仿冒工作組說(shuō)仿冒出現第一本十年初,起飛于2003年完成。
49 、The particularly craven hackers, phishing fraudsters and malware writers ply the trade for cash, not kicks.───特別膽小的黑客、釣魚(yú)詐騙和惡意軟件寫(xiě)手通過(guò)病毒套取現金而不是擊潰電腦。
50 、Do you want to turn on the phishing filter?───你愿意打開(kāi)反網(wǎng)絡(luò )釣魚(yú)過(guò)濾功能么?
51 、As phishing continues to escalate, the safest course for consumers may be to warn them over the phone.───有鑒于網(wǎng)路釣魚(yú)行為愈發(fā)猖獗,透過(guò)**警告消費者或許是最安全的做法。
52 、Often phishing messages have deceptive links that actually take you to spoofed Web sites that urge you to enter and submit your personal information.───網(wǎng)絡(luò )仿冒郵件通常包含欺騙性鏈接,它們會(huì )帶您進(jìn)入欺騙網(wǎng)站,然后催促您輸入并提交您的個(gè)人信息。
53 、In addition, phishing tools often appear to be downloaded from a number of regularly updated central web or FTP servers.───另外,網(wǎng)絡(luò )釣魚(yú)攻擊工具經(jīng)??梢詮囊恍┙?jīng)常更新地中央網(wǎng)站服務(wù)器或FTP服務(wù)器上下載獲得。
54 、Also said: "I walk out, you first phishing.───又說(shuō)道:“我出去走一走,你們先釣魚(yú)?!?/p>
55 、* Fixed an issue where the phishing and malware database did not update on first launch.───修復了在第一個(gè)版本的網(wǎng)絡(luò )釣魚(yú)和惡意軟件的數據庫沒(méi)有更新就發(fā)布的問(wèn)題,。
56 、The screening software, which is based on the phishing filter in IE7, will sport improved heuristics and the ability to analyze entire URL strings for phishing site detection.───甄別軟件,該軟件是基于仿冒網(wǎng)站篩選在IE7中,將體育的啟發(fā)式檢測和改進(jìn)的能力,分析整個(gè)URL字符串為釣魚(yú)網(wǎng)站檢測。
57 、As the SAR government has adopted a series of measures and actions, which at that time be used for spam and phishing domain should no longer exists.───由于特區政府采取了一系列措施和行動(dòng),那些當時(shí)被用于濫發(fā)訊息和仿冒詐騙的域名應該已不存在。
58 、He says recent phishing attempts actually warn customers about phishing and ask them to update their information for security reasons.───他指出,最近的網(wǎng)路釣魚(yú)手法事實(shí)上還會(huì )警告顧客注意網(wǎng)路釣魚(yú),要求他們基于安全理由更新個(gè)人資料。
59 、Pharming has been called “phishing without a lure.───它被叫做“無(wú)誘餌的釣魚(yú)”。
60 、Install this update for Windows Mail to revise the definition files used to detect e-mail messages that should be considered junk e-mail or that may contain phishing content.───安裝本W(wǎng)indows Mail更新程序可修改在檢測垃圾郵件或可能包含仿冒內容的電子郵件時(shí)將用到的定義文件。
61 、For phishing attacks, Microsoft is rolling out Smart Screen, a filter which is designed to screen out known phishing URLs.───為釣魚(yú)式攻擊,微軟推出了智能畫(huà)面中,過(guò)濾器,目的是為了篩選出已知的釣魚(yú)式攻擊的**。
62 、In the event of a phishing scam to virus infection, will begin to flow down the value chain to contagious.───一旦仿冒病毒感染了某個(gè)產(chǎn)品,就會(huì )順著(zhù)價(jià)值鏈往上傳染,無(wú)一幸免。
