Přeložit "malicious behavior" do čínština

Zobrazuje se 50 z 50 překladů fráze "malicious behavior" z Angličtina do čínština

Překlad Angličtina do čínština jazyka malicious behavior

Angličtina
čínština

EN Continuous Process Monitoring – Bitdefender Process Inspector continuously monitors running process for signs of malicious behavior and can detect and block attacks and malware that eluded other security layers.

ZH 持續過程監控 – Bitdefender Process Inspector持續監視運行過程中是否存在惡意行為跡象,並可以檢測和阻止其他安全層所躲避的攻擊和惡意軟體。

přepis chí xù guò chéng jiān kòng – Bitdefender Process Inspector chí xù jiān shì yùn xíng guò chéng zhōng shì fǒu cún zài è yì xíng wèi jī xiàng, bìng kě yǐ jiǎn cè hé zǔ zhǐ qí tā ān quán céng suǒ duǒ bì de gōng jī hé è yì ruǎn tǐ。

EN Reduce security risks from malicious cyber activities through shared standards of behavior and collective response to attacks.

ZH 遵守共同的行为标准, 一致应对攻击行为,降低恶意网络活动构成的安全风险。

přepis zūn shǒu gòng tóng de xíng wèi biāo zhǔn, yī zhì yīng duì gōng jī xíng wèi, jiàng dī è yì wǎng luò huó dòng gòu chéng de ān quán fēng xiǎn。

EN We use data to understand online behavior and trends on the internet by continuously mapping engagement behavior and page content to user interest and intent.

ZH 我們使用數據通過持續映射參與行為和頁面內容來瞭解互聯網上的在線行為和趨勢,以達到用戶的興趣和意圖。

přepis wǒ men shǐ yòng shù jù tōng guò chí xù yìng shè cān yǔ xíng wèi hé yè miàn nèi róng lái liǎo jiě hù lián wǎng shàng de zài xiàn xíng wèi hé qū shì, yǐ dá dào yòng hù de xìng qù hé yì tú。

EN We know human behavior. For nearly fifty years we have led global thinking on human behavior. This foundation propels our vision and validates our approach to cultural transformation.

ZH 我们了解行为。 近五十年来,我们对人类行为的思考从未停步。这一基础推动我们坚持愿景,并持续检验我们文化转型方法的有效性。

přepis wǒ men le jiě xíng wèi。 jìn wǔ shí nián lái, wǒ men duì rén lèi xíng wèi de sī kǎo cóng wèi tíng bù。zhè yī jī chǔ tuī dòng wǒ men jiān chí yuàn jǐng, bìng chí xù jiǎn yàn wǒ men wén huà zhuǎn xíng fāng fǎ de yǒu xiào xìng。

EN Dynamic Reports - You can control report behavior by using events or by designing dynamic reports entirely in code. You can also use property expressions to change the run-time behavior of controls in RDL and Page reports.

ZH SyntaxEditor for WPF - 將高級代碼編輯功能添加到您的 WPF 應用程式。包括20多個示例語言以使您開始 (如 c#、HTML、JavaScript 等), 並且還提供了可選的特優載入項。.

přepis SyntaxEditor for WPF - jiāng gāo jí dài mǎ biān jí gōng néng tiān jiā dào nín de WPF yīng yòng chéng shì。bāo kuò20duō gè shì lì yǔ yán yǐ shǐ nín kāi shǐ (rú c#、HTML、JavaScript děng), bìng qiě hái tí gōng le kě xuǎn de tè yōu zài rù xiàng。.

EN We reserve the right to exclude people from the Vectornator community based on their  behavior, including behavior outside of the Vectornator community spaces.

