Detection of viruses, worms, trojans.
检测到病毒,蠕虫,木马。
Trojan Hunter: Protects system from Trojans.
TrojanHunter:保护系统免受木马。
The Trojans should have listened to Cassandra.
特洛伊的人就本应该听取(预言家)桑德拉的预言。
"These Trojans have a very low detection rate," Chenette says.
“这些木马有一个非常低的检出率,”Chenette说。
Guard your email against spam which may contain worms or trojans.
避免垃圾邮件,垃圾邮件通常包含有蠕虫病毒或者木马病毒。
The trojans awoke from their dreams of peace to see their homes in flames.
特洛伊人从恬静的梦中醒来,看到他们的家宅在燃烧。
The Trojans asleep, the Greek soldiers crept out of the hollow wooden horse.
特洛伊人睡着了,于是希腊士兵从中空的木马里悄悄爬了出来。
Thee Trojans asleep, the GREek soldiers crept out of the hollow wooden horse.
特洛伊人睡着了,于是希腊士兵从中空的木马里悄悄爬了出来。
Trojans are designed to cause loss or theft of computer data, and to destroy your system.
木马程序的目的是造成损失或被窃的计算机数据,并破坏您的系统。
Most Trojans exhibit some form of malicious, hostile, or harmful functionality or behavior.
大多数木马展品某种形式的恶意,敌意,或有害的功能或行为。
In short, backdoors combine the functionality of most other types of Trojans in one package.
在短期内,后门相结合的功能,大多数其他类型的木马在一个封装中。
The Iliad makes it clear that destruction came upon Troy because the Trojans stole Greek women.
《伊利亚特》说得很明白,特洛伊城之所以被毁,原因是特洛伊人拐走了希腊的妇女。
Now, a growing number of viruses and Trojans are obtained for the purpose of economic interests.
现在,越来越多的病毒和木马是以获得经济利益为目的。
Trojans have two, when you got it. One in your computer and another one in the hacker's computer.
木马有两只,一只放在你电脑上,一只放在我电脑上。
The technology is ideal at protecting against zero-day threats in the form of Viruses and Trojans.
该技术是理想的,在保护儿童不受零日威胁形式的病毒和木马。
The Trojans, at the sight of the well-known armor, struck with terror, looked everywhere for refuge.
特洛伊人一看到那赫赫有名的战甲,果然惊慌失措,四散逃开,到处寻找避难所。 。
If you, Patroclus, could be in his armor, and perhaps the very sight of it may drive back the Trojans.
普特洛克·勒斯,如果你能穿上他的盔甲,也许能令特洛伊人望而生畏、退避三舍。
In most cases, the payload contains other Trojans and at least one hoax: jokes, games, graphics and so forth.
在大多数情况下,有效载荷包含其他木马和至少一个骗局:笑话,游戏,图形等等。
Trojans exploit vulnerabilities of banking software used by clients to carry out transactions over the Internet.
利用木马客户端用于通过互联网进行交易的银行软件的漏洞。
Hackers have become wholesale providers of malware-viruses, worms and Trojans that infect computers-for others to use.
黑客们已经成了提供恶意软件给他人使用的批发供应商- - -使电脑感染病毒、电脑蠕虫和中木马。
The Trojans, seeing the encampment broken up and the fleet gone, concluded the enemy to have abandoned the siege.
特洛伊人看到军营解散,战船远航,认为敌人放弃围城计划了。
When Odysseus left Ithaca to fight the Trojans, he entrusted Mentor, a good friend, with his home, lands and wealth.
当奥德赛离开伊萨卡跟特洛伊作战时,他将他的家、土地和财产委托给一位好朋友曼托。
Gillian's opera productions include The Trojans, The Midsummer Marriage, The Flying Dutchman, Parsifal and Bluebeard.
吉莉安担任编舞的歌剧作品有:《特洛伊》、《仲夏夜的婚礼》、《漂泊的荷兰人》、《帕西法尔》、《蓝胡子公爵》。
Nonetheless, its detection means it is highly likely there are other, more suitable Trojans out there waiting to be found.
不过,这一发现意味着很可能存在着其他更合适的特洛伊小行星有待发现。
At first I was pushed into the Trojan Greek people outside the gates of trojans, then was found, was dragged into the city.
首先我被希腊人推到特洛伊人的城门外,然后被特洛伊人发现,被拖进了城里。
The Greeks then put the best soldiers inside a massive wooden horse and tricked the Trojans to bring the horse inside the city.
希腊人将最好的士兵藏在一个巨大的木马里并诱使特洛伊人将木马拖进城里。
For a long time, this group of Trojans constituted a significant portion of the daily 'catch' for antivirus companies worldwide.
长期以来,这个木马小组成立了一个日常的追赶反病毒公司在全球的很大一部分。
ATTENTION: it must be mentioned, that opening ports holds a potential danger for your system to be infected with viruses and trojans.
注意:这里要特别提醒,打开端口存在病毒和木马入侵的潜在危险!
Spam, phishing, pump-and-dump schemes and data-stealing Trojans and keyloggers can net their creators an enormous amount of income.
垃圾邮件、网络钓鱼、炒股诈骗、数据窃取、木马和键盘记录器能够为它们的制造者带来巨额的收入。
Spam, phishing, pump-and-dump schemes and data-stealing Trojans and keyloggers can net their creators an enormous amount of income.
垃圾邮件、网络钓鱼、炒股诈骗、数据窃取、木马和键盘记录器能够为它们的制造者带来巨额的收入。
应用推荐