. . . "Phoning home\uFF08\u80CC\u666F\u9023\u7DDA\u901A\u8A0A\uFF09\u901A\u5E38\u6307\u7684\u662F\u79D8\u5BC6\u901A\u8A0A\uFF0C\u8EDF\u9AD4\u6216\u786C\u9AD4\u7684\u88FD\u9020\u5546\uFF0C\u6703\u5728\u4ED6\u5011\u7684\u7522\u54C1\u52A0\u5165\u9023\u7DDA\u901A\u8A0A\u7684\u529F\u80FD\uFF0C\u7576\u4F7F\u7528\u8005\u8CFC\u8CB7\u4ED6\u5011\u7684\u7522\u54C1\u4E26\u5B89\u88DD\u5728\u500B\u4EBA\u96FB\u8166\u6216\u985E\u4F3C\u7684\u5BB6\u7528\u96FB\u5668\u4E0A\u6642\uFF0C\u9019\u4E9B\u7522\u54C1\u6703\u5728\u4F7F\u7528\u8005\u4E0D\u77E5\u60C5\u7684\u60C5\u5F62\u4E4B\u4E0B\uFF0C\u81EA\u52D5\u9023\u7DDA\u5230\u88FD\u9020\u5546\u7684\u4F3A\u670D\u5668\u3002\u53EF\u80FD\u662F\u70BA\u4E86\u505A\u5B58\u53D6\u63A7\u5236\u7684\u610F\u5716\uFF0C\u4F8B\u5982\uFF0C\u50B3\u9001\u8EDF\u9AD4\u6388\u6B0A\u91D1\u9470\u3002\u4E5F\u6709\u53EF\u80FD\u662F\u70BA\u4E86\u505A\u5E02\u5834\u884C\u92B7\u65B9\u9762\u7684\u76EE\u7684\uFF0C\u4F8B\u5982\u5C31\u662F\u5728\u64AD\u653E\u97F3\u6A02\u5149\u789F\u7684\u540C\u6642\uFF0C\u5C07\u97F3\u6A02\u5149\u789F\u7684\u96DC\u6E4A\u8CC7\u6599\u50B3\u9001\u7D66 Sony \u516C\u53F8\uFF0C\u6216\u8005\uFF0C\u7528\uFF08DVR\uFF09\u64AD\u653E\u5149\u789F\uFF0C\u9304\u653E\u5F71\u6A5F\u6703\u5728\u87A2\u5E55\u4E0A\u653E\u6620\u76F8\u95DC\u8CC7\u6599\u3002 \u56E0\u70BA\u9019\u500B\u79D8\u5BC6\u9023\u7DDA\u6703\u88AB\u52A0\u5BC6\uFF0C\u6240\u4EE5\u4F7F\u7528\u8005\u7121\u6CD5\u5F97\u77E5\u50B3\u9001\u7684\u8CC7\u6599\u70BA\u4F55\u3002 \u611F\u89BA\u4E0A\uFF0C\u4F7F\u7528\u8005\u6BCF\u6B21\u700F\u89BD\u7DB2\u9801\u6216\u4EFB\u4F55\u8207\u9060\u7AEF\u4F3A\u670D\u5668\u9023\u7D50\uFF0C\u90FD\u7B97\u662F\u300Cphoning home\u300D\uFF0C\u56E0\u70BA\u4F7F\u7528\u8005\u96FB\u8166\u7684IP \u4F4D\u5740\u6703\u88AB\u50B3\u9001\u5230\u7DB2\u9801\u4F3A\u670D\u5668\uFF08\u56E0\u70BA\u9700\u8981\u56DE\u61C9\u7D66\u4F3A\u670D\u5668\uFF0C\u6240\u4EE5\u9019\u5728\u7A0B\u5E8F\u4E0A\u662F\u7121\u6CD5\u907F\u514D\u7684\uFF09\u3002\u5D4C\u5728\u7DB2\u9801\u4E0A\u7684\u5716\u7247\u6703\u5EFA\u7ACB\u9060\u7AEF\u9023\u7D50\uFF0C\u751A\u81F3\u9023\u7D50\u5230\u591A\u500B\u4E0D\u540C\u7684\u7DB2\u7AD9\u4E0A\uFF0C\u9019\u7A2E\u8FFD\u8E64\u9023\u7D50\u662F\u5F88\u5E73\u5E38\u7684\u4F5C\u6CD5\uFF0C\u5C31\u50CF\u662F\u300CWeb beacon\u300D\u7684\u4F8B\u5B50\u4E00\u6A23\u3002\u67D0\u4E9B\u6A94\u6848\u985E\u578B\uFF0C\u6703\u56E0\u70BA\u7DB2\u8DEF\u9023\u7DDA\u88AB\u5EFA\u7ACB\uFF0C\u800C\u958B\u59CB\u505A\u985E\u4F3C\u7684\u8FFD\u8E64\u52D5\u4F5C\uFF08\u57FA\u672C\u4E0A\u53EA\u6703\u57F7\u884C\u533F\u540D\u7684\u7DB2\u8DEF\u9023\u7D50\uFF09\uFF0C\u4F8B\u5982\u53EF\u651C\u5F0F\u6587\u4EF6\u683C\u5F0F PDF \u7576\u4F7F\u7528\u8005\u88AB\u901A\u77E5 Adobe Reader \u9700\u8981\u66F4\u65B0\u6642\uFF0C\u5C31\u6703\u57F7\u884C\u9019\u985E\u7684\u52D5\u4F5C\u3002 \u300Cphone home\u300D\u4E00\u8A5E\u56E0 1982 \u5E74\u7684\u96FB\u5F71\u300CE.T.