ZH 我们保留根据人们的行为(包括在Vectornator社区空间以外的行为)将其排除在Vectornator社区之外的权利。

přepis wǒ men bǎo liú gēn jù rén men de xíng wèi (bāo kuò zàiVectornator shè qū kōng jiān yǐ wài de xíng wèi) jiāng qí pái chú zàiVectornator shè qū zhī wài de quán lì。

EN This gives you the "cache only" behavior for things in the cache and the "network only" behavior for anything not-cached (which includes all non-GET requests, as they cannot be cached).

ZH 这为缓存中的内容提供“仅缓存”行为,为未缓存的内容(包括所有非 GET 请求,因为它们不能被缓存)提供“仅网络”行为。

přepis zhè wèi huǎn cún zhōng de nèi róng tí gōng “jǐn huǎn cún” xíng wèi, wèi wèi huǎn cún de nèi róng (bāo kuò suǒ yǒu fēi GET qǐng qiú, yīn wèi tā men bù néng bèi huǎn cún) tí gōng “jǐn wǎng luò” xíng wèi。

EN We use data to understand online behavior and trends on the internet by continuously mapping engagement behavior and page content to user interest and intent.

ZH 我們使用數據通過持續映射參與行為和頁面內容來瞭解互聯網上的在線行為和趨勢,以達到用戶的興趣和意圖。

přepis wǒ men shǐ yòng shù jù tōng guò chí xù yìng shè cān yǔ xíng wèi hé yè miàn nèi róng lái liǎo jiě hù lián wǎng shàng de zài xiàn xíng wèi hé qū shì, yǐ dá dào yòng hù de xìng qù hé yì tú。

EN Purchase behavior (Advanced plan holders only) ? send highly tailored campaigns to customers based on their purchase history and behavior.

ZH 购买行为(仅限高级计划持有者)——根据客户的购买历史和行为向他们发送高度定制的活动。

přepis gòu mǎi xíng wèi (jǐn xiàn gāo jí jì huà chí yǒu zhě)——gēn jù kè hù de gòu mǎi lì shǐ hé xíng wèi xiàng tā men fā sòng gāo dù dìng zhì de huó dòng。

EN Monitor and block malicious domains before you are compromised and Sandbox web browsing activity to isolate threats at the browser.

ZH 在遭受入侵和發生沙箱 Web 瀏覽活動之前,監控並阻止惡意的網域,從瀏覽器隔離威脅。

přepis zài zāo shòu rù qīn hé fā shēng shā xiāng Web liú lǎn huó dòng zhī qián, jiān kòng bìng zǔ zhǐ è yì de wǎng yù, cóng liú lǎn qì gé lí wēi xié。

EN Undetected malicious bots can damage your brand, steal sensitive information, take over accounts, and negatively impact your revenue.

ZH 躲過監測的惡意傀儡程式會破壞您的品牌、竊取機密資訊、竊取帳戶並對收入造成負面影響。

přepis duǒ guò jiān cè de è yì guī lěi chéng shì huì pò huài nín de pǐn pái、 qiè qǔ jī mì zī xùn、 qiè qǔ zhàng hù bìng duì shōu rù zào chéng fù miàn yǐng xiǎng。

EN Pollutes your data and creates a bad customer experience with malicious content

ZH 透過惡意內容污染您的資料並造成惡劣的客戶體驗

přepis tòu guò è yì nèi róng wū rǎn nín de zī liào bìng zào chéng è liè de kè hù tǐ yàn

EN Allows good bots, such as those belonging to search engines, to keep reaching your site while preventing malicious traffic.

ZH 允許有益的機器人(例如屬於搜尋引擎的程式)可以繼續到達您的網站,同時預防惡意流量。

přepis yǔn xǔ yǒu yì de jī qì rén (lì rú shǔ yú sōu xún yǐn qíng de chéng shì) kě yǐ jì xù dào dá nín de wǎng zhàn, tóng shí yù fáng è yì liú liàng。

EN Malicious content is difficult to spot and costly to remediate

ZH 惡意內容難以發現,且修復代價高昂

přepis è yì nèi róng nán yǐ fā xiàn, qiě xiū fù dài jià gāo áng

EN Protect patient data from malicious bots

ZH 保護患者資料以防惡意機器人程式攻擊

přepis bǎo hù huàn zhě zī liào yǐ fáng è yì jī qì rén chéng shì gōng jī

EN Protect students and teachers from account takeovers with advanced malicious bot detection and mitigation.

