继续啊 翻译完 谢谢了 还是那个翻译的题
来源:学生作业帮 编辑:大师作文网作业帮 分类:英语作业 时间:2024/11/11 14:01:55
继续啊 翻译完 谢谢了 还是那个翻译的题
奖励下 呵呵
奖励下 呵呵
英译汉
(1)A hacker is someone who creates and modifies computer software and computer hardware, including computer programming, a hacker is software designer and programmer who builds elegant, beautiful programs and systems.
黑客(或称电脑高手)就是指开发和重新设计计算机软件和硬件,包括计算机程序的人.黑客还是个软件设计师和程序开发师,可开发一流的、美观的程序及系统.
(2)Attack is an assault against a computer system or network as a result of deliberate,intelligent action. Such as brute force attack,dictionary attack,denial of service attack,replay attack,piggybacking,penetration and sabotage.
攻击即对计算机系统或网络的蓄意、智能袭击行为.如,暴力破解,字典式破译,“拒绝服务”攻击,重放攻击,捆绑式攻击,以及渗透式攻击或蓄意破坏.
(3)Network Scanning is the use of a computer network for gathering information on computer systems,which may be used for ststem maintenance,security assessment and investigation,and for attack.
网络扫描即利用计算机网络收集计算机系统上的信息,这些信息有可能被用来维护系统,系统安全系数评估和检测,甚至用来攻击系统.
(4)a message which a sender encrypts using the recipient's pubic-key can only be decrypted by the recipient's paired private-key.
经过发送人用接收人的公共密匙把信息加密的信息只能通过接收人对应的个人密匙来破译.
(5)Until modern times, cryptography referred almost exclusively to encryption, the process of converting ordinary information(plaintext)into something unintelligible; this is a ciphertext. Decryption is the reverse,moving from unintelligible ciphertext to plaintext.
直至今天,密码学所涉及的几乎全是加密.加密就是把正常信息(纯文本信息)转化为难解或不可读的信息的过程.这种不可读信息被称为密码文体.解密则相反,把难懂的密码文本转成纯文本.
(6)In cryptography, a cryptographic hash function is a hash function with certain additional security properties to make it suitable for use as a primitive in various information security applications, such as authentication and message integrity.
在密码学中,密码哈希函数是指具有特定附加安全属性以便作为各种信息安全应用的依据(primitive),如身份鉴定和信息的完整性.
(7)Symmetric-key cryptography refers to encryption methods in which both the sender and receiver share the same key (or, less commonly, in which their keys are different, but related in an easily computable way).
对称密匙密码指信息发送者与接收者能共用同一个密匙(或比较少见的是,他们用不同的密匙但两者可简单计算关联)的加密方法.
(8)In addition to encryption,public-key cryptography can be used to implement digital signature schemes.A digital signature is reminiscent of an ordinary signature;they both have the characteristic that they are easy for a user to produce,but difficult for anyone else to forge.
除了加密,公共密匙密码还可用于实现数字签名方案.数字签名与普通的签名相似,都有用户操作简单但他人难以模仿的特性.
汉译英
(1)主动攻击会造成网络系统状态和服务的改变.主动攻击包括试图阻断或攻破保护机制、引入恶意代码、偷窃或篡改信息.主动进攻可能造成数据资料的泄露和散播,或导致拒绝服务以及数据的篡改,包括大多数的未授权用户企图以非正常手段和正常手段进入远程系统.
Active attack will cause the change of status and services of network system. Active attacks include attempts to block or break the protection mechanisms, to introduce malicious code, to steal or tamper the information. Active attacks may result in disclosure or dissemination of data, or result in denial of service and data tampering, including most of unauthorized users attempt to access to the remote system by ordinary or non-ordinary methods.
(2)一般完整的攻击过程都是先隐藏自身,在隐藏好自己后在进行预攻击探测,检测目标机器的各种属性和具备的被攻击条件;然后采取相应的攻击方法进行破坏,达到自己的目的之后攻击者会删除自己的行为在目标系统中的日志.
Generally, a complete attack process is, the attacker is to hide himself first, then begin the pre-attack detection which is to detect the various properties of target machines and access what conditions are favorable for the attack; and then take the appropriate methods to carry out sabotage attacks, after succeed, attacker will delete their operations in the target system log.
(3)拒绝服务(Denial of Service,简称Dos攻击),就是通过非法独占受攻击的目标系统的服务,最终试图阻止合法用户使用受攻击目标提供的网络服务.拒绝服务攻击最常见的就是攻击者通过产生大量流向受害网络的数据包,消耗该网络所有的可用带宽.
