网络用语鱼叉什么意思? phishing是什么意思怎么用?

\u9c7c\u53c9\u662f\u5565\u610f\u601d

\u9c7c\u53c9
y\u00fach\u0101
\u53c9\u5f62\u7684\u6355\u9c7c\u5de5\u5177\u3002\u4ea6\u4f5c\u5175\u5668\u4f7f\u7528\u3002
\u5b8b\uff0e\u9646\u6e38\uff0e\u8001\u5b66\u5eb5\u7b14\u8bb0\uff0e\u5377\u4e00\uff1a\u300c\u6218\u8239\u6709\u8f66\u8239\uff0c\u6709\u6d46\u8239\uff0c\u6709\u6d77\u9cc5\u5934\uff1b\u519b\u5668\u6709\u62ff\u5b50\uff0c\u6709\u9c7c\u53c9\uff0c\u6709\u6728\u8001\u9e26\u62ff\u5b50\u3002\u9c7c\u53c9\u4ee5\u7af9\u7aff\u4e3a\u67c4\uff0c\u957f\u4e8c\u4e09\u4e08\uff0c\u77ed\u5175\u6240\u4e0d\u80fd\u654c\u3002\u300d
1) \u9c7c\u5177\u540d\u3002\u6355\u9c7c\u7528\u7684\u53c9\u3002
2) \u5175\u5668\u540d\u3002
fish spear; fishgig; fish fork; harpoon; gaff; snigger
\u7528\u9c7c\u53c9\u6355\u9c7c

phishing \u57fa\u672c\u91ca\u4e49 n. \u7f51\u7edc\u9493\u9c7c\uff1b\u7f51\u7edc\u6b3a\u8bc8\uff08\u4ee5\u865a\u5047\u7684\u8eab\u4efd\u548c\u5f62\u8c61\u968f\u673a\u9a97\u53d6\u4e2a\u4eba\u5e10\u53f7\u548c\u5bc6\u7801\u7b49\uff09
\u7f51\u7edc\u91ca\u4e49 \u67ef\u6797\u65af\u9ad8\u7ea7\u82f1\u6c49\u53cc\u89e3\u8bcd\u5178 \u7f51\u7edc\u9493\u9c7c
\u7f51\u7edc\u9493\u9c7c(Phishing)\u662f\u4e00\u79cd\u5e38\u89c1\u7684\u6b3a\u9a97\u624b\u6cd5\uff0c\u7f51\u7edc\u9a97\u5b50\u5047\u501f\u5404\u79cd\u540d\u4e49\u53d1\u7535\u5b50\u90ae\u4ef6\u7ed9\u7535\u8111\u7528\u6237\uff0c\u4ee5\u9a97\u53d6\u4ed6\u4eec\u7684\u4e2a\u4eba\u4fe1\u606f\u3002\u8fd1\u6765\u8fd9\u79cd\u6b3a\u9a97\u624b\u6cd5\u6709\u4e2a\u4eba\u5316\u7684\u8d8b\u52bf

\u7f51\u8def\u9493\u9c7c
\u7f51\u8def\u9493\u9c7c\uff08Phishing\uff09\u662f\u4e00\u79cd\u4f01\u56fe\u4ece\u7535\u5b50\u901a\u8baf\u4e2d\uff0c\u900f\u8fc7\u4f2a\u88c5\u6210\u4fe1\u8a89\u5353\u8457\u7684\u6cd5\u4eba\u5a92\u4f53\u4ee5\u83b7\u5f97\u5982\u7528\u6237\u540d\u3001\u5bc6\u7801\u548c\u4fe1\u7528\u5361\u660e\u7ec6\u7b49\u4e2a\u4eba\u654f\u611f\u8d44\u8baf\u7684\u72af\u7f6a\u8bc8\u9a97\u8fc7\u7a0b\u3002



