隱病毒 的英文怎麼說

中文拼音 [yǐnbìng]
隱病毒 英文
cryptovirus
  • : Ⅰ動詞(隱瞞; 隱藏) hide; conceal Ⅱ形容詞1 (隱藏不露) hidden from view; concealed 2 (潛伏的; ...
  • : Ⅰ名詞1 (疾病; 失去健康的狀態) illness; sickness; disease; malum; nosema; malady; morbus; vitium...
  • : Ⅰ名詞1 (對生物體有害的性質或物質; 毒物) poison; toxin 2 (毒品) drug; narcotics 3 (姓氏) a s...
  • 病毒 : [醫學] virus; inframicrobe (濾過性)
  1. Eclipse refers to the disappearance of infections.

    蔽是指感染性消失。
  2. Among the many waterborne disease - causing viruses are hepatitis a and norwalk ; the pathogenic protozoa include cryptosporidium, entamoeba and giardia

    而主要的水媒為a型肝炎及諾華克;會引起疾的原生動物,則包括孢子蟲、內阿米巴原蟲、梨形鞭毛蟲等。
  3. These pigs had acquired lungworm infestations presumably containing masked influenza virus under natural conditions.

    這些豬在自然條件下已受到含有蔽流感的肺絲蟲寄生。
  4. As a rule the swine infested with the lungworms carrying the "masked virus" did not develop swine influenza immediately upon infestation with the lungworm.

    通常,受到攜帶了「」的肺絲蟲侵襲的豬,並不因肺絲蟲的侵襲立即發生流感。
  5. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  6. Differential diagnosis included cerebral toxoplasmosis, cytomegalovirus ( cmv ) encephalitis, primary cns lymphoma, progressive multifocal leukoencephalopathy, fungal abcess due to candida, aspergillus, or cryptococcus, varicella - zoster virus encephalitis or vasculitis, herpes simplex encephalitis, tuberculosis ( m. tuberculosis ), and kaposi ' s sarcoma

    其它的診斷包括:腦弓形體,巨細胞( cmv )型腦炎,原發中樞系統淋巴瘤,漸進性多灶性腦白質,假絲酵母菌,麴菌或球菌所致真菌性膿腫,水痘帶狀型腦炎或脈管炎,單純皰疹腦炎,肺結核(多發性結核) ,和卡波西肉瘤。
  7. With the fleet development of mobile communication industry, the security and secrecy of information has been becoming more and more vital. nowadays, the security of communication is of great importance to confirm the safety of business information. on the situation that the mobile phone has been diffusely applied, the hidden safety troubles of mobile phone should not be ignored ( such as wire tapping, imitated handset station, blue teeth connection, in exchange with electromagnetic wave, the back door of handset, lost & stolen & lost control of mobile phone, safety of non - tone increment operation of mobile phone and cell phone virus )

    據統計,目前我國gsm網路[ 1 ] [ 13 ]已覆蓋全國絕大部分地區,用戶數已超過2 . 6億,並且還在高速增長;隨著手機應用的普及,手機存在的安全患及面臨的威脅日益突出(如主動竊聽、假冒機站、藍牙連接、電磁波交換、手機后門、手機被盜、丟失或短時失控、手機非話增值業務安全以及手機等) ,手機安全問題已成為當前急需解決的重要問題。
  8. Microsoft is providing the sql critical update kit as is and with all fault, and hereby disclaims all other warranties and conditions, whether express, implied or statutory, including, but not limited to, any if any implied warranties, duties or conditions of merchantability, of fitness for a particular purpose, of reliability or availability, of accuracy or completeness of responses, of results, of workmanlike effort, of lack of viruses, of lack of negligence

    Microsoft按「原樣」包括其所有可能存在的錯誤提供此sql關鍵更新工具包,並特此聲明不負責其他任何明示含或法定的擔保和條件,其中包括但不限於下列任何含的擔保責任或條件如果有:適銷性對于特定目的的適用性可靠性或可用性回應的準確性或完整性結果工藝的精良無以及無疏忽。
  9. A virus that uses encryption to hide itself from virus scanners. that is, it jumbles up it ' s program code to make it difficult to detect

    一個用加密技術來藏自己而不被掃描器發現的。這意味著它把攪亂了它的程序代碼,從而使它難以被發現。
  10. Discard worn out boards, as cut marks on them serve as hiding places for viruses

    丟棄舊菜板,因為上面的刀痕是藏的地方。
  11. Other risk factors include antecedent viral infection, overcrowding, chronic underlying illness, and active and passive smoking. is it common in hong kong

    至於其他風險因素,則包括先前是否受到其他感染環境擠迫慢性疾吸煙以及接觸二手煙等。
  12. " as hackers sometimes take advantage of the holidays to launch their malicious programmes by concealing their viruses in festive greeting notes, parents should show their children how to guard against unauthorised intrusions into their system and ensure that they abide by the ethics and regulations on the proper use of computers and access to the cyber world on the internet

    由於黑客有時會利用假期發動惡意程式,把這些藏於節日祝賀郵件內,家長應該教導子女怎樣保護系統免受未經授權的入侵,並確保他們遵守正確使用電腦及在上網的道德操守和規則。
  13. In report was in new network on december 21 the trojan / psw. almat. dnh in today ' s virus " a mai is special " varietal dnh and trojan / psw. magania. awh " mageniya " varietal awh is worth to pay close attention to

    立即升級江民殺軟體等防程序並進行全面殺,開啟各項監控,對于網上銀行、支付平臺、網上證券交易、網路游戲等賬號密碼等,要妥善保管,盡量不在有可能存在安全患的電腦上使用。
  14. Lan gkk, garman wf, locownini sa. et al. treatment of chronic hepatitis b virus infection aslar - pacific perspective [ j ]. j gastroenterol hepatol, 1999, 14 : 3 - 2

    焦栓林,申德林,王全楚.慢性乙型匿型肝炎抗治療的初步探討[ j ] .臨床肝膽雜志, 2005 ( 2 ) : 115
  15. Rapidly detecting apple chlorotic leaf spot virus, apple stem grooving virus and apple stem pitting virus by micrografting in vitro

    用離體微嫁接法快速檢測蘋果潛隱病毒
  16. Fof example , some operating system viruses have hidden large amounts of attack logic in falsely marked bad disk sectors

    例如,一些操作系統型把自身的邏輯藏在那些標識「壞」的磁盤扇區中。
  17. But chemical agents, lethal viruses and shadowy terrorist networks are not easily contained

    但是化學制劑和致命以及蔽的恐怖主義網不是那麼容易就能被控制的。
  18. They are those in which the virus persists in an occult, or cryptic, form most of the time

    潛伏感染是指在大部分時間是伏的。
  19. January 17, 2007 ? twenty years after its introduction, gene therapy still holds great promise as a way to harness the insidious power of iruses such as human immunodeficiency syndrome ( hi )

    2007年1月17日? ?在基因治療引入醫學領域20年後,做為一種利用襲的能力來對抗自身的治療方法,仍然保持著巨大的希望,如在對抗艾滋領域。
  20. Keratitis has many causes including microbial organisms such as bacteria, viruses and fungi. contact lens wearing is associated with increased risk of microbial keratitis

    角膜炎可由多種微生物引起,包括細菌和真菌,而配戴形眼鏡會增加患上角膜炎的機會。
分享友人