您要查找的是不是:
- host file close 主文件关闭
- Editing the host file may resolve the issue. 编辑主机文件可以解决此问题。
- Intrusive viruses are hard to write and very difficult to remove without damaging the host file. 入侵型病毒难以编写,在去除它们时常常会破坏主文件。
- Y ou have a combination of DNS and host file lookups. 您需要查找DNS 和主机上的文件。
- Each native file storage type is recorded in the format file as a corresponding host file data type. 在格式化文件中,每种本机文件存储类型都记录为相应的宿主文件数据类型。
- Intrusive viruses are hard to write and very difficult to remove without damaging the host file . 入侵型病毒难以编写,在去除它们时常常会破坏主文件。
- If you are creating a non-XML format file for a delimited text file, you can specify 0 for the host file data length of every data field. 如果您正在为带分隔符的文本文件创建非XML格式化文件,则可以将每个数据字段的宿主文件数据长度指定为0。
- Be especially cautious before encrypting data in files close to maximum file size. 所以在加密已经接近最大文件大小的文件中的数据时,要特别小心。
- Intrusive viruses Invade an existing program and actually insert a portion of themselves into the host program.Intrusive viruses are hard to write and very difficult to remove without damaging the host file. 入侵型病毒侵入已有的程序,实际上是把病毒程序的一部分插入到主程序中。 入侵型病毒难以编写,在去除它们时常常会破坏主文件。
- Intrusive viruses invade an existing program and actually insert a portion of themselves into the host program. Intrusive viruses are hard to write and very difficult to remove without damaging the host file. 入侵型病毒侵入已有的程序,实际上是把病毒程序的一部分插入到主程序中。入侵型病毒难以编写,在去除它们时常常会破坏主文件。
- In case an error occurred while creating the dropper file (when the virus is run from infected file) the virus runs the infection routine from its instance in the infected host file. 一个问题会发生在创建拆离体的过程中(当一个感染病毒的文件加载运行的过程中),这个病毒通过它感染的主机文件中执行感染例程。
- To view the Hosts file, you may have to associate the file with Notepad. 要查看主机文件,可能必须将该文件与记事本相关联。
- This error may occur if the Hosts file contains a static IP address. 如果主机文件包含静态IP地址,就可能会发生此问题。
- In one form of pharming attack, code sent in an e-mail modifies local host files on a personal computer. 其中一种无诱饵钓鱼欺骗的形式就是,随电子邮件发出的(恶意)代码修改个人计算机上的本机主文件。
- In this method of pharming, individual personal computer host files need not be corrupted. 在这种无诱饵钓鱼欺骗中,个人计算机的主文件不必被修改。
- File system integrity checkout is a host-based intrusion detection technique which can check out the unauthorized modification of the host files by intruders. 文件系统完整性校验是一种基于主机的入侵检测技术,可以检测出入侵者对主机文件的非法修改。
- Multiple host names must be mapped to the single IP address by using a DNS server or a Hosts file. 多个主机名必须使用一个DNS服务器或Hosts文件映射到单个IP地址。
- Edit the Hosts file on the Edge Transport server to include the Host records for the Hub Transport servers. 编辑边缘传输服务器上的Hosts文件,以便包括集线器传输服务器的主机记录。
- The host then passed around a box of cigars. 主人这时拿了一盒雪茄烟请大家抽。
- A host of friend meet him at the railroad station. 一大群朋友在火车站迎接他。