\u300D\u800C\u88AB\u666E\u53CA\u5316\uFF0C\u4E4B\u5F8C\uFF0C\u9019\u500B\u8A5E\u624D\u7528\u5728\u96FB\u8166\u7CFB\u7D71\u65B9\u9762\u3002"@zh . "\u80CC\u666F\u9023\u7DDA\u901A\u8A0A"@zh . . "In computing, phoning home is a term often used to refer to the behavior of security systems that report network location, username, or other such data to another computer. Phoning home may be useful for the proprietor in tracking a missing or stolen computer. This type of phoning home is frequently used on mobile computers at corporations. It typically involves a software agent which is difficult to detect or remove. However, there are malicious types of phoning homes such as surreptitious communication between applications or hardware installed at end-user sites and their manufacturers or developers. The traffic may be encrypted to make it difficult or impractical for the end-user to determine what data are being transmitted."@en . . . . "Las llamadas a casa son comunicaciones entre aplicaciones o hardware instalado en ambientes de usuario final y sus fabricantes o desarrolladores. Estas pueden tener prop\u00F3sitos de control de acceso, como por ejemplo transmitir una clave de autorizaci\u00F3n. Tambi\u00E9n pueden tener como objetivo fines comerciales, como el rootkit de Sony BMG, que transmit\u00EDa hacia Sony un hash del CD actualmente en reproducci\u00F3n; o un que informa de los h\u00E1bitos de visionado. Sistemas inform\u00E1ticos de gama alta como computadoras centrales han tenido desde hace muchos a\u00F1os funciones de \"llamadas a casa\", para alertar al fabricante de problemas de hardware con las computadoras centrales o con subsistemas de discos de almacenamiento.[cita requerida] El tr\u00E1fico puede viajar cifrado para dificultar o hacer poco viable para el usuario final averiguar qu\u00E9 datos est\u00E1n siendo transmitidos. De cierto modo, cada vez que un usuario visita una p\u00E1gina web o cualquier otro tipo de servidor remoto se est\u00E1 realizando una \"llamada a casa\", ya que la direcci\u00F3n IP de la computadora del usuario es enviada al servidor web. El uso de gr\u00E1ficos en una p\u00E1gina web establece conexiones remotas, posiblemente de distintos lugares, que pueden ser usadas para rastreado, como en el caso de los web bugs."