ZH 通過高級機器人檢測和緩解來保護學生和教師,預防帳戶盜用。

přepis tōng guò gāo jí jī qì rén jiǎn cè hé huǎn jiě lái bǎo hù xué shēng hé jiào shī, yù fáng zhàng hù dào yòng。

EN "Cloudflare has an incredibly large network and infrastructure to stop really large attacks on the DNS system. We just get clean requests and never have to deal with malicious traffic or attacks on the DNS infrastructure."

ZH 「Cloudflare 的網路和基礎結構大到令人難以置信,能夠阻止 DNS 系統上非常大的攻擊。我們只會收到乾淨的請求,從不需要處理 DNS 基礎結構上的惡意流量或攻擊。」

přepis 「Cloudflare de wǎng lù hé jī chǔ jié gòu dà dào lìng rén nán yǐ zhì xìn, néng gòu zǔ zhǐ DNS xì tǒng shàng fēi cháng dà de gōng jī。wǒ men zhǐ huì shōu dào gān jìng de qǐng qiú, cóng bù xū yào chù lǐ DNS jī chǔ jié gòu shàng de è yì liú liàng huò gōng jī。」

Angličtina čínština
dns dns

EN Prevent malicious downloads with AV scanning and by blocking users from downloading active types of files like executables and libraries.

ZH 透過反病毒掃描和封鎖使用者下載主動式檔案類型 (如可執行檔或庫),藉此預防惡意下載。

přepis tòu guò fǎn bìng dú sǎo miáo hé fēng suǒ shǐ yòng zhě xià zài zhǔ dòng shì dàng àn lèi xíng (rú kě zhí xíng dàng huò kù), jí cǐ yù fáng è yì xià zài。

EN "Cloudflare helps us with defenses from malicious attacks, securing customer data, and accelerating our online experience. This gives us the flexibility to focus on building our core product."

ZH 「Cloudflare 幫助我們抵禦惡意攻擊,保護客戶資料並加速我們的線上體驗。 這使我們能夠靈活地專注於構建我們的核心產品。」

přepis 「Cloudflare bāng zhù wǒ men dǐ yù è yì gōng jī, bǎo hù kè hù zī liào bìng jiā sù wǒ men de xiàn shàng tǐ yàn。 zhè shǐ wǒ men néng gòu líng huó de zhuān zhù yú gòu jiàn wǒ men de hé xīn chǎn pǐn。」

EN When we identify requests that are threats, we log them and block them. That means we not only protect your site, but also provide insight into the malicious activity we’re seeing.

ZH 在識別出本質為威脅的請求時,我們會記錄它們並封鎖它們。 這意味著我們不僅可以保護您的網站,還提供有關我們所見惡意活動的深入解析。

přepis zài shí bié chū běn zhì wèi wēi xié de qǐng qiú shí, wǒ men huì jì lù tā men bìng fēng suǒ tā men。 zhè yì wèi zhe wǒ men bù jǐn kě yǐ bǎo hù nín de wǎng zhàn, hái tí gōng yǒu guān wǒ men suǒ jiàn è yì huó dòng de shēn rù jiě xī。

EN A compromised DNS record, or “poisoned cache," can return a malicious answer from the DNS server, sending an unsuspecting visitor to an attacker's website. This enables attackers to steal user credentials and take ownership of legitimate accounts.

