窃听者 meaning in Chinese
interceptor
listener-in
Examples
- Guarantees that the data passed between the requester and provider is protected from eavesdroppers
保证请求方和提供方之间传输的数据不会被窃听者窃取。 - The main feature of such protocol is that it is more sensitive to the attack of the eavesdropper
这种协议的特点是对于窃听者的攻击行为更加敏感,安全性更强。 - In the traditional cryptography , there is one sender , one receiver and an active or a passive eavesdropper who is an opponent
在传统保密通信中,有一个发送方、一个接收方和一个敌方,敌方可能是主动攻击者也可能是被动窃听者。 - Trouble is , the design of wep allows eavesdroppers to decode the wep - encrypted messages fairly simply , and thus gain access to networks and data
问题是, wep的设计使窃听者能够相当简单地译码wep加密的消息,从而获得对网络和数据的访问。 - To help protect the data transferred between clients and servers from eavesdroppers , you should encrypt it by using digital certificate technology
为了帮助保护客户端和服务器之间传输的数据免于被窃听者窃取,您应该使用数字证书技术对数据进行加密。