繁體版 English 日本語IndonesiaFrancais한국어РусскийไทยViệt
登录 注册

特洛伊木马

"特洛伊木马"的翻译和解释

例句与用法

  • The paper emphasizes the theory and realization of mandatory access control , including the realization of mandatory access control on inter - process communication and network , and elaborates how mandatory access control defends system against trojan horse
    论文重点介绍了强制访问控制机制的理论及实现,包括进程间通信的强制访问控制以及网络强制访问控制的实现,并详细阐述了强制访问控制对特洛伊木马的防范。
  • By using authenticode for application deployment , clickonce helps prevent the phenomenon of a " trojan horse , " where a malicious third party misrepresents a virus or other harmful program as a legitimate program coming from an established , trustworthy source
    通过将authenticode用于应用程序部署, clickonce帮助防止出现“特洛伊木马”现象,即恶意的第三方将病毒或其他有害程序伪装为来自已建立的可信任源的合法程序。
  • The type of threat i ' m talking about is one against your digital assets ; this can be anything from a hacker claiming that they have already stolen confidential information , to a former employee alleging that a trojan horse is already in your environment and could be triggered at any time
    我正在谈的的威胁类型依靠你的数字资产;这可能是声称已经偷了机密信息的黑客,以前的职工声称一个特洛伊木马已经存在于你的环境中,并能在任何时候触发。
  • Our country is a developing country . there are serious security hidden trouble because depending on other county in both hardware and software . so establishing a reliable information security system based on own technology undoubtedly has a very important strategic meaning
    我国是发展中国家,信息产业正处于发展阶段,无论在硬件还是在软件上都严重依赖于人,国外电脑硬件、软件中可能隐藏着“特洛伊木马” ,这就在安全上留下了严重隐患。
  • Intranet attack include : information - detector , ip - deceive , dos , password - attack , man - in - the - middle - attack , application layer attack , network reconnaissance , trust exploitation , port redirection , virus . it is helpful to obtain complete and distinct security requirements with intranet security risk analysis . 2
    主要包括数据包探测器、 ip电子欺骗、拒绝服务、密码攻击、中间人攻击、应用层攻击、网络侦察、信任利用、端口重定向、病毒和特洛伊木马
  • Following this reference yields a pretty liberal license , except for the ominous footer : " information in this document is subject to change without notice . " the fact that the license is not written into the product , but is asserted by reference to a web page that can be changed at any time , raises the specter of a possible trojan horse play where cxml is spread through the industry and then its owner stated as ariba in the license can make a sly play for juicy profits , or cut down a competitor , by moving the licensing goalposts
    ( “ information in this document is subject to change without notice 。 ” )许可证并未写入到产品中,而是通过到可能会随时更改的web页面的引用进行维护的这一事实,引发了对可能的特洛伊木马活动的忧虑,那就是cxml在业界传播,然后它的拥有者(就象许可证中所声明的ariba )通过移动许可发放“门柱”来暗中想方设法获利,或者削弱竞争对手。
  • It analyses common hacker and their technique in this text , and provide general precaution on the attack of hacker . it explain to construct the network security system to make use of hacker and their technique and it should rely on legislative building in network security management . it is thought highly of hacker and their technique
    本文首先分析了互连网在安全方面的脆弱性,研究了产生的背景和黑客攻击的常见技术,着重分析了特洛伊木马、拒绝服务、 web欺骗等技术,在此基础上,给出了针对黑客攻击的一般防范措施和一些可用的方法,同时对利用黑客及黑客技术在构建网络安全体系和网络安全管理法制化建设方面的问题进行了研讨。
  • 更多例句:  1  2  3  4  5
用"特洛伊木马"造句  
英语→汉语 汉语→英语