Denial of service (Dos in short) refers to an attempt to illegally accroach attacked target system’s service and unable the legal users to make use of it. The most common denial of service attack is the attacker to produce a large number of network packet and make it flow to victim network to consume all the available bandwidth of the network.
(4) 现代密码学的一个基本原则是:一切秘密都存在于密匙之中.其含义是,在设计加密系统时,总是假设密码算法是公开的,真正需要保密的是密匙.这是因为密码算法相对密匙来说更容易泄漏.
A fundamental principle of modern cryptography is: all the secrets are kept in the key, which means when design the encryption systems, designers always assume that cryptographic algorithm is open; what really need to protect is the key. Because compared to the key, encryption algorithm is more likely to be leaked.
(5)对称密码体制的密码需要实现经过安全的密码通道有发方传给收方.这种密码体制的优点是:安全性高,加密速度快.缺点是:随着网络规模的扩大,密匙的管理成为一个难点;无法解决消息确认问题;缺乏自动检测密匙泄漏的能力.
Key of symmetric cryptosystem need to be sent to receiver through a secure access by the sender. The advantages of cryptography are: high security, fast encryption speed; While the disadvantages are: the key management becomes a difficulty as network scale is growing; inextricability of message confirmation difficulty; lack of the ability to automatically detect the key leakage.
(6)公开密匙密码也称为非对称密匙密码.使用公开密匙密码的每一个用户都分别拥有两个密匙:加密密匙和解密密匙,它们两者并不相同,并且由加密密匙得到解密密匙在计算机上是不可行的.每一个用户的加密都是公开的(因此,加密密匙也称为公开密匙).
Public-key cryptography is also called asymmetric-key cryptography. Every user who uses public- key cryptography has two keys: encryption key and decryption key. These two keys are different and further, it is infeasible to obtain the decryption key from the encryption key on the computer. Every user’s encryption key is public (and therefore, encryption key is also known as public-key).
(1)A hacker is someone who creates and modifies computer software and computer hardware, including computer programming, a hacker is software designer and programmer who builds elegant, beautiful programs and systems.
黑客(或称电脑高手)就是指开发和重新设计计算机软件和硬件,包括计算机程序的人.黑客还是个软件设计师和程序开发师,可开发一流的、美观的程序及系统.
(2)Attack is an assault against a computer system or network as a result of deliberate,intelligent action. Such as brute force attack,dictionary attack,denial of service attack,replay attack,piggybacking,penetration and sabotage.
攻击即对计算机系统或网络的蓄意、智能袭击行为.如,暴力破解,字典式破译,“拒绝服务”攻击,重放攻击,捆绑式攻击,以及渗透式攻击或蓄意破坏.
(3)Network Scanning is the use of a computer network for gathering information on computer systems,which may be used for ststem maintenance,security assessment and investigation,and for attack.
网络扫描即利用计算机网络收集计算机系统上的信息,这些信息有可能被用来维护系统,系统安全系数评估和检测,甚至用来攻击系统.
(4)a message which a sender encrypts using the recipient's pubic-key can only be decrypted by the recipient's paired private-key.
经过发送人用接收人的公共密匙把信息加密的信息只能通过接收人对应的个人密匙来破译.
(5)Until modern times, cryptography referred almost exclusively to encryption, the process of converting ordinary information(plaintext)into something unintelligible; this is a ciphertext. Decryption is the reverse,moving from unintelligible ciphertext to plaintext.
直至今天,密码学所涉及的几乎全是加密.加密就是把正常信息(纯文本信息)转化为难解或不可读的信息的过程.这种不可读信息被称为密码文体.解密则相反,把难懂的密码文本转成纯文本.
(6)In cryptography, a cryptographic hash function is a hash function with certain additional security properties to make it suitable for use as a primitive in various information security applications, such as authentication and message integrity.
在密码学中,密码哈希函数是指具有特定附加安全属性以便作为各种信息安全应用的依据(primitive),如身份鉴定和信息的完整性.
(7)Symmetric-key cryptography refers to encryption methods in which both the sender and receiver share the same key (or, less commonly, in which their keys are different, but related in an easily computable way).
对称密匙密码指信息发送者与接收者能共用同一个密匙(或比较少见的是,他们用不同的密匙但两者可简单计算关联)的加密方法.
(8)In addition to encryption,public-key cryptography can be used to implement digital signature schemes.A digital signature is reminiscent of an ordinary signature;they both have the characteristic that they are easy for a user to produce,but difficult for anyone else to forge.
除了加密,公共密匙密码还可用于实现数字签名方案.数字签名与普通的签名相似,都有用户操作简单但他人难以模仿的特性.