\u53cd\u9493\u9c7c
\u53cd\u9493\u9c7c(Anti-Phishing)\u2014\u9632\u6b62\u9493\u9c7c\u7f51\u7ad9(\u865a\u5047\u7f51\u7ad9)\uff0c\u9493\u9c7c\u90ae\u4ef6\u7684\u8bef\u5bfc\uff0c\u91d1\u5c71\u6bd2\u9738\u4f1a\u81ea\u52a8\u62e6\u622a\u4f7f\u7528\u8005\u8fde\u7ed3\u9493\u9c7c\u7f51\u7ad9\uff0c\u9632\u6b62\u4f7f\u7528\u8005\u7684\u5e10\u53f7\u5bc6\u7801\u7b49\u91cd\u8981\u8d44\u6599\u88ab\u76d7\u53d6\u3002


\u6536\u96c6\u5782\u9493
\u6536\u96c6\u5782\u9493(Phishing)\u662f\u6536\u96c6\u4e0a\u5f88\u662f\u7684\u4e00\u7c7b\u8bc8\u90a3\u7c7b\u5782\u9493\u7f51\u5750\u82e5\u662f\u4e0d\u7ec6\u5fc3\u5f88\u96be\u8fdb\u884c\u9632\u8303\u9a97\u4f53\u4f8b\uff0c\u5b83\u7684\u624b\u6bb5\u5be1\u591a\u3001\u624b\u827a\u66f4\u65b0\u5feb\uff0c\u662f\u5bf9\u6536\u96c6\u9886\u53d6\u548c\u7f51\u94f6\u5e73\u5b89\u7684\u6700\u5927\u3002


\u77ed\u8bed
spear phishing \u9c7c\u53c9\u5f0f\u7f51\u8def\u9493\u9c7c ; \u9c7c\u53c9\u5f0f\u7f51\u7edc\u9493\u9c7c ; \u9c7c\u53c9\u5f0f\u9493\u9c7c ; \u9493\u9c7c\u653b\u51fb

phishing attack \u9493\u9c7c\u653b\u51fb ; \u9493\u9c7c\u5f0f\u653b\u51fb

Phishing site \u9493\u9c7c\u7f51\u7ad9

phishing fraud \u6ee4\u9493\u9c7c\u8bc8\u9a97

Phishing Attacks \u9493\u9c7c\u653b\u51fb ; \u9493\u9c7c\u5f0f\u653b\u51fb ; \u6355\u9493\u5f0f\u653b\u51fb

Phishing scams \u9493\u9c7c\u5f0f\u653b\u51fb ; \u7f51\u8def\u9493\u9c7c

Phishing Protection \u53cd\u9493\u9c7c\u4fdd\u62a4 ; \u7f51\u7edc\u9493\u9c7c\u4fdd\u62a4

Phishing Website \u4e0b\u9493\u9c7c\u7ad9\u70b9 ; \u9493\u9c7c\u7f51\u7ad9

Phishing Toolkits \u7f51\u9493\u5de5\u5177

\u66f4\u591a\u6536\u8d77\u7f51\u7edc\u77ed\u8bed
phish\u00b7ing /fɪʃɪŋ/
N-UNCOUNT Phishing is the practice of trying to trick people into giving secret financial information by sending e-mails that look as if they come from a bank, credit-card account, etc. The details are then used to steal people's money, or to steal their identity in order to commit crimes. \u7f51\u7edc\u9493\u9c7c [COMPUTING]

\u53cc\u8bed\u4f8b\u53e5 \u539f\u58f0\u4f8b\u53e5 For that reason , my research group at Carnegie Mellon University is studying the best ways to teach people to recognize and avoid phishing scams .
\u56e0\u6b64\uff0c\u6211\u5728\u7f8e\u56fd\u5361\u5185\u57fa\u7f8e\u4f26\u5927\u5b66\u7684\u7814\u7a76\u56e2\u961f\uff0c\u6b63\u5728\u7814\u7a76\u6559\u5bfc\u5927\u5bb6\u8fa8\u8ba4\u5e76\u907f\u5f00\u7f51\u9493\u90ae\u4ef6\u7684\u6700\u4f73\u65b9\u5f0f\uff1b