ZH 遭受入侵的 DNS 記錄,即「中毒快取」可以從 DNS 伺服器傳回惡意答案,將不知情的訪客發送到攻擊者的網站。這使攻擊者能夠竊取使用者認證並獲得合法帳戶的所有權。

přepis zāo shòu rù qīn de DNS jì lù, jí 「zhōng dú kuài qǔ」 kě yǐ cóng DNS cì fú qì chuán huí è yì dá àn, jiāng bù zhī qíng de fǎng kè fā sòng dào gōng jī zhě de wǎng zhàn。zhè shǐ gōng jī zhě néng gòu qiè qǔ shǐ yòng zhě rèn zhèng bìng huò dé hé fǎ zhàng hù de suǒ yǒu quán。

EN Protect Internet properties from malicious traffic that targets network and application layers, so you can maintain availability and performance while containing operating costs.

ZH 保護網際網絡資產免受針對網路層和應用程式層的惡意流量,以便在控制運營成本的前提下維持可用性和性能。

přepis bǎo hù wǎng jì wǎng luò zī chǎn miǎn shòu zhēn duì wǎng lù céng hé yīng yòng chéng shì céng de è yì liú liàng, yǐ biàn zài kòng zhì yùn yíng chéng běn de qián tí xià wéi chí kě yòng xìng hé xìng néng。

EN Third parties (e.g. your ISP, your employer) may have access to the resources you visit. Attackers can use this information to launch phishing attacks or inject malicious code.

ZH 第三方(如您的ISP、您的雇主)可能会访问您访问的资源。攻击者可以利用这些信息发起钓鱼攻击或注入恶意代码。

přepis dì sān fāng (rú nín deISP、 nín de gù zhǔ) kě néng huì fǎng wèn nín fǎng wèn de zī yuán。gōng jī zhě kě yǐ lì yòng zhè xiē xìn xī fā qǐ diào yú gōng jī huò zhù rù è yì dài mǎ。

EN SLE Micro is built from ground up to support containers and microservices. Workloads are isolated from the core filesystem to guard against malicious applications compromising the system.

ZH SLE Micro 从最初起就是为了支持容器和微服务而构建。工作负载与核心文件系统隔离,可以防止恶意应用程序破坏系统。

přepis SLE Micro cóng zuì chū qǐ jiù shì wèi le zhī chí róng qì hé wēi fú wù ér gòu jiàn。gōng zuò fù zài yǔ hé xīn wén jiàn xì tǒng gé lí, kě yǐ fáng zhǐ è yì yīng yòng chéng xù pò huài xì tǒng。

EN Combined with behavioral baselining and allowlisting, it detects anomalous activity indicative of malicious intent such as active malware, cryptomining, unauthorized credential access, intrusions, and lateral movement.

ZH 结合行为基线和允许列表,它还可以检测出显示恶意的异常活动,如活跃的恶意软件、加密货币挖矿、未经授权的凭证访问、入侵和横向移动。

přepis jié hé xíng wèi jī xiàn hé yǔn xǔ liè biǎo, tā hái kě yǐ jiǎn cè chū xiǎn shì è yì de yì cháng huó dòng, rú huó yuè de è yì ruǎn jiàn、 jiā mì huò bì wā kuàng、 wèi jīng shòu quán de píng zhèng fǎng wèn、 rù qīn hé héng xiàng yí dòng。

EN Scans your website daily for malware and other risks and will send you an alert if something malicious is detected. This acts as an “alarm system” but does not include remediation.

ZH 每日扫描您的网站以查找恶意软件和其他风险,并在发现恶意内容时向您发送警报。此功能起到“警报系统”的作用,但不包括补救措施。

přepis měi rì sǎo miáo nín de wǎng zhàn yǐ chá zhǎo è yì ruǎn jiàn hé qí tā fēng xiǎn, bìng zài fā xiàn è yì nèi róng shí xiàng nín fā sòng jǐng bào。cǐ gōng néng qǐ dào “jǐng bào xì tǒng” de zuò yòng, dàn bù bāo kuò bǔ jiù cuò shī。

EN SiteLock works to identify and remove backdoor files, bots, and other malicious code. It scans for malware, SQL injection, and cross-site scripting as well as checking your website against spam lists.

