一些电脑安全专家建议,确保计算机安全的最好方法是编写出一种不那么容易被病毒,蠕虫及其他黑客伎俩破环的软件。
Some computer security experts propose that the best way to ensure computer security is to write software that isn't easily breached by viruses, worms and other hacker tricks.
很多计算机病毒、蠕虫和特洛伊木马的设计都利用了弱口令。
Many computer viruses, worms, and Trojan horses are designed to exploit weak passwords.
安全专家估计目前已有七百万以上计算机受到Conficker蠕虫病毒感染,冒险到达一个里程碑。
The Conficker worm has passed a dubious milestone. It has now infected more than 7 million [m] computers, security experts estimate.
如果我从不同人的计算机中发现了一个模型,这就说明,所有那些人的计算机都感染了相同的,恶意软件,病毒或蠕虫。
The idea being if I find a pattern across multiple people's computers maybe all of those people are infected with the same kind of malware or virus or worm.
计算机用户长久以来都受到病毒、网络蠕虫以及各种恶意软件的侵扰。
Computer users have for years struggled with viruses, worms and all sorts of malware.
根据美国计算机欺诈和滥用法案第1030条(a)(5),故意散布计算机病毒,蠕虫,进行拒绝服务攻击和其他安全入侵的行为是违法的。
Under section 1030(a)(5) of the U. S. Computer Fraud and Abuse Act, it's against the law to knowingly disseminate computer viruses, worms, denial-of-service attacks and other security intrusions.
震网病毒和蠕虫病毒不一样,它不是原创;伊朗的计算机系统与我们的计算机系统也没有什么明显差别。
Stuxnet isn't spectacularly original, as computer worms go, and those Iranian systems aren't terribly exotic. They're like ours.
建议广大的普通计算机用户更新你的防病毒软件并关注有关蠕虫病毒的新闻报导。
Ordinary PC users are being advised to keep their anti-virus software up to date and watch for news about the worm.
也就是说,我们不可能编出一个计算机程序,让它正确地鉴别某任意的程序是不是一个病毒、蠕虫之类—无论你为解决这个问题拼上多少计算能力。
That is, it is impossible to write a computer program that will identify correctly whether an arbitrary program is a virus, a worm, etc. - no matter how much computing power is thrown at the problem.
在所有人恐慌之前,澄清一件事:最新的Twitter蠕虫只是由SecureScience的计算机安全人员发明的理论上可行的概念,不是在野外的虫子。
Before everyone panics, let's get one thing clear: the new Twitter worm is only a proof-of-concept devised by computer security researchers at Secure Science - it is not out in the wild.
第一批互联网蠕虫病毒之一Morris令数千台计算机瘫痪。
One of the first Internet worms, Morris, cripples thousands of computers.
根据美国计算机欺诈和滥用法案第1030条(a)(5),故意散布计算机病毒,蠕虫,进行拒绝服务攻击和其他安全入侵的行为是违法的。
Under section 1030(a)(5) of the U.S. Computer Fraud and Abuse Act, it’s against the law to knowingly disseminate computer viruses, worms, denial-of-service attacks and other security intrusions.
USB设备的保护是一个轻量级且易于使用的应用程序,提供必要的安全,以您的计算机免受感染各种电子威胁,如蠕虫usb闪存驱动器。
USB Device Protection is a lightweight and easy-to-use application that provides necessary security to your computer against USB flash drives infected with various e-threats, such as worms.
年7月,另一个名为“CodeRed”的蠕虫病毒最终导致了全球运行微软的IISWebServer的300,000多台计算机受到攻击。
In July 2001, another worm named "Code Red" eventually exploited over 300,000 computers worldwide running Microsoft's IIS Web Server.
蠕虫——这类病毒可以在网络上自动从一台计算机传播到另一台。
Worm - this type of virus is able to spread itself automatically over the network from one computer to the next.
但Stuxnet蠕虫病毒可以通过感染记忆卡,继而接入计算机的US B端口进行传播。
But Stuxnet can spread via infected memory sticks plugged into a computer's USB port.
如果计算机联网的话,一种叫蠕虫的病毒会破坏你的计算机,然后利用网络连接来破坏其他计算机。
If your computer is connected to the Internet, viruses called worms may infect your machine, then use its connection to seek out and infect other computers.
随着互联网应用的深入,网络蠕虫对计算机系统安全和网络安全的威胁日益增加。
With the wide application of the Internet, worm's threat to security of computer system and security of network increases day by day.
美国的网络和邮件服务商正在过虑记录在案的蠕虫病毒,然而有些病毒却躲过阻挡使不计其数的未受保护计算机受到感染。
In the United States, Internet and email service providers were blocking the worm in record Numbers, while others were getting through to an untold number of unprotected computer users.
USB快速检查是一个小而易于使用的应用程序,这将有助于保护您的计算机免受病毒,木马,蠕虫和其他恶意攻击。
USB Quick Check is a small and easy to use application that will help protect your computer against viruses, trojans, worms and other malicious attacks.
网络防护保护您的计算机免遭网络蠕虫的侵袭。
Network Shield - Provider SettingsNetwork Shield provider protects your computer from Internet worm attacks.
计算机用户访问这些页面后,可能会感染蠕虫下载器和大量木马病毒。
After computer user visits these pages, may affect vermian download implement with many Trojan virus.
遗憾的是,许多计算机用户都亲身体验过恶意移动代码(包括病毒和蠕虫)造成的后果,这些代码可能会损坏或毁坏数据,并会浪费时间和资金。
Unfortunately, many computer users have experienced firsthand the effects of malicious mobile code, including viruses and worms, which can damage or destroy data and cost time and money.
随着计算机网络应用日益普及和复杂性的不断增加,网络蠕虫严重威胁着网络安全。
With the rapid growth of computer application and increasing complexities, the Internet worms are seriously threat the net- work security.
由于网络蠕虫泛滥产生的巨大危害,如何对网络蠕虫进行检测、预警和应对,已经成为计算机网络安全研究领域的一个重要课题。
Because of the huge damage of network worm epidemics, how to detect and response network worms has become an important task in computer network security field.
根据美国计算机欺诈和滥用法案第1030条(a)(5),故意散布计算机病毒,蠕虫,进行拒绝服务攻击和其他安全入侵的行为是违法的。
Under section 1030 (a) (5) of the U. s. Computer Fraud and Abuse Act, it's against the law to knowingly disseminate computer viruses, worms, denial-of-service attacks and other security intrusions.
随着计算机技术和互联网的飞速发展,计算机病毒和网络蠕虫已成为计算机使用者面临的最大烦恼。
With the development of computer technology and Internet, computer virus and net worm have become the biggest trouble computer users faced.
随着计算机技术和互联网的飞速发展,计算机病毒和网络蠕虫已成为计算机使用者面临的最大烦恼。
With the development of computer technology and Internet, computer virus and net worm have become the biggest trouble computer users faced.
应用推荐