木馬程序 的英文怎麼說
中文拼音 [mùmǎchéngxù]
木馬程序
英文
trojan horse- 木 : Ⅰ名詞1 (樹木) tree 2 (木頭) timber; wood 3 (棺材) coffin 4 (姓氏) a surname Ⅱ形容詞1 (木...
- 馬 : Ⅰ名詞1 [動物學] (哺乳動物) horse 2 (象棋棋子) horse one of the pieces in chinese chess3 (姓...
- 程 : 名詞1 (規章; 法式) rule; regulation 2 (進度; 程序) order; procedure 3 (路途; 一段路) journe...
- 木馬 : 1. [體育] vaulting horse; pommelled horse2. (像馬的兒童玩具) hobbyhorse; rocking horse
- 程序 : 1 (進行次序) order; procedure; course; sequence; schedule; ground rule; routing process 2 [自動...
-
Is it a virus, a worm, a trojan, or a backdoor
判斷任何任意的程序是一個病毒、蠕蟲、木馬,還是后門?Latest trojan in the block : supports sin, both ways connection, lan bypass, very small server created by builder. keylogger, filemanager, funstuff, flipper, undetected for now
簡介:一個少見的,服務端很小的木馬程序,可以穿過防火墻, 2種連接方式,鍵盤記錄,文件管理,開玩笑的功能,不能被查殺。Do not download this program - it is a trojan and has a keylogger hidden within it. you will not receive any payments by downloading this file
不要下載該程序- -它是一個木馬,並且還內含鍵盤監控機制在里頭,下載該文件你不會得到任何支付的。Keystroke loggers or trojan viruses are disabled and prevented from recording keystrokes as users input their passwords
當用啟輸入口令時,按鍵記錄程序或木馬病毒被禁用並防止記錄擊鍵。The analysis of the concealing technology of trojan - horse
特洛伊木馬程序隱藏技術分析Understanding of viruses, worms, trojans
了解病毒、蠕蟲程序和特洛伊木馬When activated, the trojan deletes all applications on the device
當激活它時,這個特洛伊木馬會刪除設備上所有應用程序。The ads were delivered by " spyware " that the user had unwittingly installed
那些廣告是用戶在不知情的情況下安裝的「木馬程序」鼓搗出來的。Hackers often use trojan - horse programs to break into computer systems
駭客們常用木馬程序來入侵計算機系統。According to the techniques the trojan horses can be called as neither good nor evil
從技術的本身來說,木馬程序並無所謂好壞正邪。This is a trojan that downloads and executes other program from the internet
大意是,這是一個從網際網路上下載並運行其他程序的木馬程序。Then a trojan horse utility program is designed and implemented for the business of the nsa ( national security affairs )
在此基礎上,結合工作實際,編寫了一個實際的木馬程序。Computer program hidden in another computer program with the purpose of ? destroying software or collecting information about the use of the computer
它是一個破壞計算機軟體和竊取計算機用戶的計算機木馬程序。Completely blocking hacker attacks, trojans and other network risks, the protection of the internet account, qq passwords, online account information such as not being stolen
徹底阻擋黑客攻擊、木馬程序等網路危險,保護上網帳號、 qq密碼、網游帳號等信息不被竊取。It is a smaller program with some powerful functionality. it can pass through the trojan horse tool check, bypass the blocking by firewalls and routers, and be rebooted and removed. it is really concealable and secret, and the controller subprogram is reliable and robust
這個木馬程序的程序體小,實現的功能多,能躲過多種查殺木馬軟體的查殺,繞過各種防火墻、路由器的堵截,以及按需要啟動和消亡等,真正達到了隱蔽、秘密,受控端程序可靠性、健壯性等。Currently, security protocol is a hot research field in network security and has a very important effect for guarantee the network security. but, if the information has been displaced or modified by virus and trojan horse before encryption in that the transmitted information is invalid although the protocol is secure
安全協議是當前網路安全領域的研究熱點,在保障網路安全方面起著重要的作用,但是如果信息在加密前被病毒、木馬程序替換或者篡改了,這樣雖然協議本身是安全的但是傳輸的信息已經失效。Jiangmin firewall ( new ) is a solution for individual users of internet security and network security protection design tools, product integration, advanced dynamic network access control technologies, and thoroughly resolve hacker attacks, trojans and viruses and other internet networks dangerous invasion, the comprehensive protection of personal internet security
江民防火墻(新)是一款專為解決個人用戶上網安全而設計的網路安全防護工具,產品融入了先進的網路訪問動態監控技術,徹底解決黑客攻擊、木馬程序及網際網路病毒等各種網路危險的入侵,全面保護個人上網安全。It s important to know that a trojan horse is malware that will masquerade as valid system code, but when activated can harm your system
了解「特洛伊木馬」程序是一種偽裝成有效系統代碼的惡意軟體,但被激活時可能損害您的系統,這一點很重要。Public security mechanism discovers, the bank on date of zhang of the bank on the net that the near future has illegal element to steal investor beforehand through trojan program and net counts word certificate, log onto account of the bank on its net through internet next, its fund has redemptive operation ( zhang ) arrives after 3 days, be in redemptive capital uses redemptive capital move to do him to use after 3 days
公安機關發現,近期有不法分子通過木馬程序事先盜竊投資者的網上銀行賬號和網上銀行數字證書,然後通過網際網路登錄其網上銀行賬戶,將其基金進行贖回操作(三天後到賬) ,並在贖回資金三天後使用贖回資金挪做他用。Via police investigation analysis, the bank on date of zhang of the bank on the net that illegal element steals lin mou probably beforehand through trojan program and net counts word certificate, account of the bank on its net logins through internet after, its fund has redemptive operation, be in redemptive capital uses redemptive capital to be used at buying network game to nod card to wait after 3 days
經警方調查分析,不法分子很可能通過木馬程序事先盜竊林某的網上銀行賬號和網上銀行數字證書,后通過網際網路登錄其網上銀行賬戶,將其基金進行贖回操作,並在贖回資金三天後使用贖回資金用於購買網路游戲點卡等。分享友人