英译汉汉译英高分求英语高手帮忙别用软件和在线翻译东西有点多但质量第一发我邮箱[email protected]速度!

英译汉
(1)A hacker is someone who creates and modifies computer software and computer hardware, including computer programming ,a hacker is software designer and programmer who builds elegant,beautiful programs and systems.
(2)Attack is an assault against a computer system or network as a result of deliberate,intelligent action;for example,denial of service attacks,penetration and sabotage.Such as brute force attack,dictionary attack,denial of service attack,replay attack,piggybacking,penetration and sabotage.
(3)Network Scanning is the use of a computer network for gathering information on computer systems,which may be used for ststem maintenance,security assessment and investigation,and for attack.
(4)a message which a sender encrypts using the recipient's pubic-key can only be decrypted by the recipient's paired private-key.
(5)Until modern times,cryptograghy referred almost exclusively to encryption,the process of converting ordinary information(plaintext)into something unintelligible;this is a ciphertext.Decryption is the reverse,moving from unintelligible ciphertext to plaintext.
(6)In cryptography,a cryptographic hash function is a hash function with certain additional security properties to make it suitable for use as a primitive in various information security applications,such as authentication and message integrity.
(7)Symmetric-key cryptography refers to encryption methods in which both the sender and receiver share the same key (or,less commonly,in which their keys are different ,but related in an easily computable way).(8)In addition to encryption,public-key cryptography can be used to implement digital signature schemes.A digital signature is reminiscent of an ordinary signature;they both have the characteristic that they are easy for a user to produce,but difficult for anyone else to forge.
汉译英
(1)主动攻击会造成网络系统状态和服务的改变。主动攻击包括试图阻断或攻破保护机制、引入恶意代码、偷窃或篡改信息。主动进攻可能造成数据资料的泄露和散播,或导致拒绝服务以及数据的篡改,包括大多数的未授权用户企图以及非正常手段和正常手段进入远程系统。
(2)一般完整的攻击过程都是先隐藏自身,在隐藏好自己后在进行预攻击探测,检测目标机器的各种属性和具备的被攻击条件;然后采取相应的攻击方法进行破坏,达到自己的目的之后攻击者会删除自己的行为在目标系统中的日志。
(3)拒绝服务(Denial of Servive,简称Dos攻击),就是通过非法独占受攻击的目标系统的服务,最终试图阻止合法用户使用受攻击目标提供的网络服务。拒绝服务攻击最常见的就是攻击者通过产生大量流向受害网络的数据包,消耗该网络所有的可用带宽。
(4)现代密码学的一个基本原则是:一切秘密都存在于密匙之中。其含义是,在设计加密系统时,总是假设密码算法是公开的,真正需要保密的是密匙。这是因为密码算法相对密匙来说更容易泄漏。
(5)对称密码体制的密码需要实现经过安全的密码通道有发方传给收方。这种密码体制的优点是:安全性高,加密速度快。缺点是:随着网络规模的扩大,密匙的管理成为一个难点;无法解决消息确认问题;缺乏自动检测密匙泄漏的能力。
(6)公开密匙密码也称为非对称密匙密码。使用公开密匙密码的每一个用(续)
接(6):户都分别拥有两个密匙:加密密匙和解密密匙,它们两者并不相同,并且由加密密匙得到解密密匙在计算机上是不可行的。每一个用户的加密都是公开的(因此,加密密匙也称为公开密匙)。

