木馬程式 的英文怎麼說

中文拼音 [chéngshì]
木馬程式 英文
trojan horse
  • : Ⅰ名詞1 (樹木) tree 2 (木頭) timber; wood 3 (棺材) coffin 4 (姓氏) a surname Ⅱ形容詞1 (木...
  • : Ⅰ名詞1 [動物學] (哺乳動物) horse 2 (象棋棋子) horse one of the pieces in chinese chess3 (姓...
  • : 名詞1 (規章; 法式) rule; regulation 2 (進度; 程序) order; procedure 3 (路途; 一段路) journe...
  • : 名詞1 (樣式) type; style 2 (格式) pattern; form 3 (儀式; 典禮) ceremony; ritual 4 (自然科...
  • 木馬 : 1. [體育] vaulting horse; pommelled horse2. (像馬的兒童玩具) hobbyhorse; rocking horse
  • 程式 : form; pattern; formula; modality
  1. The term backdoor describes a specific group of trojan horses

    任期后門描述的一個特定群體,特洛伊木馬程式
  2. There are three most commonly encountered malicious programs - computer viruses, trojan horses and logic bombs

    最常見的三種惡意為電腦病毒、特洛伊和邏輯炸彈。
  3. Internet banking frauds involving trojan horse programmes

    涉及特洛伊木馬程式的網上銀行騙案
  4. One form of trojan horse programme is able to capture keystrokes typed by the user and then transmit them covertly to the fraudster

    其中一種特洛伊木馬程式能記錄用戶在個人電腦所按的鍵,並將取得的資料秘密地傳送給騙徒。
  5. Latest trojan in the block : supports sin, both ways connection, lan bypass, very small server created by builder. keylogger, filemanager, funstuff, flipper, undetected for now

    簡介:一個少見的,服務端很小的序,可以穿過防火墻, 2種連接方,鍵盤記錄,文件管理,開玩笑的功能,不能被查殺。
  6. Press release : internet banking frauds involving trojan horse programmes

    新聞稿:涉及特洛伊木馬程式的網上銀行騙案
  7. The worm scans systems for the presence of the subseven trojan

    蠕蟲會在網路上掃描其他系統,找出一些受subseven木馬程式感染的系統。
  8. As a result the worm is able to upgrade itself or install other applications, such as trojans

    因此,它擁有自我升級或安裝其他應用的功能,例如木馬程式
  9. Since the worm contains the master password to the trojan, it infects the scanned systems if subseven are found

    由於它擁有這個木馬程式的密碼,因此它便可以感染安裝了subseven的系統。
  10. On non - russian nt - based systems, the worm drops a backdoor trojan file msstask. exe which is controlled by a cgi script from a website with address 209. 151. 250. 170

    在非俄語的nt操作系統上,蠕蟲會遺下一個木馬程式檔案msstask . exe ,這個是由209
  11. It is up to you to take precautions to ensure that whatever you select for your use is free of such items as viruses, worms, trojan horses and other items of a destructive nature

    您必須自行注意,以確保您所選擇使用的資料免於病毒bug木馬程式或其他破壞性入侵。
  12. Mr wong warned that a single virus attack could trigger bulk email spamming, causing widespread network congestion, or could embed trojan codes in " victim computers " that would allow backdoor cyber attacks in the future

    他提醒與會者,一次病毒襲擊可能引來大量垃圾電郵,導致嚴重的網路擠塞。病毒也可能把特洛依木馬程式植入受害電腦中,為日後的網上襲擊打開后門。
  13. The serious issue of computer software security will be explored in this programme. the programme goes on to discuss three forms of software attacks the virus, the trojan horse and the worm and demonstrates how the use of a firewall installed into a computer network can provide a good measure of protection

    電腦網路究竟有多安全?本節目會探討電腦軟體安全的嚴重性,以及電腦病毒木馬程式和蠕蟲攻擊軟體的方。另外,亦會介紹如何利用防火墻保護電腦網路。
  14. Lo, s. l., j. t. kuo, and s. m. wang, 1996, water quality monitoring network design of the keelung river, northern taiwan, water science and technology, vol. 34, no. 12, pp. 49 - 57

    陳昶憲、郭振泰、王寧本, 1997年, "復合支流斯金更洪水演算模之建立" ,中國土水利工學刊,已接受,編印中。
  15. W32. badtrans. 13312 @ mm is a mapi worm that replies to all unread mails in the microsoft outlook email message folders, and drops a backdoor trojan

    W32 . badtrans . 13312 @ mm是一種mapi蠕蟲,它會回覆所有在microsoftoutlook訊息資料夾內的未閱讀郵件和附加上后門特洛伊木馬程式( trojan ) 。
  16. Trojan horse is a remote control program based on " client / server " mode. after the trojan horse server running on user ' s pc, it can open a specifical port or connect with trojan horse client or do other actions

    「特洛伊」 ,是一種基於「客戶機服務器」模的遠控制序,它的服務器端序在用戶的計算機上運行后,可以打開特定的埠也可以與客戶機交互或是執行特定命令等等。
  17. The msrt has removed at least one backdoor trojan from approximately 3. 5 million unique computers

    Msrt已從大約350萬不同的電腦中,移除至少一種后門特洛伊木馬程式
分享友人