hacking
´Ù¸¥ °÷¿¡¼ ã±â
³×À̹ö»çÀü ´ÙÀ½»çÀü Cambridge M-W M-W Thesaurus OneLook Wordnet Google
hack hammer (¼®°ø¿ëÀÇ)¸Þ´Ùµë ¸ÁÄ¡
hack saw £Û£è¢¥©¡£ë£ó£à£ï:£Ý (±Ý¼ÓÀý´Ü¿ë)¶ìÅé
hack writer »ï¹® ¹®»ç, 2·ùÀÛ°¡
hacked £Û£è©¡£ë£ô£Ý °ïȤ½º·¯¿î, ´çȤ(°ï¶õ)ÇÑ, ¾È´Þ(Â¥Áõ)³
hacking cough ªÀº Çê±âħ, ¹çÀº±âħ
hacking pocket ºñ½ºµëÇÏ°Ô ºÙÀÎ µ¤°³ ´Þ¸° È£ÁÖ¸Ó´Ï(hacking jacket¿¡ ´Þ·Á ÀÖ´Â)
hacking ÄÄÇ»ÅÍ Á¶ÀÛÀ» Áñ±â±â, ¹«¾ùÀ̳ª ¼÷°íÇÏÁö ¾Ê°í ½ÇÇàÇϱâ
hacking coat(jacket) ½Â¸¶º¹, ½Â¸¶º¹°ú ºñ½ÁÇѿº¹
hack £Û£è©¡£ë£Ý »é¸»À» Ÿ´Ù, ¸»Å¸°í °¡´Ù, ³²ÀÇ ¹Ø¿¡¼ °íµÈ ÀÏÀ» ÇÏ´Ù
hack £Û£è©¡£ë£Ý ÀÚ¸£´Ù, Ãļ ÀÚ¸£´Ù, ³µµÁúÇÏ´Ù, Àß°Ô ½ä´Ù, ÆÄ¼ ÇìÄ¡´Ù(ºÎ¼ö´Ù), (©¸·ÇÑ)¸¶¸¥ ±âħÀ» ÇÏ´Ù
hack £Û£è©¡£ë£Ý °í¿ëµÈ, ½á¼ ³°°Ô ÇÑ
hack £Û£è©¡£ë£Ý »é¸», Àü¼¼¸¶Â÷, ÅýÃ(¿îÀü»ç), (º¸ÅëÀÇ)½Â¿ë¸», ´ÄÀº(¿©À©)¸», Áü¸», (¼¼ú°¡ÀÇ)Àϰŵå´Â»ç¶÷, 3·ùÀÛ°¡, (µ·À» À§ÇØ)¹«¾ùÀ̵ç ÇÏ´Â »ç¶÷
hack £Û£è©¡£ë£Ý º¥(Ä®)ÀÚ±¹, »õ±ä ÀÚ±¹, (¹ß·Î)°È¾îÂù(±ñ)âó, µµ³¢, ¸¶¸¥±âħ
hack (µµ³¢ µîÀ¸·Î) ¸¶±¸ ÆÐ¼ ÀÚ¸£´Ù; (ÄÄÇ»Å͸¦) Áñ±â¸é¼ Àå³Ä¡´Ù.
hack Åýà ¿îÀü»ç
hack writing ³¯¸² °ø»ç; ±Û ǰÆÈÀÌ
Grub Street hack: »ï·ù ÀÛ°¡
¡æ Grub Street´Â ¿µ±¹ ·±´øÀÇ Milton StreetÀÇ ¿¾ À̸§À̸ç ÀÌ °Å¸®¿¡ °¡³ÇÑ »ï·ù ÀÛ°¡µéÀÌ ¸¹ÀÌ »ì¾Ò¾ú´Ù. hackÀº »é¸»À̳ª ÀӴ븶Â÷ÀÇ ¶æÀ» Áö´Ñ hackney¿¡¼ À¯·¡.
In November, 1989, the television news announced that East Germans could now travel to the West.
People could get visas to cross the border between East and West.
Immediately people gathered at the Berlin Wall.
People started hacking at the wall with hammers and chisels.
The next day the police started demolishing the wall with bulldozers.
