南昌大学理工类学术英语摘要
本文的摘要(除Text18外)均不符合老师上课讲的要求,仅供参考!!!
Text1 How do computer hackers “get inside”a computer
Abstract:
Computer vulnerabilities are often utilized by hackers or crackers. The security of each computer is challenging. This paper firstly redefines the term “hacker? 揷racker?and 揼etting inside?the computers and describes the procedure in detail . The term 搖nauthorized user?(UU) will be a better choice for defining the insider group. The known and unknown vulnerabilities will be taken advantage of by UUs ranging from poor password protection to leaving a computer turned on and physically accessi
原创力文档

文档评论(0)