ZH SiteLock 用于识别和删除后门文件、机器人程序和其他恶意代码。它会扫描恶意软件、SQL 注入和跨站点脚本,以及检查您的网站是否符合垃圾邮件列表。

přepis SiteLock yòng yú shì bié hé shān chú hòu mén wén jiàn、 jī qì rén chéng xù hé qí tā è yì dài mǎ。tā huì sǎo miáo è yì ruǎn jiàn、SQL zhù rù hé kuà zhàn diǎn jiǎo běn, yǐ jí jiǎn chá nín de wǎng zhàn shì fǒu fú hé lā jī yóu jiàn liè biǎo。

Angličtina čínština
sql sql

EN This way, these malicious emails are immediately identified, before they even enter your inbox.

ZH 如此一來,惡意郵件在進入您的信箱之前就會被系統偵測出來!

přepis rú cǐ yī lái, è yì yóu jiàn zài jìn rù nín de xìn xiāng zhī qián jiù huì bèi xì tǒng zhēn cè chū lái!

EN Using our AI-based Threat Intelligence engine, you can keep track of malicious sources spoofing your domain, wherever they are in the world.

ZH 使用我们基于人工智能的威胁情报引擎,你可以跟踪欺骗你的域名的恶意来源,无论他们在世界何处。

přepis shǐ yòng wǒ men jī yú rén gōng zhì néng de wēi xié qíng bào yǐn qíng, nǐ kě yǐ gēn zōng qī piàn nǐ de yù míng de è yì lái yuán, wú lùn tā men zài shì jiè hé chù。

EN Third-party services increase risk by opening up opportunities for malicious actors to impersonate brands. Enable SPF, DKIM, and DMARC for your third-party vendors to gain maximum DMARC compliance on your emails.

ZH 第三方服务增加了风险,因为它为恶意行为者提供了冒充品牌的机会。为你的第三方供应商启用SPF、DKIM和DMARC,以获得你的电子邮件的最大DMARC合规性。

přepis dì sān fāng fú wù zēng jiā le fēng xiǎn, yīn wèi tā wèi è yì xíng wèi zhě tí gōng le mào chōng pǐn pái de jī huì。wèi nǐ de dì sān fāng gōng yīng shāng qǐ yòngSPF、DKIM héDMARC, yǐ huò dé nǐ de diàn zi yóu jiàn de zuì dàDMARC hé guī xìng。

Angličtina čínština
dkim dkim
and
dmarc dmarc

EN Whatever you end up doing, always make sure you have removed the malicious software by using an anti-virus program. If you try to remove the crypto-locker ransomware, you may lose all your encrypted data.

ZH 无论您最终要做什么,请务必确保已使用防病毒程序删除了恶意软件。如果尝试删除加密锁勒索软件,则可能会丢失所有加密数据。

přepis wú lùn nín zuì zhōng yào zuò shén me, qǐng wù bì què bǎo yǐ shǐ yòng fáng bìng dú chéng xù shān chú le è yì ruǎn jiàn。rú guǒ cháng shì shān chú jiā mì suǒ lēi suǒ ruǎn jiàn, zé kě néng huì diū shī suǒ yǒu jiā mì shù jù。

EN Having conducted honest business on Amazon for several years now, we have mastered its ins and outs. With this comes awareness and vigilance of malicious entities that are out to make a profit even at the expense of driving other businesses to ruin.