汉译英
(1)主动攻击会造成网络系统状态和服务的改变.主动攻击包括试图阻断或攻破保护机制、引入恶意代码、偷窃或篡改信息.主动进攻可能造成数据资料的泄露和散播,或导致拒绝服务以及数据的篡改,包括大多数的未授权用户企图以非正常手段和正常手段进入远程系统.
Active attack will cause the change of status and services of network system. Active attacks include attempts to block or break the protection mechanisms, to introduce malicious code, to steal or tamper the information. Active attacks may result in disclosure or dissemination of data, or result in denial of service and data tampering, including most of unauthorized users attempt to access to the remote system by ordinary or non-ordinary methods.
(2)一般完整的攻击过程都是先隐藏自身,在隐藏好自己后在进行预攻击探测,检测目标机器的各种属性和具备的被攻击条件;然后采取相应的攻击方法进行破坏,达到自己的目的之后攻击者会删除自己的行为在目标系统中的日志.
Generally, a complete attack process is, the attacker is to hide himself first, then begin the pre-attack detection which is to detect the various properties of target machines and access what conditions are favorable for the attack; and then take the appropriate methods to carry out sabotage attacks, after succeed, attacker will delete their operations in the target system log.
(3)拒绝服务(Denial of Service,简称Dos攻击),就是通过非法独占受攻击的目标系统的服务,最终试图阻止合法用户使用受攻击目标提供的网络服务.拒绝服务攻击最常见的就是攻击者通过产生大量流向受害网络的数据包,消耗该网络所有的可用带宽.
Denial of service (Dos in short) refers to an attempt to illegally accroach attacked target system’s service and unable the legal users to make use of it. The most common denial of service attack is the attacker to produce a large number of network packet and make it flow to victim network to consume all the available bandwidth of the network.
(4) 现代密码学的一个基本原则是:一切秘密都存在于密匙之中.其含义是,在设计加密系统时,总是假设密码算法是公开的,真正需要保密的是密匙.这是因为密码算法相对密匙来说更容易泄漏.
A fundamental principle of modern cryptography is: all the secrets are kept in the key, which means when design the encryption systems, designers always assume that cryptographic algorithm is open; what really need to protect is the key. Because compared to the key, encryption algorithm is more likely to be leaked.
(5)对称密码体制的密码需要实现经过安全的密码通道有发方传给收方.这种密码体制的优点是:安全性高,加密速度快.缺点是:随着网络规模的扩大,密匙的管理成为一个难点;无法解决消息确认问题;缺乏自动检测密匙泄漏的能力.
Key of symmetric cryptosystem need to be sent to receiver through a secure access by the sender. The advantages of cryptography are: high security, fast encryption speed; While the disadvantages are: the key management becomes a difficulty as network scale is growing; inextricability of message confirmation difficulty; lack of the ability to automatically detect the key leakage.
(6)公开密匙密码也称为非对称密匙密码.使用公开密匙密码的每一个用户都分别拥有两个密匙:加密密匙和解密密匙,它们两者并不相同,并且由加密密匙得到解密密匙在计算机上是不可行的.每一个用户的加密都是公开的(因此,加密密匙也称为公开密匙).
Public-key cryptography is also called asymmetric-key cryptography. Every user who uses public- key cryptography has two keys: encryption key and decryption key. These two keys are different and further, it is infeasible to obtain the decryption key from the encryption key on the computer. Every user’s encryption key is public (and therefore, encryption key is also known as public-key).
英语翻译这是属于内燃机的一种启动方式,直接用翻译软件翻的……不是很好吧……不过还是谢谢你们了。继续求TAT
《邹忌讽齐王纳鉴》的翻译谢谢了,
文言文《醉酸不售》给位、帮忙找找那、我要那个的翻译、谢谢了
中级口译口试 那个第二第三部分 是怎么考的?是听1句立即翻译 还是全部听完了在翻译啊?
英语翻译继续刚才那个哦~都翻译了给个几百分吧,救命之需啊~Fig.2 compares the profiles ass
我以前从没去过那个农场 翻译 谢谢啊!
粤语翻译 谢谢大家的支持和鼓励,我会继续努力的
翻译下这首歌,谢谢了.
谢谢请继续翻译There is nothing to explain!
我知道,现在说什么都晚了,但是,我还是想对那个女孩唱出这首歌,求大神帮忙翻译为英语一下,急用,谢谢
求大神给翻译啊大神们 求翻译 不要百度在线翻译哦 那个不准 谢谢了 我们很傻,总是把精力放在了不该放的位置上.我庆幸夜晚
怎样翻译尽管被许多人嘲笑,他还是继续他的研究.成英语