It was a momentous day for Germany and for the whole of Europe.
It was the end of a divided Germany.
It was also the beginning of the end of hostile relationships between East and West Europe.
1989³â 11¿ù µ¿µ¶»ç¶÷µéÀÌ ÀÌÁ¦ ¼µ¶À¸·Î ¿©ÇàÇÒ ¼ö ÀÖ´Ù°í ¹ßÇ¥Çß´Ù.
»ç¶÷µéÀº µ¿¼µ¶ÀÇ ±¹°æÀ» ³ÑÀ» ¼ö ºñÀÚ¸¦ ¾òÀ» ¼ö ÀÖ¾ú´Ù.
Áï½Ã »ç¶÷µéÀº º£¸¦¸° À庮¿¡ ¸ð¿©µé¾ú´Ù.
»ç¶÷µéÀº ¸ÁÄ¡¿Í Á¤À¸·Î º®À» ºÎ¼ö±â ½ÃÀÛÇß´Ù.
´ÙÀ½³¯ °æÂûÀº ºÒµµÀú·Î º®À» Çã¹°¾ú´Ù.
±× ³¯Àº µ¶ÀÏ »ç¶÷µé°ú Àü À¯·´ Àε鿡°Ô ÀÖ¾î¼ Áß´ëÇÑ ³¯À̾ú´Ù.
±× ³¯Àº ºÐ´ÜµÈ µ¶ÀÏÀÇ ¸¶Áö¸·À̾ú°í µ¿¼À¯·´°£ÀÇ Àû´ëÀû °ü°è¸¦ Á¾½Ä½ÃŰ´Â ½Ã¹ßÁ¡À̾ú´Ù.
[À§Å°] ´º½º ÀÎÅͳ»¼Å³Î ÀüÈ ÇØÅ· ½ºÄµµé News International phone hacking scandal
[À§Å°] ÇÙ ¾Øµå ½½·¡½Ã Hack and slash
[ÛÝ] ÇØÅ· hacking
[ÛÝ] ÇØÅ· hacking
[ÛÝ] Çнº Peter Hacks
hack ¸¶±¸ ÀÚ¸£±â,¼¼³õÀº ¸¶Â÷
The anti-censorship movement is very willing to fight for freedom of speech.
°Ë¿Á¦µµ ¹Ý´ë ¿îµ¿(anti-censorship movement)Àº ±â²¨ÀÌ ¾ð·ÐÀÇ ÀÚÀ¯¸¦ À§ÇØ ½Î¿ì·Á°í ÇÑ´Ù.
But if it leaves children vulnerable to seeing sexual content on the Net, is that right?
±×·¯³ª, ¸¸ÀÏ ¿ì¸®ÀÇ ¾ÆÀ̵éÀÌ ÀÎÅͳݻ󿡼 ¼ºÀûÀÎ À½¶õ¹°¿¡ ³ëÃâµÇµµ·Ï ÇÑ´Ù¸é, ÀÌ´Â ¿ÇÀº ÀÏÀΰ¡?
There are also hackers ready to break into networks and violate our privacy and security.
¶ÇÇÑ Àü»ê¸Á¿¡ ±â²¨ÀÌ Ä§ÅõÇØ ¿ì¸®ÀÇ »ç»ýȰÀ̳ª ¾ÈÀüÀ» ¹æÇØÇÏ´Â ÇØÄ¿µéµµ ÀÖ´Ù.
Are there no limits to freedom?
ÀÚÀ¯¿¡ ´ëÇÑ Á¦ÇÑÀº ¾ø´Ù´Â ¸»Àΰ¡?
Internet sites, hacking, and slander must be censored or controled, not only for children, but also for adults.
ÀÎÅÍ³Ý »çÀÌÆ®, ÇØÅ·, Áß»ó ¸ð·«°ú °°Àº °ÍµéÀº ¾ÆÀ̵é»Ó¸¸ÀÌ ¾Æ´Ï¶ó ¼ºÀεéÀ» À§Çؼµµ ¹Ýµå½Ã °Ë¿µÇ°í ÅëÁ¦µÇ¾î¾ß ÇÑ´Ù.
That was the same weekend that we were in Santa Barbara together.
