Was Colombo the emissary of Pope Paul, his Trojan horse within the Commission? 科隆博是教皇保罗的特使吗?是他在委员会内部设下的卧底吗?
Both factions accused each other of using the organization as a Trojan horse to advance their causes. 两派都相互指责对方利用该组织作幌子以发展各自的事业。
Operating systems can be brought to a halt by a Trojan Horse. 操作系统可能会因为木马病毒的攻击而中止。
Many computer viruses, worms, and trojan horses are designed to exploit weak passwords. 很多计算机病毒、蠕虫和特洛伊木马的设计都利用了弱口令。
My special period was Trojan and hadrian. 我专门研究的是“特洛伊和哈德良”历史时期。
Applied the artificial immune principle in the Trojan detection because of the adaptive and the immunity study capacity. 利用人工免疫具有自适应以及免疫学习能力的特点,将人工免疫原理应用到木马检测中。
The term Backdoor describes a specific group of Trojan Horses. 任期后门描述的一个特定群体,特洛伊木马程式。
Of course, there may be a time when you were malicious access to your computer intrusion, and placed a Trojan horse. 当然,还有一种可能是当你上网时被人恶意侵入了你的计算机,并放置了木马程序。
You mean send a virus or a Trojan horse? 你是说发送个病毒或是特洛伊木马进去?
I don't want to see another Trojan die because of me. 我不想看见特洛伊人再为我送命了。
Trojan horse attacking strategy on quantum cryptography is investigated. 研究了特洛伊木马对量子密码算法的攻击。
Is it a virus, a worm, a Trojan, or a backdoor? 判断任何任意的程序是一个病毒、蠕虫、木马,还是后门?
This floppy disk has trojan virus, which must be killed first. 这个软盘带有木马病毒,必须先杀毒。
This paper introduces the port scan and Trojan horse detection model pieces in it. 这里主要介绍其中的端口扫描和木马检测两个模块。
Establishment of a model system to the detection and defence against the Trojan horses based on the artifical immunology. 提出了一个基于人工免疫机制的木马检测与防御模型。
Through studying techniques of the Trojan and anti-Trojan, this paper presents the Trojan-detection technology based on behavioral analysis. 本文通过对木马及木马检测技术的研究,提出了基于行为分析的木马检测技术。
This article discusses the work principles and attack technology and defending policies on Trojan Horse. 本文介绍了木马的攻击原理、常用攻击技术以及防范策略。
They were defeated because of the Trojan horses in their country. 他们被打败了,因为他们的国家出现了奸细。
I simulate what a virus, trojan, or other malicious program can do to your computer. i模拟什么病毒,特洛伊木马病毒或其他恶意程式可以做你的电脑。
Nothing will slow your system down like a virus, a Trojan horse, or other types of malware. 没有任何东西比病毒,特洛伊木马或者其他恶意软件更能减慢你系统速度的了。
Research of Trojan Detection System Based on Artificial Immune 人工免疫机制在木马检测系统中的应用研究
There is no evidence of a Trojan horse on your system. 在您的系统中没有发现木马。
This paper introduces the Trojan horse and its damage to computer system, and advances some methods and defensive measures for killing the Trojan horse. 介绍了木马病毒及其对计算机系统的危害性,提出了几种查杀木马病毒的方法和防御措施。
In the case of networks used as spamming platforms, a Trojan proxy server will penetrate the victim machines. 在作为垃圾邮件平台使用网络情况下,木马代理服务器将渗透到受害者的电脑。
Key Technology of Linux Trojan Horse Linux特洛伊木马关键技术研究
Antispyware XP2009 is distributed via different online security scanners, Trojan horses, misleading sites, malicious software. 反间谍XP的2009年是通过不同的分布式网络安全扫描,木马,误导性网站,恶意软件。
This Trojan allows attackers to access your computer, stealing passwords and personal data. 这个木马运行攻击者访问你的计算机,窃取密码和个人数据。
Do not take your Trojan, challenging my password. 别拿你的木马,挑战我的密码。
Covert channels and Trojan code. 隐藏的通道和特洛伊编码。
For example, viruses, worms, and Trojan horses are malicious software. 例如,病毒、蠕虫以及特洛伊木马都属于恶意软件。