Advertisement
 Translation for 'to hack sb sth' from English to Spanish
machetear a-algn/algoto hack sb./sth. [chop with axe]
Partial Matches
TIC
hackear algo
to hack sth.
captar la atención y el interés de algn/algo con algn/algo [locución] to catch the attention and interest of sb./sth. with sb./sth. [idiom]
confrontar a-algn/algo con algn/algoto confront sb./sth. with sb./sth.
unverified relacionar algn/algo con algn/algoto associate sb./sth. with sb./sth.
recordar a algn a algn/algo [por asociación, parecido]to remind sb. of sb./sth.
sumir a-algn/algo en algo [también fig.]to plunge sb./sth. into sth. [also fig.]
dejar que algn/algo haga algo [esperar]to wait until sb./sth. does sth.
rezar para que algo/algn haga algoto pray that sb./sth. does sth.
apartar a-algn/algo de algoto urge sb./sth. away from sth.
escritorzuelo {m} [col.] [pey.]hack [coll.] [pej.] [inferior male journalist]
escritorzuela {f} [col.] [pey.]hack [coll.] [pej.] [inferior female journalist]
exceptuar a-algn/algo de algoto except sb./sth. from sth.
salpicar a-algn/algo de algoto splash sth. on sb./sth.
colar a-algn/algo en algoto sneak sb./sth. into sth.
tildar a-algn/algo de algo [calificar como]to brand sb./sth. as sth.
calificar a-algn/algo de algoto describe sb./sth. as sth.
enceguecer a-algn/algoto blind sb./sth.
frustrar a-algn/algoto frustrate sb./sth.
embelesar a-algn/algoto enchant sb./sth.
identificar a-algn/algoto identify sb./sth.
21 translations
To translate another word just start typing!

Usage Examples English
  • Some companies set up traps or "hot spots" to attract people and are then able to know when someone is trying to hack into that area.
  • In mid-September 2018 the Swiss press reported that two men allegedly working for the GRU had been arrested in The Hague, the Netherlands in the spring that year, after the Salisbury poisoning incident, for planning to hack the computer systems of the Spiez Laboratory, a Swiss institute analyzing chemical weapon attacks for the Organisation for the Prohibition of Chemical Weapons (OPCW).
  • Radcliffe was able to hack the wireless interface used to control the pump remotely.
  • In late January 2014, Yahoo announced on its company blog that it had detected a "coordinated effort" to hack into possibly millions of Yahoo Mail accounts.
  • On the release of the expansion "Afterbirth" for "The Binding of Isaac: Rebirth" in October 2015, players discover clues hinting towards an ARG related to the game, based on the community's previous attempts to hack the game to discover any secret characters.

  • Having finished its investigation, Gemalto claimed that it has “reasonable grounds” to believe that the NSA and GCHQ carried out an operation to hack its network in 2010 and 2011, but says the number of possibly stolen keys would not have been massive.
  • It is possible to hack past a phone locked by a network operator.
  • The French began to hack at the abatis and a Hessian sentry came out and asked who was there.
  • The process of attempting to hack into a person's webcam and activate it without the webcam owner's permission has been called camfecting, a portmanteau of "cam" and "infecting".
  • Similar access by the intelligence agencies to many other mobile devices exists, using similar techniques to hack into them.

  • With the control of a Mind, fields can be manipulated over vast distances. In "Use of Weapons", a Culture warship uses its electromagnetic effectors to hack into a computer light years away.
  • When the property was threatened by fire, he directed the firefighting effort, and at one point climbed a tree close to the house to hack away burning branches.
  • It may be possible to hack crewed automated spacecraft to cause them to break up or to shut down a critical system from ground control to do so.
  • The command Nmap is widely used in the video game "Hacknet", allowing to probe the network ports of a target system to hack it.
  • The player takes charge of a freelance computer hacker in a fictional futuristic 2010, and must break into foreign computers, complete contracts and purchase new hardware to hack into increasingly harder computer systems.

  • Apple cited "Bernstein v. US" in its refusal to hack the San Bernardino shooter's iPhone, saying that they could not be compelled to "speak" (write code).
Advertisement
© dict.cc Spanish-English dictionary 2024
Contains translations by TU Chemnitz and Mr Honey's Business Dictionary (German-English only).
Links to this dictionary or to individual translations are very welcome!