木馬程序 的英文怎麼說

中文拼音 [chéng]
木馬程序 英文
trojan horse
  • : Ⅰ名詞1 (樹木) tree 2 (木頭) timber; wood 3 (棺材) coffin 4 (姓氏) a surname Ⅱ形容詞1 (木...
  • : Ⅰ名詞1 [動物學] (哺乳動物) horse 2 (象棋棋子) horse one of the pieces in chinese chess3 (姓...
  • : 名詞1 (規章; 法式) rule; regulation 2 (進度; 程序) order; procedure 3 (路途; 一段路) journe...
  • 木馬 : 1. [體育] vaulting horse; pommelled horse2. (像馬的兒童玩具) hobbyhorse; rocking horse
  • 程序 : 1 (進行次序) order; procedure; course; sequence; schedule; ground rule; routing process 2 [自動...
  1. Is it a virus, a worm, a trojan, or a backdoor

    判斷任何任意的是一個病毒、蠕蟲、,還是后門?
  2. Latest trojan in the block : supports sin, both ways connection, lan bypass, very small server created by builder. keylogger, filemanager, funstuff, flipper, undetected for now

    簡介:一個少見的,服務端很小的木馬程序,可以穿過防火墻, 2種連接方式,鍵盤記錄,文件管理,開玩笑的功能,不能被查殺。
  3. Do not download this program - it is a trojan and has a keylogger hidden within it. you will not receive any payments by downloading this file

    不要下載該- -它是一個,並且還內含鍵盤監控機制在里頭,下載該文件你不會得到任何支付的。
  4. Keystroke loggers or trojan viruses are disabled and prevented from recording keystrokes as users input their passwords

    當用啟輸入口令時,按鍵記錄病毒被禁用並防止記錄擊鍵。
  5. The analysis of the concealing technology of trojan - horse

    特洛伊木馬程序隱藏技術分析
  6. Understanding of viruses, worms, trojans

    了解病毒、蠕蟲和特洛伊
  7. When activated, the trojan deletes all applications on the device

    當激活它時,這個特洛伊會刪除設備上所有應用
  8. The ads were delivered by " spyware " that the user had unwittingly installed

    那些廣告是用戶在不知情的情況下安裝的「木馬程序」鼓搗出來的。
  9. Hackers often use trojan - horse programs to break into computer systems

    駭客們常用木馬程序來入侵計算機系統。
  10. According to the techniques the trojan horses can be called as neither good nor evil

    從技術的本身來說,木馬程序並無所謂好壞正邪。
  11. This is a trojan that downloads and executes other program from the internet

    大意是,這是一個從網際網路上下載並運行其他木馬程序
  12. Then a trojan horse utility program is designed and implemented for the business of the nsa ( national security affairs )

    在此基礎上,結合工作實際,編寫了一個實際的木馬程序
  13. Computer program hidden in another computer program with the purpose of ? destroying software or collecting information about the use of the computer

    它是一個破壞計算機軟體和竊取計算機用戶的計算機木馬程序
  14. Completely blocking hacker attacks, trojans and other network risks, the protection of the internet account, qq passwords, online account information such as not being stolen

    徹底阻擋黑客攻擊、木馬程序等網路危險,保護上網帳號、 qq密碼、網游帳號等信息不被竊取。
  15. It is a smaller program with some powerful functionality. it can pass through the trojan horse tool check, bypass the blocking by firewalls and routers, and be rebooted and removed. it is really concealable and secret, and the controller subprogram is reliable and robust

    這個木馬程序體小,實現的功能多,能躲過多種查殺軟體的查殺,繞過各種防火墻、路由器的堵截,以及按需要啟動和消亡等,真正達到了隱蔽、秘密,受控端可靠性、健壯性等。
  16. Currently, security protocol is a hot research field in network security and has a very important effect for guarantee the network security. but, if the information has been displaced or modified by virus and trojan horse before encryption in that the transmitted information is invalid although the protocol is secure

    安全協議是當前網路安全領域的研究熱點,在保障網路安全方面起著重要的作用,但是如果信息在加密前被病毒、木馬程序替換或者篡改了,這樣雖然協議本身是安全的但是傳輸的信息已經失效。
  17. Jiangmin firewall ( new ) is a solution for individual users of internet security and network security protection design tools, product integration, advanced dynamic network access control technologies, and thoroughly resolve hacker attacks, trojans and viruses and other internet networks dangerous invasion, the comprehensive protection of personal internet security

    江民防火墻(新)是一款專為解決個人用戶上網安全而設計的網路安全防護工具,產品融入了先進的網路訪問動態監控技術,徹底解決黑客攻擊、木馬程序及網際網路病毒等各種網路危險的入侵,全面保護個人上網安全。
  18. It s important to know that a trojan horse is malware that will masquerade as valid system code, but when activated can harm your system

    了解「特洛伊是一種偽裝成有效系統代碼的惡意軟體,但被激活時可能損害您的系統,這一點很重要。
  19. Public security mechanism discovers, the bank on date of zhang of the bank on the net that the near future has illegal element to steal investor beforehand through trojan program and net counts word certificate, log onto account of the bank on its net through internet next, its fund has redemptive operation ( zhang ) arrives after 3 days, be in redemptive capital uses redemptive capital move to do him to use after 3 days

    公安機關發現,近期有不法分子通過木馬程序事先盜竊投資者的網上銀行賬號和網上銀行數字證書,然後通過網際網路登錄其網上銀行賬戶,將其基金進行贖回操作(三天後到賬) ,並在贖回資金三天後使用贖回資金挪做他用。
  20. Via police investigation analysis, the bank on date of zhang of the bank on the net that illegal element steals lin mou probably beforehand through trojan program and net counts word certificate, account of the bank on its net logins through internet after, its fund has redemptive operation, be in redemptive capital uses redemptive capital to be used at buying network game to nod card to wait after 3 days

    經警方調查分析,不法分子很可能通過木馬程序事先盜竊林某的網上銀行賬號和網上銀行數字證書,后通過網際網路登錄其網上銀行賬戶,將其基金進行贖回操作,並在贖回資金三天後使用贖回資金用於購買網路游戲點卡等。
分享友人