蠕蟲病 的英文怎麼說

中文拼音 [chóngbìng]
蠕蟲病 英文
helminthiasis
  • : 動詞(蠕動) wriggle; squirm
  • : 名詞1. (蟲子) insect; worm 2. (姓氏) a surname
  • : Ⅰ名詞1 (疾病; 失去健康的狀態) illness; sickness; disease; malum; nosema; malady; morbus; vitium...
  • 蠕蟲 : worm; helminth蠕蟲感染 invermination; 蠕蟲學 helminthology; scolecology; 蠕蟲藥 wormer
  1. Indications : for the treatment of the hookworm infection, ascariasis. enterbiasis and strongyloides sterocoralis infection etc

    適應癥:適用於蛔、鉤和糞類圓線等感染,對絲亦有一定療效。
  2. Is it a virus, a worm, a trojan, or a backdoor

    判斷任何任意的程序是一個毒、、木馬,還是后門?
  3. Design and implementation of honeypot system of automatic capture of worm

    蜜罐自動捕獲蠕蟲病毒的設計和實現
  4. The outlook 98 e - mail security update provides protection from most e - mail viruses, such as the iloveyou and melissa viruses, as well as other viruses that spread themselves through e - mail, or worm viruses that can replicate through outlook

    Outlook 98電子郵件安全性更新防止大多數毒的入侵,比如「愛」 iloveyou和「梅麗莎」 melissa毒,以及其它各種通過電子郵件傳播的毒,或能通過outlook進行復制的蠕蟲病毒。
  5. And the outlook 98 e - mail security update. this security update provides protection from most viruses, such as the goner, iloveyou, and melissa viruses, as well as other viruses that spread themselves through e - mail, or worm viruses that can replicate through outlook

    此安全性更新防止大多數毒的入侵,比如」將死者「 ( goner ) 、 「愛」 ( iloveyou )和「梅麗莎」 ( melissa )毒,以及其它各種通過電子郵件傳播的毒,或能通過outlook進行復制的蠕蟲病毒。
  6. This course is all about understanding : understanding what ' s going on inside your computer when you flip on the switch, why tech support has you constantly rebooting your computer, how everything you do on the internet can be watched by others, and how your computer can become infected with a worm just by turning it on

    本課程的主要目的在於「了解」 :了解當打開計算機時你的計算機里在發生什麼,為什麼技術支援人員經常叫你重新啟動計算機,在網際網路上做的事情是怎麼被其他人看到的,以及當計算機只是開著沒作事,蠕蟲病毒是如何侵入的?
  7. Reexamination of specific antibodies in sera of cystic echinococccosis patients with igg negative seroresponse

    檢測蠕蟲病患者血清抗體的實驗研究
  8. As late as the 19th century it was given as a treatment for worms, coughs, colds, sore throats, asthma, indigestion, bad breath, gum disease, and gonorrhea

    十九世紀的時候,它是用作治療蠕蟲病,咳嗽,傷風,咽喉疼痛,哮喘,消化不良,呼吸不暢,齒齦疾和淋
  9. A variant on the virus is the worm

    毒的一個變種是蠕蟲病毒。
  10. W32. fujacks. e is a worm that spreads by copying itself to network shares protected by weak passwords

    E是一種蠕蟲病毒傳播復制自己,以網路股的保護弱密碼。
  11. Note : sql server 2000 evaluation edition release a contains an update that protects against the slammer worm

    說明: sql server 2000評估版版本a包含抵禦slammer蠕蟲病毒攻擊的更新程序。
  12. If the new worm spreads as quickly as last week ' s code red outbreak, hundreds of thousands of web sites could be left open to computer hackers

    如果這種新的蠕蟲病毒的傳播速度像「紅色代碼」一樣快,成千上萬的網站將在「黑客」的攻擊下失去全部防禦力。
  13. In recent years, the computer virus has made an tremendous damage to the companies in the world. in contrast, the investment is too little from enough

