Aktuális sajtó tartalmak és illusztrációs fotók

[code cracking] képek

875 találat
  • / 22
  • kép/oldal:
RF
Cybercriminal Infiltrating Smartphone With Malicious Virus Code-stock-foto
RF
Intruder Injecting Malware Into Smartphone Cybersecurity Threat And Digital Breach Concept-stock-foto
RF
Man uses virtual reality headset for system corruption and password cracking, cyber intelligence define this tech driven theft. Intrusion and threat alerts reveal dangerous hacking. Camera B.-stock-foto
RM
BLETCHLEY PARK, BUCKINGHAMSHIRE, ENGLAND, UK - A Colossus Mark 2 code-breaking computer being operated by the Wrens Dorothy Du Boisson (left) and Elsie Booker (right) during the summer of 1943 at Bletchley Park in Buckinghamshire, England, UK. Aside from famously cracking the German Enigma codes, machines like Colossus developed by Alan Turing paved the way for the modern computers of today - Photo: Geopix-stock-foto
RM
BLETCHLEY PARK British Government Code and Cypher School. Undated office scene during WW2.-stock-foto
RF
Cybersecurity hacking threat concept with hacker decrypting password on laptop. Digital data breach, online security risk, cyber attack and computer s-stock-foto
RM
Boston, Massachusetts, USA. 3rd June, 2025. Another major highlight is a restored German Enigma I cipher machine (c. 1943), housed in its original wartime case. Discovered in a Belgian shed and restored to partial working order, this iconic encryption device featuring matching serial-numbered rotors represents one of the war's most pivotal intelligence breakthroughs. Cracking the Enigma code at Bletchley Park is credited with shortening the conflict by up to two years. (Credit Image: © RR Auction/ZUMA Press Wire) EDITORIAL USAGE ONLY! Not for Commercial USAGE!-stock-foto
RM
Boston, Massachusetts, USA. 3rd June, 2025. Another major highlight is a restored German Enigma I cipher machine (c. 1943), housed in its original wartime case. Discovered in a Belgian shed and restored to partial working order, this iconic encryption device featuring matching serial-numbered rotors represents one of the war's most pivotal intelligence breakthroughs. Cracking the Enigma code at Bletchley Park is credited with shortening the conflict by up to two years. (Credit Image: © RR Auction/ZUMA Press Wire) EDITORIAL USAGE ONLY! Not for Commercial USAGE!-stock-foto
RM
Boston, Massachusetts, USA. 3rd June, 2025. Another major highlight is a restored German Enigma I cipher machine (c. 1943), housed in its original wartime case. Discovered in a Belgian shed and restored to partial working order, this iconic encryption device featuring matching serial-numbered rotors represents one of the war's most pivotal intelligence breakthroughs. Cracking the Enigma code at Bletchley Park is credited with shortening the conflict by up to two years. (Credit Image: © RR Auction/ZUMA Press Wire) EDITORIAL USAGE ONLY! Not for Commercial USAGE!-stock-foto
RF
A serious, intense teenager types on a keyboard, programming or hacking into a system with focus and determination.-stock-foto
RF
Cyber hacker in hood behind laptop puts hand forward hiding his face in dark room, concept of digital information protection, Computer hacking, stop c-stock-foto
RF
Vector illustration Hi Technology style line digital glow abstract  background text digital technology vector illustration-stock-foto
RF
Vector illustration Hi Technology style line digital glow abstract  background text digital technology vector illustration-stock-foto
RF
Vector illustration Hi Technology style line digital glow abstract  background text digital technology vector illustration-stock-foto
RF
Vector illustration Hi Technology style line digital glow abstract  background text digital technology vector illustration-stock-foto
RM
EDITORIAL USE ONLY 'The Toblerone Vault' in a faux-jewellery store in Mayfair where visitors get the chance to try the brand-new diamond shaped 'Truffles' by cracking a code to get into a secure vault. Picture date: Thursday September 28th, 2023.-stock-foto
RM
EDITORIAL USE ONLY 'The Toblerone Vault' in a faux-jewellery store in Mayfair where visitors get the chance to try the brand-new diamond shaped 'Truffles' by cracking a code to get into a secure vault. Picture date: Thursday September 28th, 2023.-stock-foto
RM
