非法侵入

  • 网络trespass;hack
非法侵入非法侵入
  1. 法官说这个诉讼是一个非法侵入的案例,服务器提供商&英特尔,拥有永久阻止KenHamid向他们发送邮件的权利。

    The judge said that the lawsuit was a case of trespass and that the service provider , Intel , has the right to get a permanent injunction to block e-mail sent by Ken Hamidi .

  2. 法院裁定,被告犯有非法侵入罪。

    The court held that the defendants were guilty of trespass .

  3. 你这是非法侵入!

    You 're trespassing !

  4. 非法侵入严究不贷。

    Trespassers will be prosecuted .

  5. 渔船因非法侵入受限制水域而被扣押。

    The fishing boat was seized for its trespass into restricted waters .

  6. 一旦有人试图非法侵入该系统,蜂鸣器会被启动,系统还会将警报以短消息和拨打电话的方式通过GPRS远程传送到远程终端。

    Once somebody was trying to intrude into the system , the buzzer would be start and alarmed . The system would also send short alert message and call the manager through GPRS remote transmission to remote terminal .

  7. Seybold在博客声明,东京总部通过外部安全公司就非法侵入进行彻查,索尼还在重建网站系统,加强保护措施。

    The Tokyo-based company has hired a security firm to conduct a complete investigation into the intrusion and is rebuilding the system to offer more protection , Seybold said in the blog posting .

  8. 侵入民宅非法侵入或进入他人家宅的行为。

    The act of unlawfully breaking into and entering another 's house .

  9. 非法侵入者行为相同,但出于恶意。

    Crackers do the same thing but for malicious purposes .

  10. 那她一定会去控告我们非法侵入。

    And she 's gonna be suing us for invasion of privacy .

  11. 非法侵入住宅罪略探

    Thinking about the Crime of Unlawful Intrusion into Residence

  12. 第六部分:非法侵入计算机信息系统罪的立法检讨。

    Part VI : Lawmaking of the trespass on computer information system crime review .

  13. 针对非法侵入计算机信息系统罪的防范进行了剖析。

    Analyse Aim Keep a lookout of the trespass on computer information system crime .

  14. 约翰控告那个人非法侵入。

    John proceeded against the man for trespass .

  15. 蓄意伤害罪,恐吓和非法侵入民宅罪

    assault with intent , menacing and trespassing .

  16. 且非法侵入后他又勒索钱财。

    While trespassing , he profanely demanded money .

  17. 试析非法侵入计算机信息系统罪

    On the Invasion of Computer Information System

  18. 这是非法侵入私人领地

    This is trespassing on private property .

  19. 你们都非法侵入了私人住�

    You are all trespassing on private property

  20. 你非法侵入我的土地。

    You are trespassing on my land .

  21. 墙或围墙是否由抵御非法侵入的材料建筑而成?

    Is the wall or fence soundly constructed of materials that would resist unlawful entry ?

  22. 第三部分:非法侵入计算机信息系统罪的概念、构成要件。

    Part III : The concept and composing of the trespass on computer information system crime .

  23. 该系统通过对运动目标的检测,实现了对非法侵入事件的自动报警。

    The system functions as detecting unauthorized personal entrance automatic alarming by detecting the motion target .

  24. 2014年5月,美国对5名中国军人提出刑事罪名,称其非法侵入6家美国公司的计算机系统。

    In May 2014 , it indicted five Chinese soldiers for hacking into six US companies .

  25. 第二部分着重研究了非法侵入计算机信息系统后续行为的认定问题。

    The second part mainly studies the determination of the subsequent act of illegal intrusion of computer information system .

  26. 不过值得注意的是,他被逮捕是因为非法侵入,而不是倾倒骨灰。

    Although it is worth noting that he was arrested and charged with defiant trespass , not reckless mum-scattering .

  27. 渔船因非法侵入受限制水域而被扣押。论我国扣船管辖制度的立法完善&兼论海事诉讼中不便审理法院原则

    The fishing boat was seized for its trespass into restricted waters . On Forum Non Conveniens in Admiralty Suit

  28. 毫无疑问,非法侵入他人电脑获取机密资料是刑事犯罪。

    There is no doubt that it is a criminal offence to hack into others'computers and get secret data .

  29. 近年来,国内外非法侵入计算机信息系统的案件时有发生。

    In recent years , cases of illegal intrusion into computer information systems at home and abroad have always happened .

  30. 有人非法侵入它的推特账号并发送了这条推特,让我们关注一下股票市场对此的反映。

    Someone hacked the Twitter account to send out that tweet , but look at how the stock market reacted .