继续啊 你翻译的很好 加油 我等着呢 地方不够就发我邮箱里 很棒的话在加分也没问题

终于完成了。。。。。敬请验收:
英译汉
(1) 黑客(或称电脑高手)就是指开发和重新设计计算机软件和硬件,包括计算机程序的人。黑客还是个软件设计师和程序开发师,可开发一流的、美观的程序及系统。
(2) 攻击即对计算机系统或网络的蓄意、智能袭击行为。如,暴力破解,字典式破译,“拒绝服务”攻击,重放攻击,捆绑式攻击,以及渗透式攻击或蓄意破坏。
(3) 网络扫描即利用计算机网络收集计算机系统上的信息,这些信息有可能被用来维护系统,系统安全系数评估和检测,甚至用来攻击系统。
(4)经过发送人用接收人的公共密匙把信息加密的信息只能通过接收人对应的个人密匙来破译。
(5) 直至今天,密码学所涉及的几乎全是加密。加密就是把正常信息(纯文本信息)转化为难解或不可读的信息的过程。这种不可读信息被称为密码文体。解密则相反,把难懂的密码文本转成纯文本。
(6) 在密码学中,密码哈希函数是指具有特定附加安全属性以便作为各种信息安全应用的依据(primitive),如身份鉴定和信息的完整性。
(7) 对称密匙密码指信息发送者与接收者能共用同一个密匙(或还有一种比较少见的是,他们用不同的密匙但两者可简单计算关联)的加密方法。
(8) 除了加密,公共密匙密码还可用于实现数字签名方案。数字签名与普通的签名相似,都有用户操作简单但他人难以模仿的特性。
汉译英
(1) Active attack will cause the change of status and services of network system. Active attacks include attempts to block or break the protection mechanisms, to introduce malicious code, to steal or tamper the information. Active attacks may result in disclosure or dissemination of data, or result in denial of service and data tampering, including most of unauthorized users attempt to access to the remote system by ordinary or non-ordinary methods.
(2)Generally, a complete attack process is, the attacker is to hide himself first, then begin the pre-attack detection which is to detect the various properties of target machines and access what conditions are favorable for the attack; and then take the appropriate methods to carry out sabotage attacks, after succeed, attacker will delete their operations in the target system log.
(3)Denial of service (Dos in short) refers to an attempt to illegally accroach attacked target system’s service and unable the legal users to make use of it. The most common denial of service attack is the attacker to produce a large number of network packets and make them flow to victim network to consume all the available bandwidth of the network.
(4) A fundamental principle of modern cryptography is: all the secrets are kept in the key, which means when design the encryption systems, designers always assume that cryptographic algorithm is open; what really need to protect is the key. Because compared to the key, encryption algorithm is more likely to be leaked.
(5)Key of symmetric cryptosystem needs to be sent to receiver through a secure access by the sender. The advantages of cryptography are: high security, fast encryption speed; While the disadvantages are: the key management becomes a difficulty as network scale is growing; inextricability of message confirmation difficulty; lack of the ability to automatically detect the key leakage.
(6)Public-key cryptography is also called asymmetric-key cryptography. Every user who uses public- key cryptography has two keys: encryption key and decryption key. These two keys are different and further, it is infeasible to obtain the decryption key from the encryption key on the computer. Every user’s encryption key is public (and therefore, encryption key is also known as public-key).
温馨提示:答案为网友推荐,仅供参考
第1个回答  2010-12-15
您好哦。我是英语专业的、我目前考到了专8 希望对你有所帮助

(1)黑客用创造并且修改人计算机软件和计算机硬件,包括计算机程序设计中,一种黑客软件设计师和程序员的营造优雅、美观的程序和系统。
(2)攻击攻击是对计算机系统或网络由于深思熟虑的,聪明的行动;例如,拒绝服务攻击、渗透和破坏如强力攻击,字典攻击,拒绝服务攻击、重放攻击,盗用、贯穿破坏活动。
(3)网络扫描计算机网络的使用计算机系统收集信息,可作为系统维护、安保评估和调研,打。
(4)一个信息进行加密发送端使用收件人的pubic-key只能被受体的解密成对私钥。
(5)直到近代,所cryptograghy就完全加密,转换的普通的信息(明文)变成不明白;这是一个密文相反,解密是不能移动,从对密码明文。
(6)在密码学中,加密的哈希函数是哈希函数与某些额外的安全性能使其适合作为原始中各种信息安全应用,如认证和信息的完整性。
(7)对称钥匙加密是指加密方法都有相同的发送者和接收者键(或,普遍较少,在他们的钥匙是不同的,但是相关的一种简单的计算)。(8)除了加密,公钥加密可以用于实现数字签名方案数字签名令人想起一个普通的签名:他们都有特色,他们就会很容易用户得分,但是困难的人还能形成。