Although knowing the identity of the sender is a critical step in preventing fraud (such as phishing emails ), it will not solve the spam problem .
\u867d\u7136\u77e5\u9053\u5bc4\u4ef6\u8005\u7684\u8eab\u4efd\uff0c\u662f\u9632\u6b62\u6b3a\u9a97\uff08\u6bd4\u5982\u9493\u9c7c\u7535\u5b50\u90ae\u4ef6\uff09\u7684\u4e00\u5927\u5173\u952e\u6b65\u9aa4\uff0c\u4f46\u4ecd\u7136\u65e0\u6cd5\u89e3\u51b3\u5783\u573e\u90ae\u4ef6\u7684\u95ee\u9898\u3002



A few sites provided good background to raise awareness of the phishing threat but little in the way of actionable advice about how people could protect themselves .
\u5c11\u6570\u7f51\u7ad9\u867d\u7136\u63d0\u4f9b\u826f\u597d\u80cc\u666f\u77e5\u8bc6\uff0c\u63d0\u5347\u4e86\u5927\u5bb6\u5bf9\u7f51\u9493\u5a01\u80c1\u7684\u8b66\u89c9\u5fc3\uff0c\u4f46\u5bf9\u4e8e\u5982\u4f55\u4fdd\u62a4\u81ea\u5df1\u6ca1\u4ec0\u9ebd\u5177\u4f53\u5efa\u8bae\u3002



\u66f4\u591a\u53cc\u8bed\u4f8b\u53e5
But one of the first things we saw was a warning about a "phishing scam."
VOA: special.2010.02.18

\u767e\u79d1 \u9493\u9c7c\u5f0f\u653b\u51fb \u9493\u9c7c\u5f0f\u653b\u51fb\uff08Phishing\uff0c\u4e0e\u9493\u9c7c\u7684\u82f1\u8bedfishing\u53d1\u97f3\u4e00\u6837\uff0c\u53c8\u540d\u201c\u7f51\u9493\u6cd5\u201d\u6216\u201c\u7f51\u7edc\u7f51\u9493\u201d\uff0c\u4ee5\u4e0b\u7b80\u79f0\u7f51\u9493\uff09\u662f\u4e00\u79cd\u4f01\u56fe\u4ece\u7535\u5b50\u901a\u8baf\u4e2d\uff0c\u901a\u8fc7\u4f2a\u88c5\u6210\u4fe1\u8a89\u5353\u8457\u7684\u6cd5\u4eba\u5a92\u4f53\u4ee5\u83b7\u5f97\u5982\u7528\u6237\u540d\u3001\u5bc6\u7801\u548c\u4fe1\u7528\u5361\u660e\u7ec6\u7b49\u4e2a\u4eba\u654f\u611f\u4fe1\u606f\u7684\u72af\u7f6a\u8bc8\u9a97\u8fc7\u7a0b\u3002

一种从原始部落就开始使用的生产工具,用于捕鱼。

猎艳工具,比如微信默默。。。

...

