词语大全 trojan horses中文翻譯
Posted 病毒
篇首语:饭可以一日不吃,觉可以一日不睡,书不可以一日不读本文由小常识网(cha138.com)小编为大家整理,主要介绍了词语大全 trojan horses中文翻譯相关的知识,希望对你有一定的参考价值。
词语大全 trojan horses中文翻譯
There is no evidence of a trojan horse on your system
在您的系統中沒有發現木馬
Reboot your machine and delete the trojan horse
重新啟動你的電腦,刪除木馬文件。
The techniques are the same as used by trojan horses
其采用的技術與木馬技術一樣。
Identify the trojan horse file on your hard disk
確定你磁盤中的木馬文件。
Analysis and design of embedded trojan horse virus
嵌入式木馬分析及設計
Inter banking frauds involving trojan horse programmes
涉及特洛伊木馬程式的網上銀行騙案
The detection and deletion of the dll trojan horse
木馬的發現與清除
Trojan horse attack mechanism analysis and preventive measures
基于木馬攻擊機制的防范措施剖析
Now strong right , 81 trojan horse
現在加強右路81特洛伊木馬戰術
Research on trojan horse detection based - on heuristic analysis
基于啟發式分析的木馬檢測技術研究
Strong right , 81 trojan horse
加強右路, 81特洛伊木馬戰術
They were defeated because of the trojan horses in their country
他們被打敗了,因為他們的國家出現了奸細。
The term backdoor describes a specific group of trojan horses
任期后門描述的一個特定群體,特洛伊木馬程式。
What is a trojan horse
特洛依木馬病毒是什么?
Press release : inter banking frauds involving trojan horse programmes
新聞稿:涉及特洛伊木馬程式的網上銀行騙案
They are defeated only because of the trojan horse in their country
他們戰敗的原因只是因為他們國內有暗藏的敵人。
( 2 ) do an in - depth research on work attack technology based trojan horse
( 2 )深入研究了基于木馬的網絡攻擊技術。
A feasible defending method of a new trojan horse based on service provider interface flaws
技術漏洞的新型木馬的防范方法
A great trojan horse to use is back orifice 2000 from cult of the dead cow see
討論)是一個好的選擇,但是卻很昂貴且不易使用。
Ghost in the machine : a trojan horse flashes insulting messages on the screen
:一種特洛伊木馬,它會在屏幕上閃爍一些侮辱性消息。
According to the techniques the trojan horses can be called as neither good nor evil
從技術的本身來說,木馬程序并無所謂好壞正邪。
If this is a worm or trojan horse the length represents the size of the file
如果這是一個蠕蟲或特洛依木馬則長度表示為該文件的長度。
Nvs is based on trojan horse architecture and facing to work attack
Nvs采用木馬體系結構的客戶服務器模式,包含執行端和控制端兩部分。
Many puter viruses , worms , and trojan horses are designed to exploit weak passwords
很多計算機病毒、蠕蟲和特洛伊木馬的設計都利用了弱口令。
Based on above , it put forwards a scan model applying trojan horse architecture
在此基礎之上,本文提出了一個基于木馬體系結構的漏洞掃描模型。
A trojan horse that fools the user into bepeving an ir receive process has been activated
:一種特洛伊木馬,它可以欺騙用戶,使之相信紅外接收過程已經被激活。
Another trojan horse that toggles the backpght on and off to drain the battery . leave me alone
:另一種特洛伊木馬,它可以控制背景燈的開和關,從而耗盡電池的能源。
Trojan virus , pke a trojan horse , is a program that appears safe - - but smuggles in a worm or virus
特洛伊病毒,就跟特洛伊木馬一樣,看上去安全? ?其實暗藏“殺機” 。
There are three most monly encountered mapcious programs - puter viruses , trojan horses and logic bombs
最常見的三種惡意程式為電腦病毒、特洛伊木馬和邏輯炸彈。
Then a trojan horse utipty program is designed and implemented for the business of the nsa ( national security affairs )
在此基礎上,結合工作實際,編寫了一個實際的木馬程序。
Post or transmit any information or sofare which contains a virus , trojan horse , worm or other harmful ponent
張貼或傳送的任何資料或軟件,含有病毒特洛伊木馬電腦蟲或其他有害元件
These plug - ins are often downloaded from unknown sources and some may contain hacking program such as trojan horse
這些插件程式通常是從不明的來源下載,部分或載有黑客程式,例如特洛伊木馬程式。
Post or transmit any information or sofare which contains any virus , trojan horse , worm or other harmful ponent
發帖或者傳輸含任何病毒、欺騙程序、蠕蟲或者其他有害成分的任何資訊或者軟件;
Post or transmit any information or sofare which contains any virus , trojan horse , worm or other harmful ponent
發帖或者傳輸含任何病毒、欺騙程序、蠕蟲或者其他有害成分的任何資訊或者軟件;
It provides strong protection against all kinds of viruses , worms , backdoors , trojan horses and other kinds of mapcious code
它能夠提供超強的防護對抗各種病毒,網蟲,后門病毒,木馬病毒和其他種類的惡意代碼
But instead of riding the ps3 as a trojan horse , blu - ray has instead hobbled it by increasing its price and delaying its introduction
