木馬病毒 的英文怎麼說

中文拼音 [bìng]
木馬病毒 英文
trojan horse
  • : Ⅰ名詞1 (樹木) tree 2 (木頭) timber; wood 3 (棺材) coffin 4 (姓氏) a surname Ⅱ形容詞1 (木...
  • : Ⅰ名詞1 [動物學] (哺乳動物) horse 2 (象棋棋子) horse one of the pieces in chinese chess3 (姓...
  • : Ⅰ名詞1 (疾病; 失去健康的狀態) illness; sickness; disease; malum; nosema; malady; morbus; vitium...
  • : Ⅰ名詞1 (對生物體有害的性質或物質; 毒物) poison; toxin 2 (毒品) drug; narcotics 3 (姓氏) a s...
  • 木馬 : 1. [體育] vaulting horse; pommelled horse2. (像馬的兒童玩具) hobbyhorse; rocking horse
  • 病毒 : [醫學] virus; inframicrobe (濾過性)
  1. Is it a virus, a worm, a trojan, or a backdoor

    判斷任何任意的程序是一個、蠕蟲、,還是后門?
  2. There are three most commonly encountered malicious programs - computer viruses, trojan horses and logic bombs

    最常見的三種惡意程式為電腦、特洛伊和邏輯炸彈。
  3. Recognizes new and unknown trojans, worms and viruses ( zero - day attacks ), without daily updates

    辨別最新和未知,蠕蟲以及( 0日攻擊) ,不需要升級。
  4. It has been proven that 3rd party tools are found to contain trojan viruses and keyloggers to steal your account information to hack your account

    現在已經發現一些第三方插件里含有木馬病毒和鍵盤記錄類,它們會竊取你的帳號信息從而盜號。
  5. Keystroke loggers or trojan viruses are disabled and prevented from recording keystrokes as users input their passwords

    當用啟輸入口令時,按鍵記錄程序或木馬病毒被禁用並防止記錄擊鍵。
  6. Trojan virus, like a trojan horse, is a program that appears safe - - but smuggles in a worm or virus

    特洛伊,就跟特洛伊一樣,看上去安全? ?其實暗藏「殺機」 。
  7. Understanding of viruses, worms, trojans

    了解、蠕蟲程序和特洛伊
  8. Is it a virus, a worm, a trojan

    「它是,蠕蟲還是特洛伊? 」
  9. What is a trojan horse

    特洛依木馬病毒是什麼?
  10. Antivirus software - computer virus, worm and trojan protection by alwil software

    軟體- alwil software提供計算機,網蟲和木馬病毒防護
  11. It provides strong protection against all kinds of viruses, worms, backdoors, trojan horses and other kinds of malicious code

    它能夠提供超強的防護對抗各種,網蟲,后門木馬病毒和其他種類的惡意代碼
  12. Sister hibiscus ' photos have also been reported to carry a trojan horse virus, so anyone downloading her image might also get a nasty surprise on their hard drive

    芙蓉姐姐的照片也被報告攜帶有特洛依木馬病毒,所以任何人在努力下載她的圖片時可能也同時會得到一份下流的威脅。
  13. In be used actually, should often reduplicative installs a system, will prevent and cure virus, after allegedly a lot of trojan virus add case, won ' t be killed poisonous software identifies, have continual redo system only

    在實際使用中,要經常重復的安裝系統,來防治,據說有很多的木馬病毒加殼后就不會被殺軟體識別,只有不斷的重做系統。
  14. These are the friends, relatives, and guildmates you may know who have gone through the experience of having characters, gold, and items stripped from them after visiting a website or opening a file containing a trojan virus

    也許你的親朋好友和游戲同伴中就有人有這樣的經歷,在訪問了某個網站或是打開了某個文件之後,由於含有木馬病毒,結果游戲角色、金幣,或是物品被盜。
  15. It is up to you to take precautions to ensure that whatever you select for your use is free of such items as viruses, worms, trojan horses and other items of a destructive nature

    您必須自行注意,以確保您所選擇使用的資料免於bug程式或其他破壞性入侵。
  16. Mr wong warned that a single virus attack could trigger bulk email spamming, causing widespread network congestion, or could embed trojan codes in " victim computers " that would allow backdoor cyber attacks in the future

    他提醒與會者,一次襲擊可能引來大量垃圾電郵,導致嚴重的網路擠塞。也可能把特洛依程式植入受害電腦中,為日後的網上襲擊打開后門。
  17. The serious issue of computer software security will be explored in this programme. the programme goes on to discuss three forms of software attacks the virus, the trojan horse and the worm and demonstrates how the use of a firewall installed into a computer network can provide a good measure of protection

    電腦網路究竟有多安全?本節目會探討電腦軟體安全的嚴重性,以及電腦程式和蠕蟲攻擊軟體的方式。另外,亦會介紹如何利用防火墻保護電腦網路。
  18. Currently, security protocol is a hot research field in network security and has a very important effect for guarantee the network security. but, if the information has been displaced or modified by virus and trojan horse before encryption in that the transmitted information is invalid although the protocol is secure

    安全協議是當前網路安全領域的研究熱點,在保障網路安全方面起著重要的作用,但是如果信息在加密前被程序替換或者篡改了,這樣雖然協議本身是安全的但是傳輸的信息已經失效。
  19. The antivirus module automatically scans all incoming email attachments for viruses, worms and trojans

    模組自動掃描所有傳入郵件附件的,網蟲和
  20. All the samples with typical potato spindle tuber viroid ( pstvd ) symptoms collected from the fields in the northeast region of china were detected by the r - page method. the positive samples were verified. then, two - dimensional page and rt - pcr techniques were adapted in deleting pstvd

    對采自中國東北佳斯、大慶等地區具有典型鈴薯紡錘塊莖類( pstvd )癥狀的薯塊樣品進行往返電泳( r - page ) ,確定含鈴薯紡錘塊莖類的陽性樣品。
分享友人