trojans 中文意思是什麼

trojans 解釋
木馬程序
  1. The trojans can beat us so easily. how long before the hittites invade

    特洛伊人可以這么輕易地打敗我們西泰人的進犯也就不遠了
  2. When odysseus left ithaca to fight the trojans, he entrusted mentor, a good friend, with his home, lands and wealth

    當奧德賽離開伊薩卡跟特洛伊作戰時,他將他的家、土地和財產委託給一位好朋友曼托。
  3. Little jon reflected; venus was in his book about the greeks and trojans.

    小喬恩尋思一下;維納絲在那本關于希臘和特勞埃人戰爭的書里講到的。
  4. The trojans awoke from their dreams of peace to see their homes in flames.

    特洛伊人從恬靜的夢中醒來,看到他們的家宅在燃燒。
  5. The iliad makes it clear that destruction came upon troy because the trojans stole greek women.

    《伊利亞特》說得很明白,特洛伊城之所以被毀,原因是特洛伊人拐走了希臘的婦女。
  6. He is less likely to fight for us than trojans

    他比特洛伊人還不願意為我們作戰
  7. Fight me ! - the trojans have violated the agreement

    -和我打-特洛伊人違反了誓約
  8. Trojans. - with the young prince, paris. she

    -特洛伊人-跟小王子帕里斯,她
  9. Process is trying to register its copy as startup autorun object. this behaviour is typical of trojans

    進程試圖注冊它的副本為開機自動運行對象.這種行為是木馬的特徵
  10. Recognizes new and unknown trojans, worms and viruses ( zero - day attacks ), without daily updates

    辨別最新和未知木馬,蠕蟲以及病毒( 0日攻擊) ,不需要升級。
  11. Understanding of viruses, worms, trojans

    了解病毒、蠕蟲程序和特洛伊木馬
  12. - fight me ! - the trojans have violated the agreement

    -和我打-特洛伊人違反了誓約
  13. As a result the worm is able to upgrade itself or install other applications, such as trojans

    因此,它擁有自我升級或安裝其他應用程式的功能,例如木馬程式。
  14. Completely blocking hacker attacks, trojans and other network risks, the protection of the internet account, qq passwords, online account information such as not being stolen

    徹底阻擋黑客攻擊、木馬程序等網路危險,保護上網帳號、 qq密碼、網游帳號等信息不被竊取。
  15. However, some asteroids, known as jupiter trojans, share the orbit of jupiter. they are located about 60 degrees from jupiter

    這些稱為特洛伊小行星的天體,會維持在木星前後約60度。
  16. The antivirus module automatically scans all incoming email attachments for viruses, worms and trojans

    殺毒模組自動掃描所有傳入郵件附件的病毒,網蟲和木馬
  17. This paper represented a new method to detect trojans using its auto - startup characteristic

    提出利用木馬的一個重要特徵自啟動特性時其進行監控。
  18. The scaremongers are not always wrong. the trojans should have listened to cassandra. but history shows that the scaremongers are usually wrong

    散播恐慌的人不一定總是錯的。特洛伊的人就本應該聽取(預言家)桑德拉的預言。可是歷史上偏偏總是那些散播恐慌的人出錯。
  19. In this article, i describe ways that computer code can help eliminate unsolicited commercial e - mail, viruses, trojans, and worms, as well as frauds perpetrated electronically and other undesired and troublesome e - mail

    在本文中,我描述了幾種方法,這些方法用計算機代碼來幫助消除不請自來的商業性電子郵件、病毒、特洛伊木馬和蠕蟲病毒以及懷有惡意的欺詐性電子郵件與其它一些不希望收到的和令人煩惱的電子郵件。
  20. Jiangmin firewall ( new ) is a solution for individual users of internet security and network security protection design tools, product integration, advanced dynamic network access control technologies, and thoroughly resolve hacker attacks, trojans and viruses and other internet networks dangerous invasion, the comprehensive protection of personal internet security

    江民防火墻(新)是一款專為解決個人用戶上網安全而設計的網路安全防護工具,產品融入了先進的網路訪問動態監控技術,徹底解決黑客攻擊、木馬程序及網際網路病毒等各種網路危險的入侵,全面保護個人上網安全。
分享友人