• Swing, Trojan horses, toy house.

    秋千木马玩具

    youdao

  • Online customized viruses, Trojan horses;

    网上定制病毒木马

    youdao

  • Viruses, Worms, Trojan Horses and Zombies.

    病毒蠕虫。托洛伊木马僵尸

    youdao

  • Trojan protection - Detecting access to Trojan horses.

    特洛伊木马防护—— 特洛伊木马进行检测

    youdao

  • Concealing technology is important to designer of Trojan horses all through.

    隐藏技术一直木马设计人员研究重要技术。

    youdao

  • Many computer viruses, worms, and Trojan horses are designed to exploit weak passwords.

    很多计算机病毒蠕虫特洛伊木马的设计利用口令。

    youdao

  • He uses Trojan horses to sneak into people’s computersand infect them, so he can take control.

    他用木马潜入别人的系统,达到控制这些电脑的目的。

    youdao

  • This software is supposed to be a defense against Trojan horses, worms, and other types of viruses.

    这个软件用来对抗特洛伊木马,蠕虫病毒其他种类病毒的。

    youdao

  • Install virus detection software on your computer to protect from known viruses such as Trojan Horses.

    计算机安装病毒检测软件保护已知特洛伊木马病毒例如

    youdao

  • Its main means has: online professor viruses, Trojan horses production technology and various network attack technology;

    主要方式网上教授病毒木马制作技术各种网络攻击技术;

    youdao

  • Nov. 20, 2006 issue - Trojan horses, worms and other nasty viruses have gone wireless—and could be targeting your cell phone.

    1120日一的《新闻周刊》报道,特洛伊木马、蠕虫其它令人讨厌病毒已经侵入了无线领域, 也可能正在攻击你的手机。

    youdao

  • Rootkit backdoorsoften called trojan horsescan typically be divided into two categories: local programs and network services.

    Rootkit的后门-通常被称为特洛伊木马-通常可以分为本地节目网络服务。

    youdao

  • Instead, its function is to mask the presence of other types of (usually malicious) software, such as Trojan horses, viruses or worms.

    相反功能掩蔽其他类型(常常是恶意)软件木马程序、病毒蠕虫

    youdao

  • Trojan horses, worms, and other malicious forms have proven to be incredibly successful at paralyzing email systems and Internet providers.

    特洛伊木马、蠕虫其他恶性程序代码形式业已证明瘫痪电子邮件系统和因特网供应商方面非常成功的。

    youdao

  • Security experts first flagged digital picture frames as a danger a year ago, when several models of the devices were found to be carrying Trojan horses.

    早在年前一些型号设备发现携带木马病毒之后,就有安全专家提出电子相框安全威胁的途径。

    youdao

  • What a cunning tactic in the pasty wars between these counties-returning tourists are turned into pasty "Trojan horses" making border incursions into enemy territory.

    两地之间馅饼之争诡计百出,每个返程的游客当做馅饼特洛伊木马,去入侵敌方边境。

    youdao

  • It is up to you to take precautions to ensure that whatever you select for your use is free of such items as viruses, worms, Trojan horses and other items of a destructive nature.

    阁下必须自行采取必要措施确保所点选网站内容没有病毒寄生虫、木马程序其他有害内容。

    youdao

  • It is up to you to take precautions to ensure that whatever you select for your use is free of such items as viruses, worms, Trojan horses and other items of a destructive nature.

    阁下必须自行采取必要措施确保所点选网站内容没有病毒寄生虫、木马程序其他有害内容。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定