¿ì¸° ±×¶§ ÇÔ²² »êŸ ¹Ù¹Ù¶ó¿¡ ÀÖ¾ú¾î
So someone from this office has hacked your login code. They're in your system.
ÀÌ »ç¹«½Ç¿¡ ÀÖ´Â ´©±º°¡°¡ ´ç½Å ·Î±×ÀÎ ¾ÏÈ£¸¦ ÇØÅ·Çß±º
- You were way off on this one, Jack.
- À̹ø ÀÏÀº Áö³ªÃƾî¿ä
- I'm sorry...
- ¹Ì¾ÈÇØ
How could you?
¾î¶»°Ô ±×·² ¼ö ÀÖÁÒ?
News of the World isn't the only tabloid
"News of the World"¸¸
that figured out how to hack a phone.
µµÃ»À» ÇÏ´Â °Ç ¾Æ´Ï´Ï±î
If you're fucking around with me--
Áö±Ý Àå³Ä¡´Â °Å¶ó¸é
I think by now you know I'm not.
Áö±ÝÂëÀÌ¸é ¾Æ´Ï¶õ°É ¾ËÅÙµ¥
You've got a big night ahead of you.
¿À´ÃÀº Á» ÀÏÀÌ ¹Ù»ÜÅ×´Ï
- We'll talk again. - When?
- ³ªÁß¿¡ ÅëÈÇÏÁö - ¾ðÁ¦?
When I want to.
³»°¡ Çϰí½ÍÀ»¶§
Anthony Weiner's Twitter account got hacked.
¾Ø¼´Ï À§³ÊÀÇ Æ®À§ÅͰ¡ ÇØÅ·µÇ¾ú¾î (¹Ì±¹ ¹ÎÁÖ´ç ÇÏ¿øÀÇ¿ø)
- Can I suggest a way to turn lemons into lemonade? - Sure.
- ·¹¸óÀ» ·¹¸ð³×À̵å·Î ¸¸µå´Â °Å ¾Ë·ÁÁà? - ¹°·Ð
First you squeeze the juice from the lemons. Then add sugar and water.
¸ÕÀú ·¹¸ó Á꽺¸¦ Â¥³»°í ¼³ÅÁÀ̶û ¹°À» ¼¯¾î
And you're not really into this joke, so I'm just going to say what I really wanted to say.
³» ³ó´ãÀ» ¸ø¾Ë¾Æµç´Â°Í °°À¸´Ï ³»°¡ ÇÒ ¸»À» ±×³É ÇÒ²²
The Casey Anthony story actually gives us a chance to show
¿ì¸®°¡ ÄÉÀ̽à ¾Ø¼Ò´Ï ±â»ç ´ë½Å¿¡
how important the debt ceiling story is if we lead
ºÎä»óÇÑ ¹®Á¦¸¦ ´Ù·ç°Ô µÈ´Ù¸é
with the debt ceiling instead of Casey Anthony.
ÀÌ°Ô ¾ó¸¶³ª Áß¿äÇÑ ÀÏÀÎÁö º¸¿©ÁÙ ¼ö ÀÖ´Ù±¸
Please, stop pointing at me when you are--
³ª´Â ±×¸¸ Á» °¡¸£Å°¶ó´Ï±î
Relax, J. Edgar. She's insulting me,
ÁøÁ¤ÇØ, Á¦ÀÌ ¿¡µå°Å, ±×³à°¡ ³¯ ¸ð¿åÇÑ´Ù±¸
she's insulting my family, she's insulting my congregation,
³» °¡Á·°ú ³» ±³È¸¸¦ ¸ð¿åÇϰí ÀÖ¾î
and she's insulting my faith.
³» ¹ÏÀ½µµ ¸ð¿åÇϰí ÀÖ°í
She's implying that Christians are imbeciles
±×³à´Â ±âµ¶±³ÀεéÀÌ ´Ù º´½ÅµéÀ̶ó
who will believe anything while reducing God
¹¹µçÁö ¹ÏÀ»°Å¶ó°í »ý°¢Çϰí
to a party hack who endorses political candidates.