ZH 我们在亚马逊上开展诚信的业务已有数年,已经掌握了它的来龙去脉。 随之而来的是对恶意实体的意识和警惕,即使它们以驱使其他企业破产为代价,但它们仍在牟取暴利。

přepis wǒ men zài yà mǎ xùn shàng kāi zhǎn chéng xìn de yè wù yǐ yǒu shù nián, yǐ jīng zhǎng wò le tā de lái lóng qù mài。 suí zhī ér lái de shì duì è yì shí tǐ de yì shì hé jǐng tì, jí shǐ tā men yǐ qū shǐ qí tā qǐ yè pò chǎn wèi dài jià, dàn tā men réng zài móu qǔ bào lì。

EN Detect security incidents, protect against malicious, deceptive, fraudulent, or illegal activity; to prosecute those responsible for that activity;

ZH 检测安全事件、防止恶意、欺骗、欺诈或非法活动;起诉 进行该活动的人;

přepis jiǎn cè ān quán shì jiàn、 fáng zhǐ è yì、 qī piàn、 qī zhà huò fēi fǎ huó dòng; qǐ sù jìn xíng gāi huó dòng de rén;

EN Several measures can be taken to secure your server in the best way possible to mitigate malicious issues.  Below you'll find some of the best practices to apply when securing your Linux servers for your Hostwinds Cloud VPS or Dedicated Server.

ZH 可以采取几种措施以以最佳方式保护您的服务器来减轻恶意问题。下面您将找到一些用于HostWinds Cloud VPS或专用服务器的Linux服务器时应用一些最佳实践。

přepis kě yǐ cǎi qǔ jǐ zhǒng cuò shī yǐ yǐ zuì jiā fāng shì bǎo hù nín de fú wù qì lái jiǎn qīng è yì wèn tí。xià miàn nín jiāng zhǎo dào yī xiē yòng yúHostWinds Cloud VPS huò zhuān yòng fú wù qì deLinux fú wù qì shí yīng yòng yī xiē zuì jiā shí jiàn。

Angličtina čínština
linux linux
vps vps

EN * Notarization is not the App Review. The Apple notary service is an automated system that scans your software for malicious content.

ZH * 公证并不等同于应用审查。Apple 公证服务是一套自动系统,会扫描您的软件中有无恶意内容。

přepis * gōng zhèng bìng bù děng tóng yú yīng yòng shěn chá。Apple gōng zhèng fú wù shì yī tào zì dòng xì tǒng, huì sǎo miáo nín de ruǎn jiàn zhōng yǒu wú è yì nèi róng。

EN Super Micro says review found no malicious chips in motherboards | Reuters

ZH Super Micro says review found no malicious chips in motherboards | 路透

přepis Super Micro says review found no malicious chips in motherboards | lù tòu

EN Defend your enterprise against malicious VoIP attacks

ZH 保护您的企业免受恶意VoIP攻击

přepis bǎo hù nín de qǐ yè miǎn shòu è yìVoIP gōng jī

Angličtina čínština
voip voip

EN OpenTouch SBC addresses the communication security needs of mid-sized and large organizations by protecting them from malicious attacks

ZH 阿尔卡特朗讯OpenTouch® 会话边界控制器(OpenTouch SBC) 能够满足大中型企业的通信安全需求,保护其免受恶意VoIP 攻击、SIP 拒绝服务以及欺诈和窃听。

přepis ā ěr kǎ tè lǎng xùnOpenTouch® huì huà biān jiè kòng zhì qì (OpenTouch SBC) néng gòu mǎn zú dà zhōng xíng qǐ yè de tōng xìn ān quán xū qiú, bǎo hù qí miǎn shòu è yìVoIP gōng jī、SIP jù jué fú wù yǐ jí qī zhà hé qiè tīng。

EN Our Security Operation Center runs 24 hours a day, every day of the year, working to take down malicious sources trying to abuse your domain name.

ZH 我们的安全运营中心一年中每天24小时运行,致力于取缔试图滥用你的域名的恶意来源。

přepis wǒ men de ān quán yùn yíng zhōng xīn yī nián zhōng měi tiān24xiǎo shí yùn xíng, zhì lì yú qǔ dì shì tú làn yòng nǐ de yù míng de è yì lái yuán。

EN But a fresh backup doesn't shrink the Object Storage size. Obviously, one of the big reasons to have backups is to recover from accidental (or malicious) deletion of data.

