• This is the Greek legend of the Trojan Horse.

    就是希腊传说中的木马计

    youdao

  • They are defeated only because of the Trojan horse in their country.

    他们战败原因只是因为他们国内暗藏敌人。

    youdao

  • Outfitted with a keystroke-capture mechanism, the Trojan horse records the user names and passwords.

    自带了键盘输入机制木马病毒就会记录用户的网银账号密码。

    youdao

  • This paper has discussed the operation principle of the Trojan Horse virus that caused the harm greatly to computer security.

    讨论计算机安全危害极大木马病毒工作原理

    youdao

  • Most schoolchildren know the basics of the Trojan horse, but Virgil outlines all of the intriguing details of myth and legend.

    上学孩子都熟知特洛伊木马故事,但是吉尔这个神话故事的复杂细节做了描述。

    youdao

  • Thus it can be seen that the Trojan horse is the most harmful to mobile banking and can easily steal the money from the bank card at any time!

    由此可见木马病毒手机银行危害性最大可以随时轻易盗取银行卡里的钱财

    youdao

  • This paper introduces the Trojan horse and its damage to computer system, and advances some methods and defensive measures for killing the Trojan horse.

    介绍木马病毒及其计算机系统危害性,提出了几种查杀木马病毒的方法防御措施

    youdao

  • The Trojan horse exploits a flaw in the Adobe software to allow it to install additional malware components and further compromise the vulnerable computer.

    木马利用Adobe软件中的漏洞用户电脑安装额外的恶意软件组件从而进行进一步感染。

    youdao

  • They claim that our insistence on something larger, something firmer and more honest in our public life is just a Trojan Horse for higher taxes and the abandonment of traditional values.

    我们民众生活更庞大更坚固正直事物之坚持如同特洛伊木马,只会导致更高税收,以及传统价值的流失

    youdao

  • The most widespread approach is to use what Len Seymour, a researcher at Oxford University, describes as "Trojan horse" vectors.

    广途径牛津大学研究员LenSeymour称为“特洛伊木马”的载体。

    youdao

  • The BreakingPoint system delivered a strike level 5 test that included exploits, network worms, denial-of-service attack, reconnaissance attacks, Trojan horse and backdoor intrusions.

    BreakingPoint系统提供一个5强度的攻击测试包括了侦测网络蠕虫拒绝服务攻击踩点攻击特洛伊木马后门入侵。

    youdao

  • Even after the end of white rule, some of South Africa's neighbours regard it as something of a Trojan horse for the West.

    即便是白人统治时期南非一些邻国其看做是西方在非洲安插的内线

    youdao

  • Apple users see Google's operating system as a Trojan horse for the search giant to simply sell more ads, not make people's lives easier or more rewarding.

    苹果用户Google操作系统特洛伊木马,因为这家搜索巨头的所为只是一味卖出更多广告而不是人们生活更方便有益。

    youdao

  • Maybe it’s a Trojan horse that smuggles the right policy into place, ” mused Paul Krugman, grimly, at Princeton.

    也许是带来正确政策特洛伊木马”普林斯顿PaulKrugma谨慎而冷静地说。

    youdao

  • One piece of malware, the Vundo Trojan horse, has been especially active the past three months.

    其中的一个,VundoTrojan horse过去3个月里异常活跃

    youdao

  • When he downloaded the free game it turned out to be a Trojan horse.

    下载了那个免费游戏后结果一个特洛伊木马程序。

    youdao

  • According to one report the so-called Trojan Horse programme (attached to a seemingly innocuous electronic file) was siphoning off 160 gigabytes of information when it was stopped.

    份报告指出,在被阻止之前,所谓的“特洛伊木马”程序(附着看似平淡无奇电子文档中)正在窃取160gb情报

    youdao

  • If this is a worm or Trojan horse the length represents the size of the file.

    如果一个蠕虫特洛依木马长度表示为文件长度

    youdao

  • This thesis is lucubrated on the part of Trojan horse hiding.

    本文研究生数学建模隐藏部分了研究

    youdao

  • At last, the famous Greek hero Odysseus came up with the "Trojan horse" trick, made a huge wooden horse, and put it out of Troy.

    最后希腊著名英雄奥德修斯想出了木马计木头做了一匹巨马放在特洛伊城外。

    youdao

  • A timely gift - a Trojan horse - will serve the same purpose.

    一件适时礼物,就像是特洛伊木马一样有效。

    youdao

  • There are many ways to install Trojan horse, the most common way toe-mail.

    木马植入方式多种多样,以邮件方式最为常见

    youdao

  • This article discusses the work principles and attack technology and defending policies on Trojan Horse.

    本文介绍了木马的攻击原理、常用攻击技术以及防范策略

    youdao

  • This thesis is lucubrated on the part of Trojan horse hiding.

    本文木马隐藏部分做了研究。

    youdao

  • Finally, the current detection technology of Trojan horse based API HOOK it presented.

    最后,讨论了基于API HOOK技术特洛伊木马的检测技术。

    youdao

  • Finally, the current detection technology of Trojan horse based API HOOK it presented.

    最后,讨论了基于API HOOK技术特洛伊木马的检测技术。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定