target computer 中文意思是什麼

target computer 解釋
結果程序計算機
  • target : n 靶子,標的;目標;(嘲笑等的)對象;笑柄 (for); (儲蓄,貿易等的)定額,指標;小羊的頸胸肉;...
  • computer : n. 1. 計算者。2. (電子)計算機;計量器。-ism 電子計算機主義〈認為電子計算機萬能等〉。-erite, -nik 計算機專家;計算機工作者。
  1. Check that all assemblies required by the application are installed on the target computer

    請檢查應用程序所需要的所有程序集是否都已安裝在目標計算機上。
  2. In the multitudinous intrusion event, the hacker often gain control of the target computer through exploiting essential system process, and leaves trojan horse or back door in the system after a successful intrusion, which provides a shortcut for next access. therefore the process detection for the exploited system process and the trojan horse is important topics in the intrusion detection field

    在眾多的入侵事件中,黑客往往通過感染關鍵系統進程獲得目標主機的系統權限,並在成功入侵后在目標主機留下木馬、后門作為下次入侵的捷徑,所以對這些受感染的系統進程以及木馬、后門進程進行檢測是入侵檢測技術研究的重要課題之一。
  3. You may also enter the target computer ' s ip address

    你也可以直接輸入目標電腦的ip地址。
  4. Describes how to specify the folder structure for a target computer

    描述如何為目標計算機指定文件夾結構。
  5. Explains how to control how a target computer reads and implements files based on file extensions

    說明如何控制目標計算機基於文件擴展名讀取和實現文件的方式。
  6. You can also create new folders on the target computer

    也可以在目標計算機上創建新文件夾。
  7. Describes how to determine if a file exists on a target computer

    描述如何確定目標計算機上是否存在某個文件。
  8. On the target computer, double - click the setup. exe file to run the installer

    在目標計算機上雙擊setup . exe文件運行安裝程序。
  9. Create a folder structure on the development computer that matches the folder structure to be used on the target computer

    在開發計算機上創建一個文件夾結構,讓其與將在目標計算機上使用的文件夾結構一致。
  10. If you have an uninterruptible power supply ( ups ) connected to your target computer, disconnect the connecting serial cable before running setup

    如果目標計算機與不間斷電源( ups )相連,那麼在運行安裝程序之前要切斷連接的串列電纜。
  11. The visual j launch condition checks for the visual j redistributable package on a target computer during the installation of your application

    Visual j #啟動條件在安裝應用程序時檢查目標計算機上是否有visual j #可再發行組件包。
  12. Run vcredist x86. exe on the target computer. this installs all visual c libraries as shared assemblies

    這將安裝所有visual c + +庫作為共享程序集。
  13. Ports scan also is the common way to search target computer by hackers

    埠掃描也是黑客搜集目標主機信息的一種常用方法。
  14. Add the exe and dll to the project and specify where they should be installed on the target computer from the

    將exe和dll添加到項目中並指定它們應在目標計算機上安裝的位置
  15. Add exe and dll to the project and specify where they should be installed on the target computer from the project

    將exe和dll添加到項目中並指定它們應在目標計算機上安裝的位置
  16. Before upgrading, if you have disk mirroring installed on your target computer, disable it before running setup

    在升級之前,如果目標計算機上安裝有磁盤鏡像,那麼在運行安裝程序之前要禁用它。
  17. Before performing a new installation, if you have disk mirroring installed on your target computer, disable it before running setup

    在執行全新安裝之前,如果目標計算機上安裝有磁盤鏡像,那麼在運行安裝程序之前要禁用它。
  18. Allows you to specify and edit dialog boxes that are displayed during installation on a target computer

    使您可以指定和編輯安裝期間目標計算機上顯示的對話框。
  19. Explains how to specify actions for file associations on a target computer

    解釋如何為目標計算機上的文件關聯指定操作。
  20. Describes how to specify file associations for your application on a target computer

    描述如何為目標計算機上的應用程序指定文件關聯。
分享友人