(1) attack can lead to network system state and service of the change. Active attack include trying to block or rent asunder protection mechanism, introducing malicious code, theft or distort information. Offensive attack may cause data leakage of and diffuse, or cause denial-of-service as well as data, including most of tampering with unauthorized users attempt and abnormal means and normal means access to remote system.
(2) general complete attack process is first hidden themselves, in hidden yourself after detection of target detection, advance against all kinds of attributes and machine has attacked condition, Then take the corresponding method of assault destruction, reach own purpose after the attacker will delete your behavior in target system of log.
(3) Denial of service (Denial of Servive, abbreviation Dos attack), is through the illegal exclusive attack target system services and finally tried to stop a legitimate user use attack target provide network services. Denial of service attack the most common is the attacker through produce the massive flow network packets, consumption victims of all available this network bandwidth.
(4) modern cryptography of one basic principle is: all secret all exist in key among. Its meaning is, in the design encryption system, always assume cryptographic algorithm is open, the real need secret is key. This is because cryptographic algorithms for relative key more easily leak.
(5) symmetric cryptosystem password should realize through security password channels have hair fang to transmitter. The password system advantage: high safety, encryption speed. Defect is: with the expanding of network size, key management has been a difficulty, Identify problems cannot be solved news, Lack of automatic detection key leakage ability.
(6) public-key password also called asymmetric key password. Use public-key password each use (contd.)
第2个回答  2010-12-15
(1)黑客用创造并且修改人计算机软件和计算机硬件,包括计算机程序设计中,一种黑客软件设计师和程序员的营造优雅、美观的程序和系统。
(2)攻击攻击是对计算机系统或网络由于深思熟虑的,聪明的行动;例如,拒绝服务攻击、渗透和破坏如强力攻击,字典攻击,拒绝服务攻击、重放攻击,盗用、贯穿破坏活动。
(3)网络扫描计算机网络的使用计算机系统收集信息,可作为系统维护、安保评估和调研,打。
(4)一个信息进行加密发送端使用收件人的pubic-key只能被受体的解密成对私钥。
(5)直到近代,所cryptograghy就完全加密,转换的普通的信息(明文)变成不明白;这是一个密文相反,解密是不能移动,从对密码明文。
(6)在密码学中,加密的哈希函数是哈希函数与某些额外的安全性能使其适合作为原始中各种信息安全应用,如认证和信息的完整性。
(7)对称钥匙加密是指加密方法都有相同的发送者和接收者键(或,普遍较少,在他们的钥匙是不同的,但是相关的一种简单的计算)。(8)除了加密,公钥加密可以用于实现数字签名方案数字签名令人想起一个普通的签名:他们都有特色,他们就会很容易用户得分,但是困难的人还能形成。