63 、You can configure the Phishing Filter through the Internet Options Advanced Settings tab.───你通過(guò)可以Internet選項中的高級設置頁(yè)來(lái)配置網(wǎng)絡(luò )釣魚(yú)過(guò)濾器。
64 、They're replacing much of the older code to increase performance and make the code base more modular, able to handle new security threats like phishing.───他們取代許多舊典,以提高性能,使代碼更加模塊化,能應付新的安全威脅,如釣魚(yú)。
65 、A few sites provided good background to raise awareness of the phishing threat but little in the way of actionable advice about how people could protect themselves.───少數網(wǎng)站雖然提供良好背景知識,提升了大家對網(wǎng)釣威脅的警覺(jué)心,但對于如何保護自己沒(méi)什麼具體建議。
66 、Spoofing is the phone industry's version of phishing, in which criminals use fake e-mails to fool computer users into divulging personal information.───竄改來(lái)電顯示是網(wǎng)絡(luò )釣魚(yú)的電信業(yè)版本,而網(wǎng)絡(luò )釣魚(yú)是指歹徒偽造電子郵件,讓電腦用戶(hù)泄漏個(gè)人資料。
67 、As phishing continues to escalate,the safest course for consumers may be to warn them over the phone.───有鑒于網(wǎng)絡(luò )釣魚(yú)行為愈發(fā)猖獗,通過(guò)**警告消費者或許是最安全的做法。
68 、A common online phishing scam starts with an e-mail message that appears to come from a trusted source but actually directs recipients to provide information to a fraudulent website.───常見(jiàn)的聯(lián)機網(wǎng)頁(yè)仿冒現象是首先收到一封電子郵件,該郵件似乎來(lái)自受信任的源但實(shí)際上會(huì )將收件人指引到欺騙性網(wǎng)站并誘使其提供相關(guān)信息。
69 、"My motivation is to be a good citizen and put a dent in phishing scams",says Peisner,president of an anti-phishing service.───佩斯納說(shuō):“我的動(dòng)機是要做一個(gè)好公民,致力于打擊網(wǎng)絡(luò )釣魚(yú)詐騙案?!庇伤麚慰偛玫墓咎峁┓淳W(wǎng)絡(luò )釣魚(yú)服務(wù)。
70 、In my latest test NIS blocked 94 percent of the phishing sites, IE blocked 83 percent , and Firefox blocked 77 percent .───我在最近的測試中,NIS阻止了94%的釣魚(yú)網(wǎng)站,IE阻止了83%,火狐阻止了77%。
71 、Following this brief introduction to the concepts of phishing, we will now review the actual techniques and tools we have captured during phishing attacks observed in the wild.───在這個(gè)簡(jiǎn)要介紹網(wǎng)絡(luò )釣魚(yú)概念的引言之后,我們將開(kāi)始回顧在我們觀(guān)察到的真實(shí)網(wǎng)絡(luò )釣魚(yú)攻擊中所實(shí)際使用的技術(shù)和工具。
72 、It also ensures that public keys cannot be tampered with, thereby preventing phishing, spoofing, and code-tampering attacks.───它還保護了公共密鑰不能被篡改,從而防止網(wǎng)絡(luò )欺詐,欺騙,和篡改代碼的攻擊。
73 、Most persons have been warned numerous times about phishing attempts trying to trick them into revealing user names / passwords to banks etc.───對于嘗試通過(guò)欺騙行為以使用戶(hù)暴露其銀行帳戶(hù)等用戶(hù)名/密碼的網(wǎng)絡(luò )釣魚(yú)來(lái)說(shuō),多數人已經(jīng)受到過(guò)警示。
