您希望如何使用 PONS.com?

已经订阅无广告版的PONS了吗?

广告版的PONS

像往常一样访问PONS.com并进行广告跟踪和广告投放

有关追踪的详细信息,请参阅数据保护信息和隐私设置

PONS Pur

无第三方广告

无广告跟踪

立即订阅

如果您已经拥有PONS.com免费账户,

We process your data to deliver content or advertisements and measure the delivery of such content or advertisements to extract insights about our website. We share this information with our partners on the basis of consent and legitimate interest. You may exercise your right to consent or object to a legitimate interest, based on a specific purpose below or at a partner level in the link under each purpose. These choices will be signaled to our vendors participating in the Transparency and Consent Framework.

Cookies, device or similar online identifiers (e.g. login-based identifiers, randomly assigned identifiers, network based identifiers) together with other information (e.g. browser type and information, language, screen size, supported technologies etc.) can be stored or read on your device to recognise it each time it connects to an app or to a website, for one or several of the purposes presented here.

Advertising and content can be personalised based on your profile. Your activity on this service can be used to build or improve a profile about you for personalised advertising and content. Advertising and content performance can be measured. Reports can be generated based on your activity and those of others. Your activity on this service can help develop and improve products and services.

verteidigenden
Lauscher
英语
英语
德语
德语
eaves·drop·per [ˈi:vzˈdrɒpəʳ, -drɑ:pɚ] 名词
eavesdropper
Lauscher(in) m (f) <-s, ->
德语
德语
英语
英语
eavesdropper
eavesdropper
PONS OpenDict

您想添加一个词、一个短语或一段译文吗?

請將您的新條目傳送給 PONS OpenDict。 提交的建議將由 PONS 編輯部審核,並根據情況納入結果。

添加词条
No example sentences available

No example sentences available

Try using a different entry.

单语范例(未经PONS编辑处理)
She began writing poetry at age five and claims to have become an expert eavesdropper by the age of twelve.
en.wikipedia.org
Due to the one-way property of cryptographically secure hash functions, it is infeasible for the eavesdropper to reverse the hash function and obtain an earlier piece of the hash chain.
en.wikipedia.org
This ensures reasonable protection from eavesdroppers and man-in-the-middle attacks, provided that adequate cipher suites are used and that the server certificate is verified and trusted.
en.wikipedia.org
The authentication relies on a pre-shared secret (e.g., password), which is protected (i.e., remains unrevealed) to an eavesdropper preventing an off-line dictionary attack.
en.wikipedia.org
Since most email is sent as plaintext, a message containing a password is readable without effort during transport by any eavesdropper.
en.wikipedia.org
互联网提供的例句(未经PONS编辑处理)
[...]
What can consumers do to protect themselves from eavesdroppers and wiretaps?
[...]
www.telekom.com
[...]
Was können Verbraucher tun, um sich vor Lauschern und Abhöraktionen zu schützen?
[...]
[...]
An eavesdropper only needs to collect the packets from a certain address as they come by in order to reconstruct the communication correlation and even the contents of the sent information.
[...]
anon.inf.tu-dresden.de
[...]
Ein Lauscher braucht nur alle vorbeikommenden Pakete einer bestimmten Adresse zu sammeln, und kann so die Kommunikationsbeziehungen und auch die Kommunikationsinhalte dieses Nutzers rekonstruieren.
[...]
[...]
The intelligent cats with the large eavesdroppers is evenly no mass-produced goods, but rare pieces, which by a small lover circle one honoured.
[...]
www.okh-und-siamkatzen.de
[...]
Die intelligenten Draufgänger mit den großen Lauschern sind eben keine Massenware, sondern kätzische Raritäten, denen von einem kleinen Liebhaberkreis gehuldigt wird.
[...]
[...]
That means that all data is transferred in plain text and is readable by any eavesdropper.
[...]
anon.inf.tu-dresden.de
[...]
Das bedeutet, dass alle übertragenen Daten auf dem Hin- und Rückweg im Klartext also für jeden Lauscher lesbar gesendet werden.
[...]
[...]
In this respect, an eavesdropper or a web server cannot usually uniquely identify a user.
anon.inf.tu-dresden.de
[...]
Insofern kann ein Lauscher und auch der jeweilige Webserver nur anhand der IP-Adresse den Nutzer normalerweise nicht eindeutig identifizieren.