@es . . "Llamada a casa"@es . . . "7927"^^ . . . . . . "Las llamadas a casa son comunicaciones entre aplicaciones o hardware instalado en ambientes de usuario final y sus fabricantes o desarrolladores. Estas pueden tener prop\u00F3sitos de control de acceso, como por ejemplo transmitir una clave de autorizaci\u00F3n. Tambi\u00E9n pueden tener como objetivo fines comerciales, como el rootkit de Sony BMG, que transmit\u00EDa hacia Sony un hash del CD actualmente en reproducci\u00F3n; o un que informa de los h\u00E1bitos de visionado. Sistemas inform\u00E1ticos de gama alta como computadoras centrales han tenido desde hace muchos a\u00F1os funciones de \"llamadas a casa\", para alertar al fabricante de problemas de hardware con las computadoras centrales o con subsistemas de discos de almacenamiento.[cita requerida]"@es . "3104727"^^ . . "Phoning home"@en . . "In computing, phoning home is a term often used to refer to the behavior of security systems that report network location, username, or other such data to another computer. Phoning home may be useful for the proprietor in tracking a missing or stolen computer. This type of phoning home is frequently used on mobile computers at corporations. It typically involves a software agent which is difficult to detect or remove. However, there are malicious types of phoning homes such as surreptitious communication between applications or hardware installed at end-user sites and their manufacturers or developers. The traffic may be encrypted to make it difficult or impractical for the end-user to determine what data are being transmitted. The Stuxnet attack on Iran's nuclear facilities was facilitated by phone home technology as reported by The New York Times."@en . . . . . . . . . . . . . "1120446061"^^ . . . "Unter dem Begriff Telemetrie versteht man in der Softwaretechnik das Sammeln von Rohdaten, die per automatischer Daten\u00FCbertragung durch einen im Hintergrund laufenden Dienst an den Entwickler \u00FCbertragen werden. Geschieht dies f\u00FCr den Benutzer nicht transparent, so spricht man auch von englisch Phoning Home oder Calling Home (bzw. Phone Home oder Call Home), dem , da sich Software ohne leicht zu erreichende Einflussnahme durch den Benutzer \u201Ezu Hause\u201C beim Hersteller meldet."@de . . . . . . . . . . . . "Telemetrie (Software)"@de . . . "Phoning home\uFF08\u80CC\u666F\u9023\u7DDA\u901A\u8A0A\uFF09\u901A\u5E38\u6307\u7684\u662F\u79D8\u5BC6\u901A\u8A0A\uFF0C\u8EDF\u9AD4\u6216\u786C\u9AD4\u7684\u88FD\u9020\u5546\uFF0C\u6703\u5728\u4ED6\u5011\u7684\u7522\u54C1\u52A0\u5165\u9023\u7DDA\u901A\u8A0A\u7684\u529F\u80FD\uFF0C\u7576\u4F7F\u7528\u8005\u8CFC\u8CB7\u4ED6\u5011\u7684\u7522\u54C1\u4E26\u5B89\u88DD\u5728\u500B\u4EBA\u96FB\u8166\u6216\u985E\u4F3C\u7684\u5BB6\u7528\u96FB\u5668\u4E0A\u6642\uFF0C\u9019\u4E9B\u7522\u54C1\u6703\u5728\u4F7F\u7528\u8005\u4E0D\u77E5\u60C5\u7684\u60C5\u5F62\u4E4B\u4E0B\uFF0C\u81EA\u52D5\u9023\u7DDA\u5230\u88FD\u9020\u5546\u7684\u4F3A\u670D\u5668\u3002\u53EF\u80FD\u662F\u70BA\u4E86\u505A\u5B58\u53D6\u63A7\u5236\u7684\u610F\u5716\uFF0C\u4F8B\u5982\uFF0C\u50B3\u9001\u8EDF\u9AD4\u6388\u6B0A\u91D1\u9470\u3002\u4E5F\u6709\u53EF\u80FD\u662F\u70BA\u4E86\u505A\u5E02\u5834\u884C\u92B7\u65B9\u9762\u7684\u76EE\u7684\uFF0C\u4F8B\u5982\u5C31\u662F\u5728\u64AD\u653E\u97F3\u6A02\u5149\u789F\u7684\u540C\u6642\uFF0C\u5C07\u97F3\u6A02\u5149\u789F\u7684\u96DC\u6E4A\u8CC7\u6599\u50B3\u9001\u7D66 