  • 缃戠粶鐢ㄨ楸煎弶浠涔堟剰鎬?
    绛旓細涓绉嶄粠鍘熷閮ㄨ惤灏卞紑濮嬩娇鐢ㄧ殑鐢熶骇宸ュ叿锛岀敤浜庢崟楸銆傜寧鑹冲伐鍏凤紝姣斿寰俊榛橀粯銆傘傘
  • 缃戠粶鐢ㄨ楸煎弶濂虫槸浠涔堟剰鎬
    绛旓細缃戠粶鐢ㄨ楸煎弶濂虫槸鎸**娓斿コ鐨勬剰鎬**锛屾槸涓涓父鎴忚鑹诧紝璐熻矗鍦ㄦ父鎴忓唴鎹曢奔銆
  • 缃戠粶鐢ㄨ楸煎弶濂虫槸浠涔堟剰鎬
    绛旓細娓斿コ鐨勬剰鎬銆傜綉鏄撶浜斾汉鏍间簬鍙戝竷浜嗗叏鏂扮殑鐩戠鑰呰鑹诧紝浠e彿娓斿コ锛屼篃灏辨槸缃戠粶涓婃墍绉板懠鐨勯奔鍙夊コ銆
  • 楸煎弶鍦堟槸浠涔堟剰鎬
    绛旓細涓绉嶄粠鍘熷閮ㄨ惤灏卞紑濮嬩娇鐢ㄧ殑鐢熶骇宸ュ叿锛岀敤浜庢崟楸銆傚洜涓洪奔鍙夊彲浠ョ┛閫忛奔鐨勭毊鑲わ紝灏嗛奔鍥哄畾浣忥紝閬垮厤鍏堕冭窇锛屽浜庢瘮杈冨皬鐨勯奔锛屾瘮濡傞搏楸笺佽崏楸肩瓑锛屽湀鍙夋垨骞冲弶鏇撮傚悎銆傜幇鍦ㄥ鐢ㄦ潵鎸囩綉缁滀笂鐨勭寧鑹冲伐鍏枫
  • 楸煎弶鐨勮溅鏍囧織鍙浠涔?
    绛旓細2015-08-19 瑕佺敤閭f墍璋撶殑楸煎弶鍘诲弶楸,閭f槸涓嶆槸瑕佹湁寰堥珮鐨勬妧鏈墠鑳藉弶鍒,... 19 2013-05-10 楸煎弶?娓斿弶?鍝釜瀵? 3 2015-10-09 楸煎弶鏄暐鎰忔 1 2014-10-20 缃戠粶鐢ㄨ楸煎弶浠涔堟剰鎬? 1 2014-08-09 鍍忛奔鍙夌殑鏄粈涔堣溅鐗屽瓙 51 鏇村鍏充簬楸煎弶鐨勭煡璇 > 缃戝弸閮藉湪鎵: 鍍忛奔鍙変竴鏍风殑杞︽爣 楸煎弶鏍囧織鏄粈涔堣溅...
  • 浠ュ懠鍞や负璇濋浣滄枃
    绛旓細姹夊瓧鐨勮昏颈涓嶄粎浠呬綋鐜板湪杩欎竴鏂归潰,鐜板湪,铏氭嫙鐨勭綉缁滃彂杈句簡,浜轰滑涔熷ソ鍍忔洿鑱槑浜嗕技鐨,鍙戞槑浜嗗悇绉嶅悇鏍风殑鏂版眽瀛,鍦ㄧ綉缁滀笂,姹夊瓧琚媶瑙,涓棿鎻掍笂鍥剧敾,鑻辨枃,鎴愪负浜嗘柊鏂版枃瀛,缃戠粶涓婂嚭鐜颁簡鍚勭涓嶅儚姹夊瓧鐨勬眽瀛,杩樺嚭鐜浠涔堢綉缁滅敤璇,鈥滅伀鏄熸枃鈥,鎴戠湅杩欎簺閮芥槸姹夊瓧鐨勮昏颈銆 姹夊瓧鐨勮昏颈杩滀笉姝㈣繖浜,妗╂々浠朵欢閮戒笉鍫叆鐩,杩欏彲鏄垜浠...
  • 扩展阅读:鱼叉图片大全 ... 语c鱼叉是什么意思 ... 鱼叉多少钱一把 ... 鱼叉扁叉和圆叉哪个好 ... 鱼叉什么形状好用 ... 鱼叉人是什么意思 ... 网络上鱼叉是什么意思 ... 鱼叉是什么梗 ... 语擦什么意思网络用语 ...

    本站交流只代表网友个人观点,与本站立场无关
    欢迎反馈与建议,请联系电邮
    2024© 车视网