ZH 但是一个新的备份不会缩小对象存储大小。显然,有备份的一个重要原因是从意外(或恶意)删除数据。

přepis dàn shì yī gè xīn de bèi fèn bù huì suō xiǎo duì xiàng cún chǔ dà xiǎo。xiǎn rán, yǒu bèi fèn de yī gè zhòng yào yuán yīn shì cóng yì wài (huò è yì) shān chú shù jù。

EN AI-driven Threat Intelligence (TI) helps you blacklist malicious IPs around the world 

ZH AI驱动的威胁情报(TI)帮助你将世界各地的恶意IP列入黑名单 

přepis AI qū dòng de wēi xié qíng bào (TI) bāng zhù nǐ jiāng shì jiè gè de de è yìIP liè rù hēi míng dān 

EN Prevent Employees from Entering Credentials on Malicious Sites

ZH 防止员工在恶意网站上输入帐密

přepis fáng zhǐ yuán gōng zài è yì wǎng zhàn shàng shū rù zhàng mì

EN MITM attacks depend on the manipulation of networks or creating malicious networks the cybercriminal controls. The cybercriminal intercepts traffic and either lets it pass through, collecting information as it goes, or reroutes it to somewhere else.

ZH MITM 攻击依赖于操纵网络或创建网络犯罪控制的恶意网络网络犯罪分子截获流量,要么让流量通过并收集信息,要么将其重新路由到其他地方。

přepis MITM gōng jī yī lài yú cāo zòng wǎng luò huò chuàng jiàn wǎng luò fàn zuì kòng zhì de è yì wǎng luò wǎng luò fàn zuì fēn zi jié huò liú liàng, yào me ràng liú liàng tōng guò bìng shōu jí xìn xī, yào me jiāng qí zhòng xīn lù yóu dào qí tā de fāng。

EN Phishing is most frequently perpetrated via malicious email attachments, often disguised as .PDF files or Word files.

ZH 网络钓鱼最常通过恶意电子邮件附件实施,通常会伪装成 .PDF 文件或 Word 文件。

přepis wǎng luò diào yú zuì cháng tōng guò è yì diàn zi yóu jiàn fù jiàn shí shī, tōng cháng huì wěi zhuāng chéng .PDF wén jiàn huò Word wén jiàn。

Angličtina čínština
pdf pdf

EN Pharming is a cyberattack that redirects a site’s entire traffic flow to another malicious website. From there, cybercriminals can steal information and manipulate users into giving up credentials or downloading malware.

ZH 域欺骗是一种网络攻击,可将网站的整个流量重定向至其他恶意网站。在那里,网络犯罪分子可以窃取信息,并诱导用户交出帐密或下载恶意软件。

přepis yù qī piàn shì yī zhǒng wǎng luò gōng jī, kě jiāng wǎng zhàn de zhěng gè liú liàng zhòng dìng xiàng zhì qí tā è yì wǎng zhàn。zài nà lǐ, wǎng luò fàn zuì fēn zi kě yǐ qiè qǔ xìn xī, bìng yòu dǎo yòng hù jiāo chū zhàng mì huò xià zài è yì ruǎn jiàn。

EN The cybercriminal infects a user’s computer with malicious JavaScript. The malware then intercepts website cookies and authentication tokens for decryption, exposing the victim’s entire session to the cybercriminal.

