trojan horse 中文意思是什麼

trojan horse 解釋
【神話】特洛伊木馬〈特洛伊戰爭時希臘人把戰士藏在裏面混進特洛伊城〉;〈比喻〉內部的破壞集團;【計算機】特洛伊木馬式病毒;【計算機】特洛伊木馬式電腦偵破程序〈以貌似合法的程序偷偷潛入他人網站進行竊密等破壞活動〉。

  • trojan : adj 特洛伊 (Troy)城[人]的。n 1 特洛伊人。2 〈口語〉勤勉的人;拳擊家,勇士;〈口語〉愉快的人,有...
  • horse : n (pl horses 〈集合詞〉horse)1 馬〈尤指長大的公馬〉,馬科動物。2 〈集合詞〉騎兵。3 像馬的東西,...
  1. Following this reference yields a pretty liberal license, except for the ominous footer : " information in this document is subject to change without notice. " the fact that the license is not written into the product, but is asserted by reference to a web page that can be changed at any time, raises the specter of a possible trojan horse play where cxml is spread through the industry and then its owner stated as ariba in the license can make a sly play for juicy profits, or cut down a competitor, by moving the licensing goalposts

    ( 「 information in this document is subject to change without notice 。 」 )許可證並未寫入到產品中,而是通過到可能會隨時更改的web頁面的引用進行維護的這一事實,引發了對可能的特洛伊木馬活動的憂慮,那就是cxml在業界傳播,然後它的擁有者(就象許可證中所聲明的ariba )通過移動許可發放「門柱」來暗中想方設法獲利,或者削弱競爭對手。
  2. Reboot your machine and delete the trojan horse

    重新啟動你的電腦,刪除木馬文件。
  3. ( 3 ) have implemented a trojan horse system, named saker which introduces advanced hiding technique, spreading technique and safe communicating technique

    ( 3 )實現了一種高性能,多功能木馬監控系統一saker ,該系統主要採用了進程隱藏,通信認證等技術。
  4. There is no evidence of a trojan horse on your system

    在您的系統中沒有發現木馬
  5. Identify the trojan horse file on your hard disk

    確定你磁盤中的木馬文件。
  6. Analysis and design of embedded trojan horse virus

    嵌入式木馬分析及設計
  7. Internet banking frauds involving trojan horse programmes

    涉及特洛伊木馬程式的網上銀行騙案
  8. The detection and deletion of the dll trojan horse

    木馬的發現與清除
  9. Trojan horse attack mechanism analysis and preventive measures

    基於木馬攻擊機制的防範措施剖析
  10. Now strong right, 81 trojan horse

    現在加強右路81特洛伊木馬戰術
  11. Research on trojan horse detection based - on heuristic analysis

    基於啟發式分析的木馬檢測技術研究
  12. One form of trojan horse programme is able to capture keystrokes typed by the user and then transmit them covertly to the fraudster

    其中一種特洛伊木馬程式能記錄用戶在個人電腦所按的鍵,並將取得的資料秘密地傳送給騙徒。
  13. A great trojan horse to use is back orifice 2000 from cult of the dead cow see

    討論)是一個好的選擇,但是卻很昂貴且不易使用。
  14. In the multitudinous intrusion event, the hacker often gain control of the target computer through exploiting essential system process, and leaves trojan horse or back door in the system after a successful intrusion, which provides a shortcut for next access. therefore the process detection for the exploited system process and the trojan horse is important topics in the intrusion detection field

    在眾多的入侵事件中,黑客往往通過感染關鍵系統進程獲得目標主機的系統權限,並在成功入侵后在目標主機留下木馬、后門作為下次入侵的捷徑,所以對這些受感染的系統進程以及木馬、后門進程進行檢測是入侵檢測技術研究的重要課題之一。
  15. They are defeated only because of the trojan horse in their country

    他們戰敗的原因只是因為他們國內有暗藏的敵人。
  16. Trojan virus, like a trojan horse, is a program that appears safe - - but smuggles in a worm or virus

    特洛伊病毒,就跟特洛伊木馬一樣,看上去安全? ?其實暗藏「殺機」 。
  17. The analysis of the concealing technology of trojan - horse

    特洛伊木馬程序隱藏技術分析
  18. Strong right, 81 trojan horse

    加強右路, 81特洛伊木馬戰術
  19. Press release : internet banking frauds involving trojan horse programmes

    新聞稿:涉及特洛伊木馬程式的網上銀行騙案
  20. Ghost in the machine : a trojan horse flashes insulting messages on the screen

    :一種特洛伊木馬,它會在屏幕上閃爍一些侮辱性消息。
分享友人