n. 黑客, 骇客;电脑黑客(hacker的复数)
n someone who plays golf poorly
n a programmer who breaks into computer systems in order to steal or change or destroy information as a form of cyber-terrorism
n a programmer for whom computing is its own reward; may enjoy the challenge of breaking into other computers but does no harm
n one who works hard at boring tasks

hackers的用法和样例:

例句

  1. The police arrested the two hackers.警察就逮捕了这两名黑客。
  2. Most computer crimes can be traced back to hackers.大多数计算机犯罪都是计算机黑客干的。

[00:01.76]黑客、破坏者和追踪者 [00:03.53]1 Coursing through arteries,replicating along the way,edging into new sites to wreak havoc, [00:07.13]这种病毒通过主干线,一路繁殖,渐渐扩大范围造成严重破坏, [00:10.73]th

发表于:2018-12-01 / 阅读(88) / 评论(0) 分类 新编大学英语浙江版

[00:00.00]Unit 4 Cyberspace [00:05.64]Lesson 1 Tomorrow's World [00:09.41]The Future of Cyberspace [00:12.54]Peter Taylor finds out how computers [00:14.88]and the Internet are going to affect our lives. [00:19.91]In the last thirty years, [00:21.57]

发表于:2018-12-04 / 阅读(206) / 评论(0) 分类 北师大版高中英语模块2

AUDIE CORNISH, HOST: For three days now, a drama has been unfolding at HBO. They've been hacked. Company information was stolen... (SOUNDBITE OF RAMIN DJAWADI'S GAME OF THRONES THEME) CORNISH: ...Including programming materials possibly from Game Of

发表于:2018-12-17 / 阅读(50) / 评论(0) 分类 2017年NPR美国国家公共电台8月

14 Dealing with Website Hackers GLOSSARY hacker a person who tries to access and/or change the information on anotherpersons computer or website, usually to get secret information or to destroy acompetitors computer system* How long would it take a h

发表于:2018-12-18 / 阅读(81) / 评论(0) 分类 2010年ESL之商务英语

Thousands of protesters gathered in Sanford Florida today along with civil right jacketers like Jason Jackson, Alshapton for a rally and marched to police headquaters. They're demanding the arrest of the neighborhood watch volunteer George Zemaman in

发表于:2018-12-24 / 阅读(107) / 评论(0) 分类 CNN2012年(四)月

网络的发展,给我们带来便利的同时,也带来了问题。其中之一就是网络犯罪.... Dan: Hello, I'm Dan. Rob: And I'm Rob. Dan: And this is 6 Minute English! This week we're talking about cyber crime. Rob: Yes, cyber crime. It'

发表于:2018-12-27 / 阅读(70) / 评论(0) 分类 一起听英语

SAN FRANCISCO, July 12 (Xinhua) -- Yahoo on Thursday confirmed that hackers had stolen around 400,000 account credentials from its computer system. In a statement to technology blog TechCrunch, Yahoo said that approximately 400,000 Yahoo! and other c

发表于:2019-01-06 / 阅读(65) / 评论(0) 分类 英语新闻

There's an iconic image of Bill Gates that might help explain our collective fascination with this legendary businessman and his most famous creation, the Microsoft Corp. It's a mug shot from 1977, taken after Gates was pulled over in Albuquerque, N.

发表于:2019-01-08 / 阅读(180) / 评论(0) 分类 英语小短文

Arrests Do Not Deter 'Anonymous' Hackers Early this week the U.S. Attorney in New York indicted five alleged computer hackers. Authorities describe four of them as principal members of a loose hacker confederation known as Anonymous. Despite these an

发表于:2019-01-13 / 阅读(119) / 评论(0) 分类 VOA标准英语2012年(三月)

But by the early 1970s a shift was under way. 但到了20世纪70年代初期,人们的想法开始转变。 Computing went from being dismissed as a tool of bureaucratic control to being embraced as a symbol of individual expression and liberation

发表于:2019-01-22 / 阅读(78) / 评论(0) 分类 乔布斯传

Cyber-security网络安全The internet of things (to be hacked)(或将遭遇黑客的)物联网Hooking up gadgets to the web promises huge. But security must not be an afterthought将各种东西交联到互联网上似乎前景极大,但首先应

发表于:2019-01-27 / 阅读(54) / 评论(0) 分类 经济学人财经系列

RICK KARR: Malicious computer hackers are posing more and more of a threat to business and governmentand they will spend around 46 billion dollars this year to protect themselves from those hackers. Some computer security experts argue that in order