ZH 网络犯罪分子通过恶意的 JavaScript 感染用户的电脑。然后,恶意软件会截获网站 Cookie 和身份验证令牌以进行解密,使受害者的整个会话暴露在网络犯罪分子面前。

přepis wǎng luò fàn zuì fēn zi tōng guò è yì de JavaScript gǎn rǎn yòng hù de diàn nǎo。rán hòu, è yì ruǎn jiàn huì jié huò wǎng zhàn Cookie hé shēn fèn yàn zhèng lìng pái yǐ jìn xíng jiě mì, shǐ shòu hài zhě de zhěng gè huì huà bào lù zài wǎng luò fàn zuì fēn zi miàn qián。

Angličtina čínština
javascript javascript
cookies cookie

EN Cookies are useful bits of website information that the sites you visit store on your devices. These are useful for remembering web activity and logins, but cybercriminals can steal them to gain that information and use them for malicious purposes.

ZH Cookie 是您访问的网站存储在您设备上的有用网站信息。它们对于记住网络活动和登录名称非常有用,但网络犯罪分子可以窃取它们以获取信息,并用于恶意目的。

přepis Cookie shì nín fǎng wèn de wǎng zhàn cún chǔ zài nín shè bèi shàng de yǒu yòng wǎng zhàn xìn xī。tā men duì yú jì zhù wǎng luò huó dòng hé dēng lù míng chēng fēi cháng yǒu yòng, dàn wǎng luò fàn zuì fēn zi kě yǐ qiè qǔ tā men yǐ huò qǔ xìn xī, bìng yòng yú è yì mù de。

Angličtina čínština
cookies cookie

EN Malware is malicious software that, once downloaded or installed, creates entry points or steals information. Here are some common types of malware that phishing perpetrators may use to infiltrate your system:

ZH 恶意软件是一种一旦下载或安装,就会创建入口点或窃取信息的恶意软件。以下是一些常见类型的恶意软件,网络钓鱼犯罪者可能会利用它们渗透您的系统:

přepis è yì ruǎn jiàn shì yī zhǒng yī dàn xià zài huò ān zhuāng, jiù huì chuàng jiàn rù kǒu diǎn huò qiè qǔ xìn xī de è yì ruǎn jiàn。yǐ xià shì yī xiē cháng jiàn lèi xíng de è yì ruǎn jiàn, wǎng luò diào yú fàn zuì zhě kě néng huì lì yòng tā men shèn tòu nín de xì tǒng:

EN Viruses are malicious entities that are copied onto a user’s system and infect certain files. These infections can be used to steal personal information from these files, but require sharing to infect other computers.

ZH 病毒是复制到用户系统并感染特定文件的恶意实体。这些感染可用于从这些文件中窃取个人信息,但需要通过共享才能感染其他电脑。

přepis bìng dú shì fù zhì dào yòng hù xì tǒng bìng gǎn rǎn tè dìng wén jiàn de è yì shí tǐ。zhè xiē gǎn rǎn kě yòng yú cóng zhè xiē wén jiàn zhōng qiè qǔ gè rén xìn xī, dàn xū yào tōng guò gòng xiǎng cái néng gǎn rǎn qí tā diàn nǎo。

EN Email phishing attacks are among the most common and versatile phishing attacks, and often among the most effective. Email phishing attacks often depend on social engineering to manipulate users into clicking malicious links or downloading malware.

ZH 电子邮件网络钓鱼攻击是最常见、最多样的网络钓鱼攻击之一,而且往往也是最有效的方法之一。电子邮件网络钓鱼攻击通常依赖于社会工程来诱导用户点击恶意链接或下载恶意软件。

přepis diàn zi yóu jiàn wǎng luò diào yú gōng jī shì zuì cháng jiàn、 zuì duō yàng de wǎng luò diào yú gōng jī zhī yī, ér qiě wǎng wǎng yě shì zuì yǒu xiào de fāng fǎ zhī yī。diàn zi yóu jiàn wǎng luò diào yú gōng jī tōng cháng yī lài yú shè huì gōng chéng lái yòu dǎo yòng hù diǎn jī è yì liàn jiē huò xià zài è yì ruǎn jiàn。

Zobrazuje se 50 z 50 překladů