有蠕蟲的 的英文怎麼說

中文拼音 [yǒuchóngde]
有蠕蟲的 英文
wormy
  • : 有副詞[書面語] (表示整數之外再加零數): 30 有 5 thirty-five; 10 有 5年 fifteen years
  • : 動詞(蠕動) wriggle; squirm
  • : 名詞1. (蟲子) insect; worm 2. (姓氏) a surname
  • : 4次方是 The fourth power of 2 is direction
  • 蠕蟲 : worm; helminth蠕蟲感染 invermination; 蠕蟲學 helminthology; scolecology; 蠕蟲藥 wormer
  1. It can be found in the cell walls of fungi and the exoskeletons of shellfish, plankton and insects, along with insect egg cases and the powerful grinders and rigid walls in the pharynx of worms

    同樣見于真菌細胞壁和甲殼類動物、浮游生物和昆外骨架,多見于昆卵鞘和咽部硬管壁和強研磨器官。
  2. Therefore, it became a pressing work to enforce worm containment in large scale networks

    如何效地遏制在大規模網路中傳播成為非常迫切問題。
  3. They discover that they have a telepathic worm connected to a life support system

    他們發現一個精神感應依附著生命維持系統在裏面。
  4. An epidemic model of friendly worm counter - attacking network worm is proposed based on two - factor model, with the conditions that the machine number of the network is fixed during propagation

    這對于基於主動擴散良性主動對抗惡性一定指導意義。其次,研究基於ascm模型良性主動擴散演算法。
  5. So far, no reports have been received from government departments on the infection of the worm

    資訊科技署至今未接獲政府部門受這感染報告。
  6. The characteristic of anomaly traffics is that it breaks out without any omen and can destroy networks and computers in a short time ( for instance, the outburst of traffic behavior caused by specific attack programs or worm burst ). therefore, to detect anomaly rapidly and accurately is one of the precondition of ensuring the efficient network operation and detection of anomalous traffic has become the attractive and valuable subject in the present academic and industrial circles

    異常流量特點是發作突然,先兆特徵未知,可以在短時間內給網路或網路上計算機帶來極大危害(例如由特定攻擊程序或爆發所引起突發流量行為) ,因此準確、快速地檢測網路流量異常行為,並做出合理響應是保證網路效運行前提之一,也是目前學術界和工業界共同關注前沿課題之一。
  7. Battalion : " additional crates of heavy ordinance with radio locators are being dropped. retrieve ordinance and neutralize the worm.

    指揮部: 「增加重武器物資箱正在空投,他們都帶無線定位器。回收物資並消滅。 」
  8. Adding some soil with worms in it can also help

    加一些有蠕蟲的土壤也助於加快速度。
  9. The serious issue of computer software security will be explored in this programme. the programme goes on to discuss three forms of software attacks the virus, the trojan horse and the worm and demonstrates how the use of a firewall installed into a computer network can provide a good measure of protection

    電腦網路究竟多安全?本節目會探討電腦軟體安全嚴重性,以及電腦病毒木馬程式和攻擊軟體方式。另外,亦會介紹如何利用防火墻保護電腦網路。
  10. Something, such as the thread of a screw or the spiral condenser in a still, that resembles a worm in form or appearance

    螺紋狀物品某物,如螺旋線或蒸餾器螺旋冷凝器,在構成或外表上像
  11. You may also visit hong kong computer emergency response team coordination centre for more details

    關此更多詳情,請瀏覽香港電腦保安事故協調中心。
  12. Therefore, it is consequently reasonable to conclude that the statistics and classification of network access will certainly help the detection of worm efficiently. the behavior of user was analyzed, we proposed a new approach to

    因而,對用戶訪問目進行統計分類,並建立用戶訪問目列表,則在發作時則能及時發現
  13. It sends a message with a link to itself to all recipients listed in the outlook contacts folder

    它會傳送一段含程式電郵至outlook地址薄上所連絡人。
  14. In the united states, internet and e - mail service providers were blocking the worm in record numbers, while others were getting through to an untold number of unprotected computer users

    美國網路和郵件服務商正在過慮記錄在案病毒,然而些病毒卻躲過阻擋使不計其數未受保護計算機受到感染。
  15. A deep packet inspection engine will enable the asic to quickly inspect packet payloads to identify potential security threats, such as worms, that would pass through existing firewall solutions unchecked

    高級包偵測引擎將能夠使asic快速偵測包效載荷以便識別潛在安全威脅,例如現在那些將通過防火墻而不能阻止病毒信息包。
  16. W32. badtrans. 13312 @ mm is a mapi worm that replies to all unread mails in the microsoft outlook email message folders, and drops a backdoor trojan

    W32 . badtrans . 13312 @ mm是一種mapi,它會回覆所在microsoftoutlook訊息資料夾內未閱讀郵件和附加上后門特洛伊木馬程式( trojan ) 。
  17. Post or transmit any information or software which contains any virus, trojan horse, worm or other harmful component

    發帖或者傳輸含任何病毒、欺騙程序、或者其他害成分任何資訊或者軟體;
  18. The paper introduces the definition of worm according to the history of worm, analyses the worm ’ s function module, attacking mode, scanning regulation and the typical worm - sasser, then brings forward a worm - detecting algorithm based on packet statistics, by analyzing the detecting algorithm in existence

    本文結合發展歷史提出了定義,分析了功能結構,攻擊手段,掃描策略,並對sasser進行了剖析。簡述了現檢測演算法,並分析了其優缺點,提出了基於數據包統計檢測演算法。
  19. Analyzing worm ’ s scanning stage, we find that worm ’ s spreading speed is closely related to network scale. the sem is aimed and analyzed deep, based on the model analysis, we do the quarantine work by dividing a large - scale network and perform the quarantine on the border

    並以sem ( simpleepidemicmodel )模型為主要對象,對模型進行了深入研究,在此基礎上,提出了對網路進行分割以減小網路規模,在劃分邊界上對進行隔離,從而在大規模網路上抑制傳播。
  20. But one thing should be considered : when the original email server needs the clients to authenticate themselves ( this is called smtp authentication, and it is becoming a must to many of the isps ), the deployment of msg shall not break this authentication session between the client and server

    我們採用了郵件網關( msgmailshieldgateway )方式提供對郵件病毒和查殺。當原郵件服務器需要客戶認證時, msg必需保證原郵件服務器和郵件客戶端之間認證通信不受影響。
分享友人