EDITORIAL USE ONLY (left-right) Will Edden, Michael Rawson and Hannah Sharratt at 'The Toblerone Vault' in a faux-jewellery store in Mayfair where visitors get the chance to try the brand-new diamond shaped 'Truffles' by cracking a code to get into a secure vault. Picture date: Thursday September 28th, 2023.-stock-foto
RM
EDITORIAL USE ONLY 'The Toblerone Vault' in a faux-jewellery store in Mayfair where visitors get the chance to try the brand-new diamond shaped 'Truffles' by cracking a code to get into a secure vault. Picture date: Thursday September 28th, 2023.-stock-foto
RM
EDITORIAL USE ONLY 'The Toblerone Vault' in a faux-jewellery store in Mayfair where visitors get the chance to try the brand-new diamond shaped 'Truffles' by cracking a code to get into a secure vault. Picture date: Thursday September 28th, 2023.-stock-foto
RM
EDITORIAL USE ONLY 'The Toblerone Vault' in a faux-jewellery store in Mayfair where visitors get the chance to try the brand-new diamond shaped 'Truffles' by cracking a code to get into a secure vault. Picture date: Thursday September 28th, 2023.-stock-foto
RF
Rotors from a reproduction 'Bombe' machine used for cracking German Enigma codes in World War 2.-stock-foto
RM
Caricature art of  English mathematician & computer scientist, Alan Turing background of Enigma machine parts, refs to Apple computing and Turing Test-stock-foto
RF
Indicator dials from the famous 'Bombe' machine at Bletchley Park used for deciphering German encrypted 'Enigma' messages.-stock-foto
RF
Rearview shot of a male hacker cracking a AI code in a data center of AI.-stock-foto
RF
Confused hacker pointing at computer screen and asking criminal about password cracking technique. Diverse young men in hoods planning phishing attack while breaking law together-stock-foto
RF
Two concentrated hackers collaborating to crack complex password and break into network system. Young diverse men in hoods working on computer together and coding virus malware-stock-foto
RF
African american hacker breaching system security and stealing sensitive information. Young criminal in hood breaking law while cracking password and using spyware close up-stock-foto
RF
Hacker developing internet virus for data breaching and hacking server in dark warehouse. Man in hood running malware code for password cracking on computer screen in room at night-stock-foto
RF
Asian hacker doing phishing attack while using illegal ransomware. Young internet criminal in hood installing malware for password cracking on victim computer in dark abandoned warehouse-stock-foto
RF
Hackers team breaking security software and installing spyware on victim computer. Internet thieves cracking database password, breaching data and coding ransomware in abandoned warehouse-stock-foto
RF
Two hackers running malicious software on computer screen to breach secure data. Criminals group wearing hoodies while breaking law and working together in abandoned warehouse-stock-foto
RF
Hackers talking in abandoned warehouse, discussing malicious software development. African american and asian cyber criminals planning data breach and server password cracking cyberattack-stock-foto
RF
Unhappy hackers failing to crack password while breaking into computer network. Two disappointed criminals getting access denied while hacking website and attempting to pass security system-stock-foto
RF
Access granted message on hackers computer screen after breaking into online server. Two criminals happy successful network system password hacking notification on monitor-stock-foto
RF
Upset hackers getting access denied message while hacking network system. Unhappy criminals breaking online server unsuccessfully on computer in abandoned warehouse at night-stock-foto
RF
Malware running code for database hacking on screen in abandoned warehouse. Malicious software programming and password cracking on vertical display in dark room with graffiti-stock-foto
RF
Two hackers collaborating while breaching data and coding malicious software on computer. Diverse criminals working together while programming ransomware in abandoned warehouse-stock-foto
RF
Smiling asian hacker in hood breaking into server and hacking database. Young man with smirk coding malicious ransomware and doing phishing criminal activity in hideout close up-stock-foto
RF
Hackers pointing at map location at computer screen while spying online. Two diverse young men in hoods using illegal spyware while doing criminal activity together at night-stock-foto