½ÅÀ» ´ëÅë·É Èĺ¸³ª ÁöÁöÇÏ´Â ÇÏÂúÀº Á¸Àç·Î ¸¸µé¾ú¾î
Now, maybe I'm wrong. Maybe this is the first time since Moses
¹°·Ð, ³»°¡ Ʋ·ÈÀ»¼öµµ ÀÖ¾î ÇÏ´À´ÔÀÌ ÀÚ½ÅÀÇ ¾ÆµéÀÌ ¾Æ´Ñ
that God has given direct instructions to someone other than His son.
´Ù¸¥ »ç¶÷¿¡°Ô óÀ½À¸·Î Á÷Á¢ Áö½Ã¸¦ ÇßÀ» ¼öµµ ÀÖÁö
TMI is doing phone and computer hacking
TMI°¡ ÄÄÇ»ÅͶû Àüȸ¦ µµÃ»Çϴµ¥
and Reese Lansing knows?
¸®Áî°¡ ¾Ë°í ÀÖ´Ù°í?
Reese has been ordering it.
¸®½º°¡ ¸í·ÉÇß´ø ÀÏÀÌ¿ä
- I'm gonna give you-- - Hang on.
- ³»°¡ ´ç½Å¿¡°Ô - Àá±ñ¸¸
I need to digest that.
µéÀº À̾߱âºÎÅÍ ¼ÒȽÃ۰í
Reese Lansing is James Murdoch,
¸®Áî ·£½ÌÀ̶û ¸Óµ¶Àº ¶È°°Àº ³ðÀÌ¿ä
but Lansing's been ordering it.
°Å±â´Ù ¸®½º´Â Á÷Á¢ ¸í·É±îÁö Çß¾î
Digested yet?
¼ÒȵǾú¼Ò?
It's gonna take at least a few days, but that's part one.
¸îÀÏ °É¸®°ÚÁö, ±×°Ç 1ºÎ°í,
What's part two?
2ºÎ´Â ¹¹¾ß?
If we air his story, he'll give us evidence
¿ì¸®°¡ ±× ±â»ç¸¦ ³» º¸³»¸é
that TMI 's been doing the same thing as News of the World .
TMIµµ µµÃ»À» Çϰí ÀÖ´Ù´Â Áõ°Å¸¦ Áٰžß
- Hacking? - Everything.
- ÇØÅ·? - ÀüºÎ´Ù
- TMI 's been hacking? - Hancock says he's got the proof.
- TMI°¡ ÇØÅ·À»ÇØ? - ÇàÄÛÀÌ Áõ°Å°¡ ÀÖµ¥
Jesus Christ. How high does he say it goes?
¸¿¼Ò»ç, ¾î´À ¼±±îÁö ¿¬°áµÈ°Å¿¡¿ä?
Reese.
¸®Áî±îÁö
Here he is again today with The Today Show's Luke Russert.
¿À´Ã ·çÅ©ÀÇ 'Åõµ¥À̼î'¿¡ Ã⿬ÇÑ À§³Ê ÀÇ¿øÀÔ´Ï´Ù
- Roll 16. - That's not a picture of you?
- 16¹ø Ʋ¾î - º»ÀÎ »çÁøÀÌ ¾Æ´Ñ°¡¿ä?
You know, I can't say with certitude.
À§³Ê : È®½ÇÇÏ°Ô ¸»¾¸µå¸± ¼ö ¾ø½À´Ï´Ù
My system was hacked. Pictures can be manipulated.
Á¦ ½Ã½ºÅÛÀº ÇØÅ·µÇ¾ú°í, »çÁøÀº Á¶À۵ǾúÀ» ¼öµµ ÀÖ¾î¿ä
Pictures can be dropped in and inserted.
»çÁøÀº ¾ó¸¶µçÁö Á¶ÀÛµÉ ¼ö ÀÖÁÒ
Someone committed a prank on me.
´©±º°¡ Àú¿¡°Ô Àå³À» Ä¡´Â °Ì´Ï´Ù
Somehow got access to my Twitter account
´©±º°¡ Á¦ Æ®À§ÅÍ¿¡ Á¢¼ÓÇØ¼´Â
and right away put up a picture
Á¦ À̸§ À§³Ê(°íÃß)À» ¿ì½À°Ô ¸¸µå´Â
that made fun of the name Weiner.