Sony \u516C\u53F8\uFF0C\u6216\u8005\uFF0C\u7528\uFF08DVR\uFF09\u64AD\u653E\u5149\u789F\uFF0C\u9304\u653E\u5F71\u6A5F\u6703\u5728\u87A2\u5E55\u4E0A\u653E\u6620\u76F8\u95DC\u8CC7\u6599\u3002 \u56E0\u70BA\u9019\u500B\u79D8\u5BC6\u9023\u7DDA\u6703\u88AB\u52A0\u5BC6\uFF0C\u6240\u4EE5\u4F7F\u7528\u8005\u7121\u6CD5\u5F97\u77E5\u50B3\u9001\u7684\u8CC7\u6599\u70BA\u4F55\u3002 \u611F\u89BA\u4E0A\uFF0C\u4F7F\u7528\u8005\u6BCF\u6B21\u700F\u89BD\u7DB2\u9801\u6216\u4EFB\u4F55\u8207\u9060\u7AEF\u4F3A\u670D\u5668\u9023\u7D50\uFF0C\u90FD\u7B97\u662F\u300Cphoning home\u300D\uFF0C\u56E0\u70BA\u4F7F\u7528\u8005\u96FB\u8166\u7684IP \u4F4D\u5740\u6703\u88AB\u50B3\u9001\u5230\u7DB2\u9801\u4F3A\u670D\u5668\uFF08\u56E0\u70BA\u9700\u8981\u56DE\u61C9\u7D66\u4F3A\u670D\u5668\uFF0C\u6240\u4EE5\u9019\u5728\u7A0B\u5E8F\u4E0A\u662F\u7121\u6CD5\u907F\u514D\u7684\uFF09\u3002\u5D4C\u5728\u7DB2\u9801\u4E0A\u7684\u5716\u7247\u6703\u5EFA\u7ACB\u9060\u7AEF\u9023\u7D50\uFF0C\u751A\u81F3\u9023\u7D50\u5230\u591A\u500B\u4E0D\u540C\u7684\u7DB2\u7AD9\u4E0A\uFF0C\u9019\u7A2E\u8FFD\u8E64\u9023\u7D50\u662F\u5F88\u5E73\u5E38\u7684\u4F5C\u6CD5\uFF0C\u5C31\u50CF\u662F\u300CWeb beacon\u300D\u7684\u4F8B\u5B50\u4E00\u6A23\u3002\u67D0\u4E9B\u6A94\u6848\u985E\u578B\uFF0C\u6703\u56E0\u70BA\u7DB2\u8DEF\u9023\u7DDA\u88AB\u5EFA\u7ACB\uFF0C\u800C\u958B\u59CB\u505A\u985E\u4F3C\u7684\u8FFD\u8E64\u52D5\u4F5C\uFF08\u57FA\u672C\u4E0A\u53EA\u6703\u57F7\u884C\u533F\u540D\u7684\u7DB2\u8DEF\u9023\u7D50\uFF09\uFF0C\u4F8B\u5982\u53EF\u651C\u5F0F\u6587\u4EF6\u683C\u5F0F PDF \u7576\u4F7F\u7528\u8005\u88AB\u901A\u77E5 Adobe Reader \u9700\u8981\u66F4\u65B0\u6642\uFF0C\u5C31\u6703\u57F7\u884C\u9019\u985E\u7684\u52D5\u4F5C\u3002 \u300Cphone home\u300D\u4E00\u8A5E\u56E0 1982 \u5E74\u7684\u96FB\u5F71\u300CE.T.\u300D\u800C\u88AB\u666E\u53CA\u5316\uFF0C\u4E4B\u5F8C\uFF0C\u9019\u500B\u8A5E\u624D\u7528\u5728\u96FB\u8166\u7CFB\u7D71\u65B9\u9762\u3002"@zh . . "Unter dem Begriff Telemetrie versteht man in der Softwaretechnik das Sammeln von Rohdaten, die per automatischer Daten\u00FCbertragung durch einen im Hintergrund laufenden Dienst an den Entwickler \u00FCbertragen werden. Geschieht dies f\u00FCr den Benutzer nicht transparent, so spricht man auch von englisch Phoning Home oder Calling Home (bzw. Phone Home oder Call Home), dem , da sich Software ohne leicht zu erreichende Einflussnahme durch den Benutzer \u201Ezu Hause\u201C beim Hersteller meldet."@de . .