(1) attack can lead to network system state and service of the change. Active attack include trying to block or rent asunder protection mechanism, introducing malicious code, theft or distort information. Offensive attack may cause data leakage of and diffuse, or cause denial-of-service as well as data, including most of tampering with unauthorized users attempt and abnormal means and normal means access to remote system.
(2) general complete attack process is first hidden themselves, in hidden yourself after detection of target detection, advance against all kinds of attributes and machine has attacked condition, Then take the corresponding method of assault destruction, reach own purpose after the attacker will delete your behavior in target system of log.
(3) Denial of service (Denial of Servive, abbreviation Dos attack), is through the illegal exclusive attack target system services and finally tried to stop a legitimate user use attack target provide network services. Denial of service attack the most common is the attacker through produce the massive flow network packets, consumption victims of all available this network bandwidth.
(4) modern cryptography of one basic principle is: all secret all exist in key among. Its meaning is, in the design encryption system, always assume cryptographic algorithm is open, the real need secret is key. This is because cryptographic algorithms for relative key more easily leak.
(5) symmetric cryptosystem password should realize through security password channels have hair fang to transmitter. The password system advantage: high safety, encryption speed. Defect is: with the expanding of network size, key management has been a difficulty, Identify problems cannot be solved news, Lack of automatic detection key leakage ability.
(6) public-key password also called asymmetric key password. Use public-key password each use (contd.)
第3个回答  2010-12-15
汉译英
(1) active attack will cause the network to change the system state and services. Active attacks include attempts to block or break the protection mechanisms, the introduction of malicious code, theft or tampering with information. Active attacks may result in disclosure of data and dissemination of, or result in denial of service and data tampering, including most of the attempts by unauthorized users and non-normal means and the normal means of access to the remote system.
(2) process is generally complete the first attack hide itself, after hiding their own during the pre-attack detection, detection of the target machine's various properties and conditions have been attacked; and then take the appropriate method of attack to destroy, to achieve their After their attackers to delete their behavior in the target system log.
(3) denial of service (Denial of Servive, called Dos attack), is under attack through illegal exclusive services to the target system, and ultimately try to prevent legitimate users from using the network provided by the target service. The most common denial of service attack is the attacker by producing a large number of victims of the network packet flow, consume all the available bandwidth of the network.
(4) Modern cryptography is a fundamental principle: all the secrets are being present in the key. The implication is that in the design of cryptographic systems, cryptographic algorithms always assume that is open, the real need for confidentiality is the key. This is because the relative key encryption algorithm is more likely to leak.
(5) symmetric cryptography passwords need to achieve through secure password access are passed to debit the sender. The password system advantages are: high security, fast encryption speed. The disadvantage is: With the expansion of the network, the management of a difficult key; not solve the confirmation message; lack the ability to automatically detect the key leakage.
(6) public-key password is also called asymmetric key password. Password using the public key, respectively, every user has two keys: encryption keys and decryption keys, both of them are not the same, and the decryption key from the encryption key on the computer is not feasible. Every user of encryption is public (and therefore, also known as public key encryption key).
英译汉
将英语译成中文
1)黑客是谁的人创建和修改计算机软件和计算机硬件,包括电脑编程,黑客是软件设计师和程序员谁建立高雅,美丽方案和系统。
(2)攻击是一种对计算机系统或由于故意,智能网络攻击行动的结果,例如,服务攻击,渗透和强力攻击sabotage.Such,否认字典攻击,服务攻击,重放攻击拒绝,捎带,渗透和破坏活动。
(3)网络扫描是一个计算机网络,收集有关计算机系统,它可用于ststem维修,安全评估和调查使用的信息的使用,和进攻。
(4)加密讯息,发件人使用收件人的耻骨,解密密钥只能由收件人的成对的私钥。
(5)直到近代,cryptograghy几乎只提到加密,不可理解的东西转化为普通的信息(明文)的过程,这是一个ciphertext.Decryption则相反,从不懂到移动明文密文。
(6)在密码学中,加密哈希函数是一个与某些额外的安全性能,使其散列函数作为一种原始的使用各种信息安全应用,例如身份验证和消息完整性,合适。
(7)对称密钥加密的加密方法,是指在该发送者和接收者都共享相同的键(或较少见,其中他们的密钥是不同的,但在一个轻松可计算的方式有关)。(8)除加密,公钥加密,可以用来实现数字签名数字签名schemes.A是一个普通的签字让人联想到,它们都具有的特点,他们很容易使用户能生产,但别人很难伪造。
第4个回答  2010-12-15
英译汉
(1)黑客是谁的人创建和修改计算机软件和计算机硬件,包括电脑编程,黑客是软件设计师和程序员谁建立高雅,美丽方案和系统。
(2)攻击是一种对计算机系统或由于故意,智能网络攻击行动的结果,例如,服务攻击,渗透和强力攻击sabotage.Such,否认字典攻击,服务攻击,重放攻击拒绝,捎带,渗透和破坏活动。
(3)网络扫描是一个计算机网络,收集有关计算机系统,它可用于ststem维修,安全评估和调查使用的信息的使用,和进攻。
(4)加密讯息,发件人使用收件人的耻骨,解密密钥只能由收件人的成对的私钥。
(5)直到近代,cryptograghy几乎只提到加密,不可理解的东西转化为普通的信息(明文)的过程,这是一个ciphertext.Decryption则相反,从不懂到移动明文密文。
(6)在密码学中,加密哈希函数是一个与某些额外的安全性能,使其散列函数作为一种原始的使用各种信息安全应用,例如身份验证和消息完整性,合适。
(7)对称密钥加密的加密方法,是指在该发送者和接收者都共享相同的键(或较少见,其中他们的密钥是不同的,但在一个轻松可计算的方式有关)。(8)除加密,公钥加密,可以用来实现数字签名数字签名schemes.A是一个普通的签字让人联想到,他们对任何人都有他们的特点,易于为用户生产,但难以伪造其他

English Translation
(1) active attack will cause the network to change the system state and services. Active attacks include attempts to block or break the protection mechanisms, the introduction of malicious code, theft or tampering with information. Active attacks may result in disclosure of data and dissemination of, or result in denial of service and data tampering, including most of the attempts by unauthorized users and non-normal means and the normal means of access to the remote system.
(2) process is generally complete the first attack hide itself, after hiding their own during the pre-attack detection, detection of the target machine's various properties and conditions have been attacked; and then take the appropriate method of attack to destroy, to achieve their After their attackers to delete their behavior in the target system log.
(3) denial of service (Denial of Servive, called Dos attack), is under attack through illegal exclusive services to the target system, and ultimately try to prevent legitimate users from using the network provided by the target service. The most common denial of service attack is the attacker by producing a large number of victims of the network packet flow, consume all the available bandwidth of the network.
(4) Modern cryptography is a fundamental principle: all the secrets are being present in the key. The implication is that in the design of cryptographic systems, cryptographic algorithms always assume that is open, the real need for confidentiality is the key. This is because the relative key encryption algorithm is more likely to leak.
(5) symmetric cryptography passwords need to achieve through secure password access are passed to debit the sender. The password system advantages are: high security, fast encryption speed. The disadvantage is: With the expansion of the network, the management of a difficult key; not solve the confirmation message; lack the ability to automatically detect the key leakage.
(6) public-key password is also called asymmetric key password. Password using the public key used for each (continued
相似回答