发表于:2019-01-27 / 阅读(298) / 评论(0) 分类 PBS访谈教育系列

BEIJING, Nov. 28 (Xinhuanet) -- The U.S. FBI and police in the Philippines have arrested four alleged hackers in Manila with connections to a terrorist group in Saudi Arabia, according to media reports Monday. The four who were arrested last Wednesda

发表于:2019-02-04 / 阅读(81) / 评论(0) 分类 英语新闻

Valerie: Youll never guess what happened over the weekend. Bill: What? Valerie: Our website was attacked by hackers, and nobody could access it. Bill: Youre kidding! What did they do? Valerie: They got access to our server and embedded some malicious

发表于:2019-02-05 / 阅读(51) / 评论(0) 分类 地道美语播客

要求: 1。一定要控制自己不看原文直接选择答案的冲动! 2。写出每一个题目里面的错误类型,。 下面的各篇文章题目对我们以上讲过的干扰选项的所有情形包含在内了。要小心应付。 Pass

发表于:2019-02-09 / 阅读(71) / 评论(0) 分类 大学四六级阅读

ARI SHAPIRO, HOST: The U.S. says intellectual property theft by Chinese hackers is growing, and the U.S. will keep naming and shaming suspected cybercriminals. The Chinese are targeting the country's technology - from major corporations, Silicon Vall

发表于:2019-02-13 / 阅读(42) / 评论(0) 分类 2018年NPR美国国家公共电台12月

Computer hackers have attacked and infiltrated some 150 computers in the French Finance Ministry(财政部 ), stealing sensitive information related to the country's leadership of the Group of 20 economic group. Budget Minister Francois Baroin sa

发表于:2019-02-13 / 阅读(80) / 评论(0) 分类 英语新闻

Four years ago, a security researcher, or, as most people would call it, a hacker, found a way to literally make ATMs throw money at him. His name was Barnaby Jack, and this technique was later called jackpotting in his honor. I'm here today because

发表于:2019-02-16 / 阅读(57) / 评论(0) 分类 英语语言学习

12. 土耳其人 Given that their homeland straddles two continents, it should be no surprise that Turkish people have a fairly cool outlook on life, embracing a diverse range of cultures, cuisines and plumbing standards. 土耳其横跨两大洲,土

发表于:2019-02-18 / 阅读(54) / 评论(0) 分类 阅读空间

LULU GARCIA-NAVARRO, HOST: Hackers love to try to breach U.S. computer systems. This now may be easier than ever before. With so many IT and cybersecurity workers furloughed by the shutdown, security professionals say government websites are more vul

发表于:2019-03-04 / 阅读(110) / 评论(0) 分类 2019年NPR美国国家公共电台1月
学英语单词
accompanying sound
aislabies
aniston
annoyaunce
arcus pedis transversalis
artillery prime mover
atigi
auxochromous group
axillary sheath
Bannertown
Borate minerals
buttfucking
caseros
cemetery garden
civilianising
colonnas
come on strike
consulting work
cowcumber
debriefed
decision speed
declination constant
diamond-impregnated tool
Dipher
distributable surplus
distributed-emission photod
dotted quaver
egg-and-tongues
enamel lamp-shade
enterococcus faecalis
European Arum
evaporator tank
everlastin'
exception list
excessive issuance of bank notes
fenprinast
fillet welding machine
flavicomous
Floyd Bennett Field
fractional (deposit) banking
Fulsed
genus clinopodiums
Glacier Bay National Park and Preserve
groove-iike invagination
Habibābād
hammer throws
have young
Hevea brasiliensis Muell.-Arg.
hostiers
Hung's modified filtration counting method
inclined wharf
inertial lag
Intel Technology Provider
kentwood
Kerr effect self-focusing
Khetlāl
kinmonds
lambruscoes
lani
le massacre des amazones
legspinners
memabtine
monosomatous
most significant position
multi start screw thread
neat not gaudy
nephelo-
nondeserving
nonlobbying
nonsingular curve
notra
paytamine
pittosporum brevicalyx(oliv.)gagnep.
pooper-scoopers
pound-keepers
pseudocontrol vector
quick-acting spring switch
red infarct
rejectable process level
revenue accounts
rhabdornises
rilutek
ripply
roentgenograph
Rufus L.
sex-age specific death rate
slow belly
snowy tree-cricket
sorned
spoligotyping
standby emergency mode
Swift's disease
TATG
ten-year series
Thomas Moore
traffic accident prediction
unit separator
universal structural mill
vehicle leasing
verbalisable
wakeys-wakeys
whipped through