74 、Not all phishing e-mails contain these features, however, and sometimes legitimate e-mails contain them as well.───然而并非所有網(wǎng)釣郵件都具有這些特徵,有時(shí)合法郵件也有這些特徵。
75 、A phishing e-mail has been detected.───已檢測到網(wǎng)絡(luò )釣魚(yú)郵件。
76 、Phishing attack is growing significantly each year and is considered as one of the most dangerous threats in the Internet which may cause people to lose confidence in e-commerce.───摘要:網(wǎng)路釣魚(yú)攻擊每年都以驚人的速度增長(cháng),目前在網(wǎng)路上已成為最危險的威脅之一,這可能會(huì )使某些人對于電子交易失去信心。
77 、Phishing typically involves sending fraudulent e-mails that include links that direct recipients to fake websites where they are asked to input sensitive data.───仿冒通常涉及欺詐發(fā)送電子郵件,其中包括聯(lián)系,直接受助假冒網(wǎng)站,讓他們有問(wèn)輸入敏感數據。
78 、And, across the industry, Microsoft is working to reduce spam and phishing attacks by developing technology to authenticate the identity and reputation of email senders.───并且,微軟在業(yè)界正致力于開(kāi)發(fā)減少垃圾郵件和網(wǎng)絡(luò )釣魚(yú)攻擊的新技術(shù)用以鑒別郵件發(fā)出者的身份和信譽(yù)度。
79 、“The sheer volume of spam has soared in Australia, including wide-spread phishing scams purporting to come from leading Australian banks.───“純粹的垃圾郵件數量激增,在澳大利亞,包括廣泛的傳播網(wǎng)路詐騙的本意是來(lái)自領(lǐng)導的澳洲銀行。
80 、With so much at stake, the computer security community has been scrambling to develop technologies to combat phishing, such as filters for e-mail and Web browsers that flag phishing attempts.───由于影響重大,電腦安全界已積極發(fā)展防制網(wǎng)釣的技術(shù),例如電子郵件過(guò)濾器,以及在網(wǎng)頁(yè)瀏覽器中標示出網(wǎng)釣企圖。
81 、Through both laboratory and field studies, we have shown that the game makes a significant difference in users' ability to identify phishing sites.───實(shí)驗室與實(shí)際研究顯示,這個(gè)游戲明顯提升了使用者辨識釣魚(yú)網(wǎng)站的能力。
pause download什么意思?
ause download 暫停下載 雙語(yǔ)對照 例句: 1. Anti phishing protection, the love-it-or-hate-it awesome bar, location
IE7.0是什么???
Internet Explorer 7.0,簡(jiǎn)稱(chēng)IE7并沒(méi)有手機瀏覽器,而是PC瀏覽器?! ≡?006年年尾,微軟發(fā)布了rebranded代號的Internet Explorer 7,IE7被內置在2007年一月發(fā)布的微軟新一代視窗操作系統Vista中,除更改新名字外,這個(gè)版本支持翻頁(yè)瀏覽,RSS訂閱,頁(yè)面縮放,快速切換,Anti-Phishing過(guò)濾器和防冒網(wǎng)站篩選等動(dòng)態(tài)安全,在一定程度上增加了Internet Explorer的安全性?! ∈謾C瀏覽器是一種用戶(hù)在手機終端上通過(guò)無(wú)線(xiàn)通訊網(wǎng)絡(luò )進(jìn)行互聯(lián)網(wǎng)內容瀏覽的移動(dòng)互聯(lián)網(wǎng)工具,其最主要的應用為網(wǎng)頁(yè)瀏覽,同時(shí)也可以聚集大量的應用,如導航、社區、多媒體影音、天氣、股市等,為用戶(hù)提供全方位的移動(dòng)互聯(lián)網(wǎng)服務(wù)。
版權聲明: 本站僅提供信息存儲空間服務(wù),旨在傳遞更多信息,不擁有所有權,不承擔相關(guān)法律責任,不代表本網(wǎng)贊同其觀(guān)點(diǎn)和對其真實(shí)性負責。如因作品內容、版權和其它問(wèn)題需要同本網(wǎng)聯(lián)系的,請發(fā)送郵件至 舉報,一經(jīng)查實(shí),本站將立刻刪除。