Security 2010 pop-up, short for malicious software, is the software designed to invade or destroy computer system without the users' knowing.
桌面安全2010弹出,恶意软件的缩写,是为了不入侵或破坏用户的计算机系统知道该软件。
These tools can help block malicious software from disrupting a computer or give a technician the ability to fix a computer from a remote location.
这些工具可以帮助操作者阻止破坏计算机的行为或给予技术人员的能力来从远程计算机上解决恶意软件。
A new program aims to put the squeeze on malicious software that can disable, infiltrate or transform a computer system into an unwitting zombie - before the cyber attack ever materializes.
一种新的程序旨在对恶意软件施加压力,该程序可以在网络攻击开始之前以禁用,渗透或变换的方法阻止计算机在不知情的情况下成为一个僵尸电脑。
You put malicious or illegal software there, it doesn't matter, they will never take you offline.
你可以把恶意软件、非法软件放在他们那里,他们绝对不会让你下线的。
Typical functional testing approaches are, after all, designed to verify expected behavior in software, not to find or experiment with unexpected reactions to malicious activities.
毕竟,典型的测试方法是基于验证软件是否按照预期运行的思路设计的,而不是根据发现或者试验预期之外的反应而设计的。
But it can also lead to a page that infects your computer with a virus or another piece of malicious software that then steals your passwords or USES your machine for other nefarious purposes.
但是也可以导致你连接到一些有病毒和偷盗你密码为了违法目的的木马程序的网站。
And malicious software could corrupt or erase files on the external drive.
一些恶意软件可能会毁坏或删除外置硬盘上的文件。
Ill-intended creators of malicious software are quick to seize on hot topics to dupe people into opening files or executing applications that allow stealth programs to invade their machines.
恶意软件的开发者善于迅速抓住热点话题,诱骗人们打开或执行能够侵入电脑的间谍程序或应用。
Greyware refers to a malicious software or code that is considered to fall in the "grey area" between normal software and a virus.
灰件是指位于正常软件和病毒之间“灰色地带”的恶意软件或代码。
Reverse engineering has become possible or distorted wilfully for software system in malicious host surroundings, the security, integrity and availability of software system are threatened.
在恶意主机环境下,主机可以对软件系统进行逆向工程或者肆意的篡改,其安全性、完整性与可用性都受到了很大的威胁。
The current method of detection of malicious code or software, the discovery of malicious code, malicious code often has invaded into the machine.
现有的检测恶意代码的方法或软件,在发现恶意代码时,恶意代码往往已经入侵到了机器中。
As a result, computer systems can be damaged and private data can be leaked when cautious and trustworthy users run malicious or error-filled software.
结果,当谨慎可靠的用户运行恶意软件或包含错误的软件时,计算机系统可能会受到损坏,并且可能会泄漏私有数据。
Instead, its function is to mask the presence of other types of (usually malicious) software, such as Trojan horses, viruses or worms.
相反,其功能是掩蔽其他类型(常常是恶意的)软件,如木马程序、病毒或蠕虫。
Code (software) that is transferred from a host to a client (or another host computer) to be executed (run). When we talk about malicious mobile code we may use a Worm as an example.
代码(软件)从一台主机传送到客户机上(或者传送到另一台主机上)被执行(运行)。譬如蠕虫。
Code (software) that is transferred from a host to a client (or another host computer) to be executed (run). When we talk about malicious mobile code we may use a Worm as an example.
代码(软件)从一台主机传送到客户机上(或者传送到另一台主机上)被执行(运行)。譬如蠕虫。
应用推荐