»çÁøÀ» ¸¸µé¾î³½°ÅÁÒ
TMI--
TMI ¾ê±äµ¥
You said you had proof they were hacking.
ÇØÅ·ÇÑ Áõ°Å°¡ ÀÖ´Ù°í ¸»ÇßÁÒ?
Was that a lie?
°ÅÁþ¸»À̾ú³ª¿ä?
- Did you use that as bait so-- - I don't lie.
- ±×³É ¿ì¸®¸¦ ²ø¾îµéÀÌ·Á°í ¹Ì³¢·Î-- - ³ °ÅÁþ¸» ¾ÈÇÕ´Ï´Ù
I've paid for sex, yes. I tried to see my wife, yes.
µ·ÁÖ°í ¼º°ü°è Çß¾î¿ä, ¸Â¾Æ¿ä Àü ºÎÀÎ ¸¸³ª·Á°í ÇѰ͵µ ¸Â±¸¿ä
And that's why TMI is waiting for the second source.
±×·¡¼ TMI °¡ µÎ¹øÂ° Á¦º¸ÀÚ¸¦ ±â´Ù·È´ø°Å¾ß
- They can't reveal how they got the first. - There was no message!
- ù¹øÂ° Á¦º¸ÀÚ¸¦ °ø°³ÇÒ ¼ö ¾ø¾úÀ»Å×´Ï - ¸Þ½ÃÁö ¾ø¾ú´Ù´Ï±î¿ä!
Because your phone was hacked
ÀÚ³× Àüȱ⸦ ÇØÅ·ÇØ¼
and they deleted it.
¸Þ½ÃÁö¸¦ µè°í Áö¿ü°ÚÁö
- What are you doing? - I am reporting on Dorothy Cooper.
- ¹¹ÇÏ´Â °Å¾ß? - µµ·Î½Ã ÄíÆÛ¿¡ ´ëÇØ º¸µµÇؾßÁö
- You're still sick. - "What is illness to the body of our knight errant?"
- ´ç½Å ¾ÆÁ÷ ȯÀÚ¾ß - "±â»çÀÇ ÀÓ¹«¸¦ ¼öÇàÇϴµ¥ ¸ö ¾ÆÇÂ°Ô ´ë¼ö¾ß?"
What the hell are you talking about?
¹«½¼ ¸»¾¸À̼¼¿ä?
- You hacked my phone. - No, I didn't.
- ³» ÀüÈ ÇØÅ·ÇßÀÝ¾Æ - ¾Æ´Ï, ±×·±Àû ¾ø¾î
This will go a lot faster if you'd just say, "Yes, I did."
±×³É ¼ø¼øÈ÷ ÀÎÁ¤ÇÏ¸é ´õ °£´ÜÇßÀ»ÅÙµ¥
- I didn't. - We have a show in an hour.
- ³ ¾ÈÇß¾î - 1½Ã°£ ÀÖÀ¸¸é ¹æ¼Û½ÃÀÛÀ̾ß
- And you're fired, too. - Why is she saying you hacked--
- ±×¸®°í ´ç½Åµµ ÇØ°í¾ß - ¿Ö ¸ÆÅ²Áö°¡ ³ÊÇÑÅ× ÇØÄ»Ç߳İí--
- Desperation. - You hacked her phone
- ´Ù±ÞÇÏ´Ï ±×·¸°ÚÁÒ - ÀÚ³Ù ¸ÆÄËÁö Àüȸ¦ ÇØÅ·ÇØ¼
and you deleted the message from Will where he said he was high.
ÀªÀÌ º»ÀÎÀÌ ¾à¿¡ ÃëÇß´Ù°í ³²±ä ¸Þ½ÃÁö¸¦ »èÁ¦Çß¾î
- You got some proof? - That's how Nina Howard knew that Will was high.
- Áõ°ÅÀÖ¾î¿ä? - ±×·¡¼ ´Ï³ª ÇÏ¿öµå°¡ Àª¿¡ ´ëÇØ¼ ¾È°ÅÁö
- You got proof? - Solomon Hancock.
