Outfitted with a keystroke-capture mechanism, the Trojan horse records the user names and passwords.
自带了键盘输入机制的木马病毒就会记录下用户的网银账号和密码。
This paper has discussed the operation principle of the Trojan Horse virus that caused the harm greatly to computer security.
讨论对计算机安全危害极大的“木马”病毒的工作原理。
Most schoolchildren know the basics of the Trojan horse, but Virgil outlines all of the intriguing details of myth and legend.
上学的孩子都熟知特洛伊木马的故事,但是维吉尔对这个神话故事的复杂细节做了描述。
Thus it can be seen that the Trojan horse is the most harmful to mobile banking and can easily steal the money from the bank card at any time!
由此可见木马病毒对手机银行的危害性最大,可以随时轻易的盗取银行卡里的钱财!
This paper introduces the Trojan horse and its damage to computer system, and advances some methods and defensive measures for killing the Trojan horse.
介绍了木马病毒及其对计算机系统的危害性,提出了几种查杀木马病毒的方法和防御措施。
The Trojan horse exploits a flaw in the Adobe software to allow it to install additional malware components and further compromise the vulnerable computer.
该木马利用Adobe软件中的漏洞向用户电脑安装额外的恶意软件组件从而进行进一步感染。
They claim that our insistence on something larger, something firmer and more honest in our public life is just a Trojan Horse for higher taxes and the abandonment of traditional values.
我们对民众生活中更庞大、更坚固和更正直的事物之坚持,就如同一只特洛伊木马,只会导致更高的税收,以及传统价值的流失。
The most widespread approach is to use what Len Seymour, a researcher at Oxford University, describes as "Trojan horse" vectors.
用得最广的途径是被一位牛津大学研究员LenSeymour称为“特洛伊木马”的载体。
The BreakingPoint system delivered a strike level 5 test that included exploits, network worms, denial-of-service attack, reconnaissance attacks, Trojan horse and backdoor intrusions.
BreakingPoint的系统提供了一个5级强度的攻击测试,包括了侦测、网络蠕虫、拒绝服务攻击、踩点攻击、特洛伊木马和后门入侵。
Even after the end of white rule, some of South Africa's neighbours regard it as something of a Trojan horse for the West.
即便是后白人统治时期,南非的一些邻国仍把其看做是西方在非洲安插的内线。
Apple users see Google's operating system as a Trojan horse for the search giant to simply sell more ads, not make people's lives easier or more rewarding.
苹果用户视Google的操作系统为特洛伊木马,因为这家搜索巨头的所为只是一味卖出更多的广告,而不是令人们的生活更方便或更有益。
“Maybe it’s a Trojan horse that smuggles the right policy into place, ” mused Paul Krugman, grimly, at Princeton.
“也许它是带来正确政策的特洛伊木马”普林斯顿的PaulKrugma谨慎而冷静地说。
One piece of malware, the Vundo Trojan horse, has been especially active the past three months.
其中的一个,VundoTrojan horse在过去的3个月里异常活跃。
When he downloaded the free game it turned out to be a Trojan horse.
当他下载了那个免费游戏后,结果是一个特洛伊木马程序。
According to one report the so-called Trojan Horse programme (attached to a seemingly innocuous electronic file) was siphoning off 160 gigabytes of information when it was stopped.
一份报告指出,在被阻止之前,所谓的“特洛伊木马”程序(附着在一份看似平淡无奇的电子文档中)正在窃取160gb的情报。
If this is a worm or Trojan horse the length represents the size of the file.
如果这是一个蠕虫或特洛依木马则长度表示为该文件的长度。
This thesis is lucubrated on the part of Trojan horse hiding.
本文在研究生数学建模隐藏部分做了研究。
At last, the famous Greek hero Odysseus came up with the "Trojan horse" trick, made a huge wooden horse, and put it out of Troy.
最后,希腊著名的英雄奥德修斯想出了一个木马计,用木头做了一匹巨马,放在特洛伊城外。
There are many ways to install Trojan horse, the most common way toe-mail.
木马植入的方式多种多样,以邮件方式最为常见。
This article discusses the work principles and attack technology and defending policies on Trojan Horse.
本文介绍了木马的攻击原理、常用攻击技术以及防范策略。
This thesis is lucubrated on the part of Trojan horse hiding.
本文在木马隐藏部分做了研究。
Finally, the current detection technology of Trojan horse based API HOOK it presented.
最后,讨论了基于API HOOK技术的特洛伊木马的检测技术。
In the first chapter of this paper, we mainly introduce the concept, developing trend, sort and function of Trojan Horse.
本文第一章对特洛伊木马的概念、发展趋势、分类与功能进行了介绍。
In some respects, the requirements to obtain the box is a Trojan horse in your house. Another potential source of income is the measurement bandwidth.
在某些方面,要求是特洛伊木马获得方块在您的房子。另一个潜在的收入来源是带宽计量。
But instead of riding the PS3 as a Trojan horse, Blu-ray has instead hobbled it by increasing its price and delaying its introduction.
但是相对于把PS 3看作是特洛伊木马,蓝光则因提高价格和延迟上市阻碍了索尼公司。
In recent years, there are a plenty of hackers' inbreak, so we should further study the virus such as Trojan-horse procedure.
特别是近来,黑客入侵的频繁发生,更需要加强对木马等病毒方面的研究。
In recent years, there are a plenty of hackers' inbreak, so we should further study the virus such as Trojan-horse procedure.
特别是近来,黑客入侵的频繁发生,更需要加强对木马等病毒方面的研究。
应用推荐