繁體版 English 日本語IndonesiaFrancais한국어РусскийไทยViệt
登录 注册

特洛伊木马

"特洛伊木马"的翻译和解释

例句与用法

  • Once they are reared in the laboratory , however , releasing these trojan insects into the real world poses a whole new set of challenges , including ethical ones
    不过蚊子如果在实验室养大,然后这些特洛伊木马昆虫又释放到现实世界,这将会带出全新的挑战,包括伦理上的问题。
  • Backdoor trojans , which can enable an attacker to control an infected computer and steal confidential information , are a significant and tangible threat to windows users
    后门特洛伊木马程式可让攻击者控制受感染的电脑并窃取机密资讯,因此会对windows使用者造成严重实质上的威胁。
  • These programmes are inadvertently installed by victims when they visit certain dubious websites or open attachments to incoming e - mails from dubious sources
    当受害人进入某些可疑网站,或开启可疑电邮的附件,这些特洛伊木马程式便会在受害人毫不察觉的情况下安装到受害人的个人电脑。
  • W32 . badtrans . 13312 @ mm is a mapi worm that replies to all unread mails in the microsoft outlook email message folders , and drops a backdoor trojan
    W32 . badtrans . 13312 @ mm是一种mapi蠕虫,它会回覆所有在microsoftoutlook讯息资料夹内的未阅读邮件和附加上后门特洛伊木马程式( trojan ) 。
  • And the french , particularly charles de gaulle in the 1960s , kept the british , america ' s trojan horse , out of it for as long as they could , until 1973
    而且法国,尤其是20世纪60年代的夏尔?戴高乐的法国,竭尽所能的把英国,这个美国安插在欧洲的特洛伊木马,排除在这个组织外,这种情形一直持续到1973年。
  • The next challenge in securing the pda is to offer protection against malicious code attacks malicious code covers the wide gamut of trojan horses , viruses , and malicious scripts and applications
    保护pda的下一个挑战是抵抗恶意代码的攻击(恶意代码包括无处不在的特洛伊木马、病毒以及恶意脚本和应用程序) 。
  • Trojan horses : this self - contained , non - replicating program appears to be benign , but it actually has a hidden malicious purpose . trojan horses often deliver other attacker tools to systems
    特洛伊木马:这是独立的,非自我复制程序,表面良好,但实际具有隐藏的恶意目的。特洛伊木马通常释放其它攻击工具到系统。
  • Trojan horse is a remote control program based on " client / server " mode . after the trojan horse server running on user ' s pc , it can open a specifical port or connect with trojan horse client or do other actions
    特洛伊木马” ,是一种基于“客户机服务器”模式的远程控制程序,它的服务器端程序在用户的计算机上运行后,可以打开特定的端口也可以与客户机交互或是执行特定命令等等。
  • The main task of an intrusion detection system is to detect attacks or intrusions into the network or the computer by identifying security breaches such as incoming shellcode , viruses , malware , or trojan horses
    入侵检测系统( intrusion detection system , ids )的主要任务是,通过识别到来的shellcode 、病毒、恶意软件( malware )或者特洛伊木马等安全缺口,检测进入网络或者计算机的攻击或入侵。
  • In this article , i describe ways that computer code can help eliminate unsolicited commercial e - mail , viruses , trojans , and worms , as well as frauds perpetrated electronically and other undesired and troublesome e - mail
    在本文中,我描述了几种方法,这些方法用计算机代码来帮助消除不请自来的商业性电子邮件、病毒、特洛伊木马和蠕虫病毒以及怀有恶意的欺诈性电子邮件与其它一些不希望收到的和令人烦恼的电子邮件。
  • 更多例句:  1  2  3  4  5
用"特洛伊木马"造句  
英语→汉语 汉语→英语