计算机病毒和蠕虫在网络中的扩散取决于网络的结构。
Computer virus and worms spread in networks that lie on the structure of networks.
很多计算机病毒、蠕虫和特洛伊木马的设计都利用了弱口令。
Many computer viruses, worms, and Trojan horses are designed to exploit weak passwords.
根据美国计算机欺诈和滥用法案第1030条(a)(5),故意散布计算机病毒,蠕虫,进行拒绝服务攻击和其他安全入侵的行为是违法的。
Under section 1030(a)(5) of the U. S. Computer Fraud and Abuse Act, it's against the law to knowingly disseminate computer viruses, worms, denial-of-service attacks and other security intrusions.
根据美国计算机欺诈和滥用法案第1030条(a)(5),故意散布计算机病毒,蠕虫,进行拒绝服务攻击和其他安全入侵的行为是违法的。
Under section 1030(a)(5) of the U.S. Computer Fraud and Abuse Act, it’s against the law to knowingly disseminate computer viruses, worms, denial-of-service attacks and other security intrusions.
根据美国计算机欺诈和滥用法案第1030条(a)(5),故意散布计算机病毒,蠕虫,进行拒绝服务攻击和其他安全入侵的行为是违法的。
Under section 1030 (a) (5) of the U. s. Computer Fraud and Abuse Act, it's against the law to knowingly disseminate computer viruses, worms, denial-of-service attacks and other security intrusions.
随着计算机技术和互联网的飞速发展,计算机病毒和网络蠕虫已成为计算机使用者面临的最大烦恼。
With the development of computer technology and Internet, computer virus and net worm have become the biggest trouble computer users faced.
随着计算机技术和互联网的飞速发展,计算机病毒和网络蠕虫已成为计算机使用者面临的最大烦恼。
With the development of computer technology and Internet, computer virus and net worm have become the biggest trouble computer users faced.
应用推荐