trojan horse 中文意思是什麼
trojan horse
解釋
【神話】特洛伊木馬〈特洛伊戰爭時希臘人把戰士藏在裏面混進特洛伊城〉;〈比喻〉內部的破壞集團;【計算機】特洛伊木馬式病毒;【計算機】特洛伊木馬式電腦偵破程序〈以貌似合法的程序偷偷潛入他人網站進行竊密等破壞活動〉。-
Following this reference yields a pretty liberal license, except for the ominous footer : " information in this document is subject to change without notice. " the fact that the license is not written into the product, but is asserted by reference to a web page that can be changed at any time, raises the specter of a possible trojan horse play where cxml is spread through the industry and then its owner stated as ariba in the license can make a sly play for juicy profits, or cut down a competitor, by moving the licensing goalposts
( 「 information in this document is subject to change without notice 。 」 )許可證並未寫入到產品中,而是通過到可能會隨時更改的web頁面的引用進行維護的這一事實,引發了對可能的特洛伊木馬活動的憂慮,那就是cxml在業界傳播,然後它的擁有者(就象許可證中所聲明的ariba )通過移動許可發放「門柱」來暗中想方設法獲利,或者削弱競爭對手。 -
Reboot your machine and delete the trojan horse
重新啟動你的電腦,刪除木馬文件。 -
( 3 ) have implemented a trojan horse system, named saker which introduces advanced hiding technique, spreading technique and safe communicating technique
( 3 )實現了一種高性能,多功能木馬監控系統一saker ,該系統主要採用了進程隱藏,通信認證等技術。 -
There is no evidence of a trojan horse on your system
在您的系統中沒有發現木馬 -
Identify the trojan horse file on your hard disk
確定你磁盤中的木馬文件。 -
Analysis and design of embedded trojan horse virus
嵌入式木馬分析及設計 -
Internet banking frauds involving trojan horse programmes
涉及特洛伊木馬程式的網上銀行騙案 -
The detection and deletion of the dll trojan horse
木馬的發現與清除 -
Trojan horse attack mechanism analysis and preventive measures
基於木馬攻擊機制的防範措施剖析 -
Now strong right, 81 trojan horse
現在加強右路81特洛伊木馬戰術 -
Research on trojan horse detection based - on heuristic analysis
基於啟發式分析的木馬檢測技術研究 -
One form of trojan horse programme is able to capture keystrokes typed by the user and then transmit them covertly to the fraudster
其中一種特洛伊木馬程式能記錄用戶在個人電腦所按的鍵,並將取得的資料秘密地傳送給騙徒。 -
A great trojan horse to use is back orifice 2000 from cult of the dead cow see
討論)是一個好的選擇,但是卻很昂貴且不易使用。 -
In the multitudinous intrusion event, the hacker often gain control of the target computer through exploiting essential system process, and leaves trojan horse or back door in the system after a successful intrusion, which provides a shortcut for next access. therefore the process detection for the exploited system process and the trojan horse is important topics in the intrusion detection field
在眾多的入侵事件中,黑客往往通過感染關鍵系統進程獲得目標主機的系統權限,並在成功入侵后在目標主機留下木馬、后門作為下次入侵的捷徑,所以對這些受感染的系統進程以及木馬、后門進程進行檢測是入侵檢測技術研究的重要課題之一。 -
They are defeated only because of the trojan horse in their country
他們戰敗的原因只是因為他們國內有暗藏的敵人。 -
Trojan virus, like a trojan horse, is a program that appears safe - - but smuggles in a worm or virus
特洛伊病毒,就跟特洛伊木馬一樣,看上去安全? ?其實暗藏「殺機」 。 -
The analysis of the concealing technology of trojan - horse
特洛伊木馬程序隱藏技術分析 -
Strong right, 81 trojan horse
加強右路, 81特洛伊木馬戰術 -
Press release : internet banking frauds involving trojan horse programmes
新聞稿:涉及特洛伊木馬程式的網上銀行騙案 -
Ghost in the machine : a trojan horse flashes insulting messages on the screen
:一種特洛伊木馬,它會在屏幕上閃爍一些侮辱性消息。
分享友人