wiretapping
英 [ˈwaɪətæpɪŋ]
美 [ˈwaɪərtæpɪŋ]
n. (用秘密连线方法)窃听电话
v. (搭线)窃听; 搭线窃听;窃听或偷录
wiretap的现在分词
COCA.34427
牛津词典
noun
- (用秘密连线方法)窃听电话
the act of secretly listening to other people's telephone conversations by attaching a device to the telephone line
柯林斯词典
- VERB 搭线窃听(电话)
If someonewiretapsyour telephone, they attach a special device to the line so that they can secretly listen to your conversations.- The coach said his club had wiretapped the hotel room of a player during a road trip.
教练说他的俱乐部曾经窃听了一名开车旅行的运动员所住宾馆房间的电话。 - Wiretapis also a noun.
- ...tapes of telephone conversations that can have been obtained only by illegal wiretaps.
只有通过非法搭线窃听才能获得的电话通话录音带
- The coach said his club had wiretapped the hotel room of a player during a road trip.
in BRIT, use 英国英语用 tap
双语例句
- Other advanced technical equipment, such as the advanced wiretapping, the radar that can penetrates the leaves and so on will also be installed on the UAV.
其他一些更先进的技术装备,比如高级窃听装置、穿透树叶的雷达等也将被安装到无人机上。 - The WEP protocol is used as a means of data encryption for wireless transmission between two devices, in order to prevent the illegal user wiretapping or intruding wireless networks.
WEP协议是对在两台设备间无线传输的数据进行加密的方式,用以防止非法用户窃听或侵入无线网络。 - He said wiretapping was a crime and those responsible must be held accountable.
他表示,窃听属于犯罪行为,那些对此要负责的人必须被追究责任。 - By security analysis, the protocol can prevent from usual attacks such as wiretapping, playback, counterfeit and so on.
经安全分析,协议能防止窃听攻击、重放攻击和假冒攻击等常见的各种攻击行为可能造成的安全威胁。 - However, as the foregone research shows, static-password authentication can't withstand attack of direct wiretapping, replaying and password guessing. Its inherent security drawbacks are suitable for the application of open network environment.
但已有的研究表明静态口令身份鉴别方法不能抵抗直接的搭线窃听攻击、重放攻击和口令猜测攻击,其固有的安全缺陷不适用于开放网络环境中的应用。 - Soon after taking office, Mitterrand formed an anti-terrorist squad that spent much of its time wiretapping political opponents and journalists who might identify them.
密特朗执政后不久,就建立了反恐小组,小组的大部分时间用于窃听政敌和可能发现他们的记者。 - A Precaution of Wiretapping the Data IP Packets in a LAN
局域网上IP数据包的窃听与防范 - The result proves that there are limitations in the HTTP Digest authentication protocol, which will cause the camouflage attack and wiretapping attack.
通过严格地逻辑推导,证明了HTTPDigest认证协议存在的不足,以及由此不足产生的伪装和窃听攻击方式。 - Suggestion of Legislative Rules on Wiretapping in China Private Wiretapping of the Criminal Litigation
我国通讯监听诉讼规则之建构刑事诉讼中私人监听问题研究 - President George W. Bush briefly shut down the warrantless wiretapping program, but then parts of it were legalized by a new law passed in Congress.
美国前总统布什(GeorgeW.Bush)曾一度关闭未获得授权的窃听项目,但后来国会通过一部新法,让这个项目的一些部分合法化。