蠕蟲的 的英文怎麼說

中文拼音 [chóngde]
蠕蟲的 英文
helminthic
  • : 動詞(蠕動) wriggle; squirm
  • : 名詞1. (蟲子) insect; worm 2. (姓氏) a surname
  • : 4次方是 The fourth power of 2 is direction
  • 蠕蟲 : worm; helminth蠕蟲感染 invermination; 蠕蟲學 helminthology; scolecology; 蠕蟲藥 wormer
  1. But microsoft removed a link between the targeted page, which was actually an incorrect address, and the rest of its website in an effort to fend off the attack

    但是,微軟公司移開了真正想要攻擊一些連接,事實上,攻擊網點都是微軟提供假地址,假網點.而其他微軟網站都成功避開蠕蟲的攻擊
  2. Adding some soil with worms in it can also help

    加一些有蠕蟲的土壤也有助於加快速度。
  3. An agent used to kill worms

    劑用來殺蠕蟲的一種藥劑
  4. Superficial view on methods of defending the computer worm

    淺談防範計算機蠕蟲的一些方法
  5. Many children also suffer from worms

    許多孩子都遭受蠕蟲的危害。
  6. Fig. 5 the proportion of infected machines re - detected

    始檢測到感染蠕蟲的計算機中80 %被清除。
  7. Experimental research on treatment of waste water from a coking plant by swollen graphite

    膨脹石墨蠕蟲的紅外衰減性能研究
  8. The average time it take until an ip address is targeted by a worm

    ,即某個ip地址成為某個蠕蟲的目標之前所經歷平均時間。
  9. Firstly, we have a review of the internet worm history, and propose the definition of friendly worm

    首先給出良性蠕蟲的定義、功能結構以及工作機制。
  10. You may also visit hong kong computer emergency response team coordination centre for more details

    有關此蠕蟲的更多詳情,請瀏覽香港電腦保安事故協調中心。
  11. Msg to avs : the first av who detect this worm will be the first killed in the next 24hours ! !

    翻譯:最先偵測到這個蠕蟲的反病毒者將會在以後24小時之內被幹掉! !
  12. By combining spreading models, population data extracted from real internet worm epidemics, and measured models of internet topology, we have shown that any reactive worm defense will require extremely widespread deployment and very short reaction times ( a few minutes or less )

    通過結合傳播模式、數量等從實際網際網路蠕蟲的傳播得來數據,以及對網際網路拓撲結構測量,發現任何反應式防禦需要廣泛部署和非常短反應時間(即分鐘或更少) 。
  13. The worm author can then use this worm extension to start denial of service ( dos ) attacks on irc channels, servers andor users connected to the same irc channel as the infected user

    蠕蟲的創造者能夠利用這附加功能來進行阻斷服務( denialofservice )攻擊irc頻道上在線機器,伺服器和或其他連接受感染使用者相同頻道使用者。
  14. The microscopic appearance of this vascular malformation reveals the dilated, tortuous, worm - like vascular channels. such lesions may bleed a small amount and be the cause for a seizure disorder

    血管畸形顯微鏡圖像顯示出擴張、扭曲、類蠕蟲的血管通道,這種病變可能只引起少量出血,還是癲癇發作一個原因。
  15. In this dissertation, we make comprehensive researches on network worm containment technologies based on active countermeasure

    本文針對這種情況對蠕蟲的主動防禦技術進行了深入研究。
  16. For example, donoghue says, it ' s possible scan the length of a tiny worm ' s digestive tract, determining the shape of its organs and the arrangement of its teeth

    例如,多納說,現在可以掃描細小蠕蟲的消化道,以確定它器官形狀與牙齒排列方式。
  17. The paper introduces the definition of worm according to the history of worm, analyses the worm ’ s function module, attacking mode, scanning regulation and the typical worm - sasser, then brings forward a worm - detecting algorithm based on packet statistics, by analyzing the detecting algorithm in existence

    本文結合發展歷史提出了蠕蟲的定義,分析了蠕蟲的功能結構,攻擊手段,掃描策略,並對sasser進行了剖析。簡述了現有檢測演算法,並分析了其優缺點,提出了基於數據包統計檢測演算法。
  18. All these observed results submit to software module through pci module as an important parameter to judge whether the host infects worm

    這些統計數據將通過pci模塊上傳給上層軟體作為判斷是否感染蠕蟲的一個重要指標。
  19. Analyzing worm ’ s scanning stage, we find that worm ’ s spreading speed is closely related to network scale. the sem is aimed and analyzed deep, based on the model analysis, we do the quarantine work by dividing a large - scale network and perform the quarantine on the border

    並以sem ( simpleepidemicmodel )模型為主要對象,對模型進行了深入研究,在此基礎上,提出了對網路進行分割以減小網路規模,在劃分邊界上對進行隔離,從而在大規模網路上有效抑制蠕蟲的傳播。
  20. But one thing should be considered : when the original email server needs the clients to authenticate themselves ( this is called smtp authentication, and it is becoming a must to many of the isps ), the deployment of msg shall not break this authentication session between the client and server

    我們採用了郵件網關( msgmailshieldgateway )方式提供對郵件病毒和蠕蟲的查殺。當原有郵件服務器需要客戶認證時, msg必需保證原有郵件服務器和郵件客戶端之間認證通信不受影響。
分享友人