- Áõ°ÅÀÖ¾î¿ä? - ¼Ö·Î¸ó ÇÚÄÛÀº
He's an NSA analyst who was giving me information
NSA Á÷¿øÀε¥ ³»±¹¹Î ºÒ¹ý»çÂû¿¡ ´ëÇÑ Á¤º¸¸¦
about illegal domestic surveillance.
³ªÇÑÅ× Àü´ÞÇØÁáÁö
He jumped off the Queensboro Bridge four days ago.
4ÀÏÀü¿¡ Äý½ºº¸·Î ´Ù¸®¿¡¼ ¶Ù¾î³»·È¾î
But before he did, he had this envelope sent to me.
±× Ä£±¸°¡ Á×±âÀü¿¡ ³ªÇÑÅ× ÀÌ ¹®¼¸¦ º¸³ÂÁö
It's a record of Reese ordering hacking of phones
¸®½º Áö½ÃÇÏ¿¡ ¸ÆÄËÁö ¸ÆÇìÀÏ
belonging to Mackenzie McHale,
ÇÏ¿öµå ½ºÅÏ ÄÉÀ̽à ¾Ø½î´Ï º¯È£Àεé
Howard Stern, Casey Anthony's lawyers,
¼Ò¸»¸®¾Æ ÇØÀû¿¡°Ô Á×ÀÓ´çÇÑ ÀÎÁúÀÇ Ä£Á·µé Àüȸ¦
and relatives of hostages killed by Somali pirates.
ÇØÅ·ÇÑ ±â·ÏÀÌ ´ã°ÜÁ®ÀÖ¾î
It's all here.
À̾ȿ¡ ´Ù µé¾îÀÖÁö
Leona, didn't you ever ask how TMI
·¹¿À³ª, TMI°¡ ±×µ¿¾È º¸µµÇÑ
got some of the information it published?
Á¤º¸µéÀ» ¾îµð¼ ±¸Çß´ÂÁö ¹°¾îº»Àû ÀÖ¾î?
- I just assumed they made it up. - They do, most of the time,
- ±×³É Áö¾î³ÂÀ¸·Á´Ï ÇßÁö - ¸Â¾Æ, ´ëºÎºÐ ±×·¸Áö
but Nina didn't make this up.
±×·¯³ª ´Ï³ª´Â ÀÌ ³»¿ëÀ» Áö¾î³½°Ô ¾Æ´Ï¾ß
In this case, I thought that someone on the staff--
À̹ø °æ¿ì´Â Á÷¿øµéÁß¿¡ ´©±º°¡ Á¦º¸--
There's a transcript in this envelope--
ÀÌ ºÀÅõ¾È¿¡´Â ³ìÃë·ÏÀÌ µé¾îÀÖ¾î¿ä
Did you order hacking?
³×°¡ ÇØÅ· Áö½ÃÇß¾î?
Reese?
¸®½º?
I ordered that the magazine stay competitive.
TMI¿¡ °è¼Ó °æÀï·ÂÀ» À¯ÁöÇ϶ó°í Áö½ÃÇß¾î¿ä
Answer the question. Did you order--
Áú¹®¿¡ ´ë´äÀ» ÇØºÁ ³×°¡ Á¤¸» Áö½Ã--
Yes.
³×
All right? I did.
