Trojan horse Malware that masquerades as non-malicious software.
特洛伊木马软件,经常伪装成无害软件。
This thesis is lucubrated on the part of Trojan horse hiding.
本文在研究生数学建模隐藏部分做了研究。
This thesis is lucubrated on the part of Trojan horse hiding.
本文在木马隐藏部分做了研究。
Trojan Horse programs are a type of malicious computer programs.
木马程序是一种恶意电脑程序。
When he downloaded the free game it turned out to be a Trojan horse.
当他下载了那个免费游戏后,结果是一个特洛伊木马程序。
There are many ways to install Trojan horse, the most common way toe-mail.
木马植入的方式多种多样,以邮件方式最为常见。
If this is a worm or Trojan horse the length represents the size of the file.
如果这是一个蠕虫或特洛依木马则长度表示为该文件的长度。
Nothing will slow your system down like a virus, a Trojan horse, or other types of malware.
没有任何东西比病毒,特洛伊木马或者其他恶意软件更能减慢你系统速度的了。
Finally, the current detection technology of Trojan horse based API HOOK it presented.
最后,讨论了基于API HOOK技术的特洛伊木马的检测技术。
Hastings' Trojan horse-netflix's software, embedded on myriad consumer devices-is already in place.
黑斯廷斯的特洛伊木马——Netflix的软件,嵌入于众多消费电子产品中,已经占据其位了。
One piece of malware, the Vundo Trojan horse, has been especially active the past three months.
其中的一个,VundoTrojan horse在过去的3个月里异常活跃。
Outfitted with a keystroke-capture mechanism, the Trojan horse records the user names and passwords.
自带了键盘输入机制的木马病毒就会记录下用户的网银账号和密码。
This article discusses the work principles and attack technology and defending policies on Trojan Horse.
本文介绍了木马的攻击原理、常用攻击技术以及防范策略。
“Maybe it’s a Trojan horse that smuggles the right policy into place, ” mused Paul Krugman, grimly, at Princeton.
“也许它是带来正确政策的特洛伊木马”普林斯顿的PaulKrugma谨慎而冷静地说。
Other themed rooms include a newly opened Trojan Horse, a Troll Forest, a South Seas sailing ship and a Wine Room.
其他主题方面还包括新开发的特洛伊木马,森林巨魔,南海帆船和酒窖。
Based on that, has completed the design and the realization of a kind of kernel hacking Trojan Horse Finally.
最后在此基础上完成了一个基于内核入侵的木马设计与实现。
Of course, there may be a time when you were malicious access to your computer intrusion, and placed a Trojan horse.
当然,还有一种可能是当你上网时被人恶意侵入了你的计算机,并放置了木马程序。
The experiment result shows that the worm-kind Trojan horse can play positive role in the network attack and defense.
实验结果表明,蠕虫型木马可以在网络攻防中发挥积极作用。
In the first chapter of this paper, we mainly introduce the concept, developing trend, sort and function of Trojan Horse.
本文第一章对特洛伊木马的概念、发展趋势、分类与功能进行了介绍。
Even after the end of white rule, some of South Africa's neighbours regard it as something of a Trojan horse for the West.
即便是后白人统治时期,南非的一些邻国仍把其看做是西方在非洲安插的内线。
The most widespread approach is to use what Len Seymour, a researcher at Oxford University, describes as "Trojan horse" vectors.
用得最广的途径是被一位牛津大学研究员LenSeymour称为“特洛伊木马”的载体。
Most schoolchildren know the basics of the Trojan horse, but Virgil outlines all of the intriguing details of myth and legend.
上学的孩子都熟知特洛伊木马的故事,但是维吉尔对这个神话故事的复杂细节做了描述。
At last, the famous Greek hero Odysseus came up with the "Trojan horse" trick, made a huge wooden horse, and put it out of Troy.
最后,希腊著名的英雄奥德修斯想出了一个木马计,用木头做了一匹巨马,放在特洛伊城外。
But instead of riding the PS3 as a Trojan horse, Blu-ray has instead hobbled it by increasing its price and delaying its introduction.
但是相对于把PS 3看作是特洛伊木马,蓝光则因提高价格和延迟上市阻碍了索尼公司。
Trojan horse programs : Delivery vehicles for destructive code, which appear to be harmless or useful software programs such as games.
木马程序:破坏性指令的载体,它们外表没有危害或者是寄付在某些有用的软件程序如游戏中。
Thus it can be seen that the Trojan horse is the most harmful to mobile banking and can easily steal the money from the bank card at any time!
由此可见木马病毒对手机银行的危害性最大,可以随时轻易的盗取银行卡里的钱财!
Thus it can be seen that the Trojan horse is the most harmful to mobile banking and can easily steal the money from the bank card at any time!
由此可见木马病毒对手机银行的危害性最大,可以随时轻易的盗取银行卡里的钱财!
应用推荐