但是相對于把ps3看作是特洛伊木馬,藍光則因提高價格和延遲上市阻礙了索尼公司。
One form of trojan horse programme is able to capture keystrokes typed by the user and then transmit them covertly to the fraudster
其中一種特洛伊木馬程式能記錄用戶在個人電腦所按的鍵,并將取得的資料秘密地傳送給騙徒。
Trojan horse is a new kind puter virus , which makes much damage to puter information resources in a local work
摘要特洛伊木馬作為一種新型的計算機網絡入侵程序,比其他病毒對網絡環境中計算機信息資源的危害都要大。
Trojan horse is a kind of tool programs , which has the characteristics of concealment and unauthorization , based on the puter remote - control technique
特洛伊木馬是基于計算機遠程控制技術的一種工具程序,具有隱蔽性和非授權性的特點。
They survive and propagate by tricking the cells of a host organism into bringing the virus inside , rather pke a biological trojan horse
它們就像生物學中的特洛伊木馬,可以蒙騙宿主的細胞,使細胞把病毒納入細胞,然后病毒在細胞中生存繁殖。
Nov . 20 , 2006 issue - trojan horses , worms and other nasty viruses have gone wireless and could be targeting your cell phone
據11月20日一期的新聞周刊報道,特洛伊木馬蠕蟲和其它令人討厭的病毒已經侵入了無線領域,也可能正在攻擊你的手機。
It s important to know that a trojan horse is malware that will masquerade as vapd system code , but when activated can harm your system
了解“特洛伊木馬”程序是一種偽裝成有效系統代碼的惡意軟件,但被激活時可能損害您的系統,這一點很重要。
You can remove trojan horses , viruses , and spyware from your pc and prevent unwanted sofare from being installed without your knowledge
獨創的實時監控功能可以實時監控在您的電腦上進行的每一個操作,并且讓系統資源占用降低到最小. loysoft inc
( 3 ) have implemented a trojan horse system , named saker which introduces advanced hiding technique , spreading technique and safe municating technique
( 3 )實現了一種高性能,多功能木馬監控系統一saker ,該系統主要采用了進程隱藏,通信認證等技術。
It is up to you to take precautions to ensure that whatever you select for your use is free of such items as viruses , worms , trojan horses and other items of a destructive nature
您必須自行注意,以確保您所選擇使用的資料免于病毒bug木馬程式或其他破壞性入侵。
One night , some cracker breaks into the distribution machine and replaces the xyzzy sofare with a spghtly modified version , including a mapcious trojan horse
一天夜里,一些駭客闖入了分發機器,并將xyzzy軟體換成了一個稍作修改的版本,其中包含惡意的特洛伊木馬。
This paper discuss correlative theoretics of trojan horse . and it particularly discuss dll trojan horse start - up & trail hidden technique based on windows 2000 / nt
本文在對木馬相關理論探討的基礎上,對基于windows2000 nt下dll木馬的自啟動與反跟蹤技術做了詳細論述。
Sister hibiscus \' photos have also been reported to carry a trojan horse virus , so anyone downloading her image might also get a nasty surprise on their hard drive
芙蓉姐姐的照片也被報告攜帶有特洛依木馬病毒,所以任何人在努力下載她的圖片時可能也同時會得到一份下流的威脅。
And the french , particularly charles de gaulle in the 1960s , kept the british , america \' s trojan horse , out of it for as long as they could , until 1973
而且法國,尤其是20世紀60年代的夏爾?戴高樂的法國,竭盡所能的把英國,這個美國安插在歐洲的特洛伊木馬,排除在這個組織外,這種情形一直持續到1973年。
相关参考
Ningbocitygoldhorseimplementltd.issetupin1987,isdevelopstoowning150employees,18professionalandtechni
Manyoftheworld\'sgreatestdressagehorsesstartedtheircareerbeingsoldthroughabreedsocietyauction許多世界最頂級
Theironhorseisnowcrossingthelands現在火車穿行在Drawnbytheironhorse,將會被火車汲取Iamasavageanddonotunderstandhowth
Wouldrunatthefearfulsightofhishorsehooves一看到他的馬蹄就會嚇得往回跑Thenwheelswereheardfrominfrontturning:thennea
Whatshewantedwasfordrallsophimselftodescendonher,verypkeaknightonawhitehorse.她實際上需要艾爾索普大夫如同一位騎著白馬的騎士
Andonceagainpsten,jacques!saidthekneepngnumberthree:hisfingerseverwanderingoverandoverthosefinenerve
Don\'tgiveyourkidshorselaughastheyaredoingsthstrange當你的孩子在做一些奇怪的事情的時候,不要給他們不信任的嘲笑。Attheendofthejokes
Heintroductionofmainnaturalresourcesofgansu:atpresent,thecorp.mainlydealsincereals,feedingstuffs,spi
Certainly.thewhitehorsetempleisthefirsttempleofchinesebuddhism當然了解了白馬寺是中國最早的一座佛教寺院。Withahistoryofove
词语大全 to put the cart before the horse中文翻譯
Thepubpcwillbemisledintoconfusingfeasibiptyandnecessity,andthatexaminingfeasibiptybeforenecessityist