    但是,在網路威脅越來越嚴重的今天,隨著一輪又一輪大規模蠕蟲病毒的瘋狂發作,企業老總們對企業的安全防範紛紛加以重視。
  14. Internet service america online said it blocked 23. 2 million copies of the worm from reaching its customers and an e - mail security provider said it quarantined 3. 5 million copies

    美國在線郵件服務商表示已經阻擋了23200萬封蠕蟲病毒郵件,某郵件安全提供商也表示已隔離3500萬封復制郵件。
  15. The specific nature of the security hole, such as whether it makes the vulnerable to outsiders or allows virus - like code to enter the operating system, was not made clear

    上述安全漏洞的性質,諸如其是否會導致計算機易受外部攻擊,或是使得諸如蠕蟲病毒的代碼進入操作系統,現在還不得而知。
  16. In the united states, internet and e - mail service providers were blocking the worm in record numbers, while others were getting through to an untold number of unprotected computer users

    美國的網路和郵件服務商正在過慮記錄在案的蠕蟲病毒,然而有些毒卻躲過阻擋使不計其數的未受保護計算機受到感染。
  17. A deep packet inspection engine will enable the asic to quickly inspect packet payloads to identify potential security threats, such as worms, that would pass through existing firewall solutions unchecked

    高級的包偵測引擎將能夠使asic快速偵測包的有效載荷以便識別潛在的安全威脅,例如現在那些將通過防火墻而不能阻止的蠕蟲病毒信息包。
  18. As the growth of the internet popularize intensity, network traffic anomalies, which are caused by network attacks, worm virus, malicious download, equipment failure, etc, increasingly impact the network performance, some unusual offensive flow disrupts the normal operation of the network order, poses a serious threat to network security. in such situations, how to detect the network traffic anomalies accurately and in time, ensure the normal operation of the network, provide users with a good network environment, become a topic of concern

    但是隨著網路的普及程度越來越高,由網路攻擊、蠕蟲病毒、惡意下載、設備異常等因素導致的網路流量異常對網路性能的影響越來越大,某些帶有攻擊性的異常流量干擾了正常的網路運行秩序,對網路安全造成了嚴重威脅。在這種情況下,如何及時而準確的檢測出網路流量異常,保證網路的正常運行,為用戶提供一個良好的網路環境成為一個備受關注的研究課題。
  19. In this article, i describe ways that computer code can help eliminate unsolicited commercial e - mail, viruses, trojans, and worms, as well as frauds perpetrated electronically and other undesired and troublesome e - mail

    在本文中,我描述了幾種方法,這些方法用計算機代碼來幫助消除不請自來的商業性電子郵件、毒、特洛伊木馬和蠕蟲病毒以及懷有惡意的欺詐性電子郵件與其它一些不希望收到的和令人煩惱的電子郵件。
  20. In this paper, by studying the feature of the netflow data and the mib status of the network equipments, at the same time, in terms of analyzing the characteristics of network attack, worm spread, virus infection and network misuse behaviors, our work is based on the facts that most of the anomaly traffic in campus network has influences of the netflow data and network equipment status. an approach is present to assess the threats of the traffic in terms of five factors : the traffic bytes distribution, flow number distribution, packets number distribution, equipment cpu utilization and the memory utilization. the weight of each factor is computed and determined by fuzzy relation matrix 。 an prototype system is designed to test the method and the results are analyzed to evaluate the availability of our method

    本文研究了netflow流數據的特徵和網路設備運行狀態數據,分析了校園網網路異常攻擊、蠕蟲病毒和網路濫用行為的特點,基於大多數的網路流異常必然反映在網路網路流量數據特徵的變化以及網路設備運行狀態的改變這樣一個事實,提出了一套基於網路流量和網路設備運行狀態的異常威脅評估方法,確定了5種威脅評估因素:網路流帶寬分佈、網路流數量分佈、網路流包數量分佈、網路設備cpu利用率、網路設備內存利用率,並採用模糊關系矩陣方法計算和分配這5種評估因素在評估函數中的權重。
分享友人