µÆ¾î¿ä? Á¦°¡ Çß¾î¿ä
HS8202911000
Hack-saw blades
¼èÅéÀÇ ³¯
ºÒ¹ý ħÀÔ hacking
Űº¸µå ÇØÅ· keyboard hacking
ÇØÅ· hacking
hack : ÇÙ
ÇØÅ© ¶óÀÌÅÍ(hack writer)
ÇØÅ©(hack)
¾ÈÀüÇÑ ÀüÀÚ±ÝÀ¶°Å·¡¸¦ À§ÇÑ OTPȰ¿ë ¸Þ¸ð¸®ÇØÅ· ´ëÀÀ¹æ¾È : OTP»ç¿ëÀÇ ¾ÈÁ¤¼º È®º¸¹æ¾ÈÀ» Áß½ÉÀ¸·Î
Memory hacking Countermeasures Utilized OTP for Secure E-banking Transaction
crack Å©·¢
(1) ÄÄÇ»ÅͽýºÅÛ¿¡ ħÅõÇÏ´Â °Í. ÀÌ ¿ë¾î´Â 80³â´ë Áß¹Ý ÇØÄ¿µéÀÌ º¸¾Èü°è¿¡
¸ô·¡ µé¾î°¡´Â °Í¸¸À» ¸ñÀûÀ¸·Î ÇÏ´Â »ç¶÷µé°ú ÀڽŵéÀ» ±¸º°Çϱâ À§ÇØ ¸¸µé¾î³½
¿ë¾îÀÌ´Ù. Å©·¡Ä¿´Â º¸¾Èü°è ħÅõ¸¸ ¸ñÀûÀ¸·Î ÇÏ´Â ¹Ý¸é ÇØÄ¿µéÀº ÄÄÇ»ÅͽýºÅÛ
¿¡ ´ëÇÑ Áö½ÄÀ» ¾ò°Å³ª Àç¹ÌÀÖ´Â Àå³À» Ä¡´Âµ¥ ÀڽŵéÀÇ Áö½ÄÀ» ÀÌ¿ëÇϴµ¥ ´õ
°ü½ÉÀÌ ÀÖ´Ù. ÇØÄ¿µéÀº ¾ÆÁ÷µµ ÀڽŵéÀÌ Å©·¡Ä¿¿Í ±¸º°µÈ´Ù°í ÁÖÀåÇÏÁö¸¸ ¾ð·Ð¿¡¼´Â
±¸º°¿¡ ½ÇÆÐÇß°í µû¶ó¼ ÇØÅ©¿Í Å©·¢Àº ÈçÈ÷ ±¸ºÐ¾øÀÌ ¾²ÀÌ´Â ¸»ÀÌ µÆ´Ù.
(2)º¹»ç¹æÁö³ª µî·Ï±â¼úÀ» ¹«·ÂȽÃÅ´À¸·Î½á ºÒ¹ýÀ¸·Î ¼ÒÇÁÆ®¿þ¾î¸¦ º¹Á¦Çϱâ.
(1) To break into a computer system. The term was coined in the mid-80s
by hackers who wanted to differentiate themselves from individuals whose
sole purpose is to sneak through security systems. Whereas crackers sole
aim is to break into secure systems, hackers are more interested in gaining
knowledge about computer systems and possibly using this knowledge for
playful pranks. Although hackers still argue that there's a big difference
between what they do and what crackers do, the mass media has failed to
understand the distinction, so the two terms -- hack and crack -- are
often used interchangeably.
(2) To copy commercial software illegally by breaking (cracking) the various
copy-protection and registration techniques being used.
phreaking ÇØÅ·°ú °¡±î¿î ¸»Àε¥, Àüȱ¹À» ¼ÓÀ̱â À§Çؼ ÄÄÇ»Åͳª
´Ù¸¥ ÀåÄ¡¸¦ ÀÌ¿ëÇÏ´Â °ÍÀ» ¸»ÇÑ´Ù. º¸Åë Àüȸ¦ °øÂ¥·Î ¾²°Å³ª ÀڱⰡ
Àüȸ¦ ¾²°í ´Ù¸¥ »ç¶÷¿¡°Ô û±¸µÇµµ·Ï ÇÏ´Â µ¥ ÀÌ¿ëµÈ´Ù.
Closely related to hacking, using a computer or other
device to trick a phone system. Typically, phreaking
is used to make free calls or to have calls charged to
a different account.
ÇØÅ· hacking
°Ë»ö°á°ú´Â 48 °ÇÀ̰í ÃÑ 275 ¶óÀÎÀÇ ÀÚ·á°¡ Ãâ·ÂµÇ¾ú½À´Ï´Ù. ¸ÇÀ§·Î
(È¸é ¾îµð¼³ª Alt+Z : ´Ü¾î ÀçÀÔ·Â.)
(³»¿ë Áß °Ë»öÇÏ°í ½ÍÀº ´Ü¾î°¡ ÀÖÀ¸¸é ±× ´Ü¾î¸¦ ´õºíŬ¸¯Çϼ¼¿ä.)