您要查找的是不是:
- inbreaking of Trojan horse 木马入侵
- This thesis is lucubrated on the part of Trojan horse hiding. 本文在木马隐藏部分做了研究。
- The term Backdoor describes a specific group of Trojan Horses. 任期后门描述的一个特定群体,特洛伊木马程式。
- We use 360 Web browser, so you can reduce the threat of Trojan horse. 大家用360网页浏览器,这样你可以降低木马的威胁。
- In this paper, author proposed a novel mode of activation using digital watermark technology and provided some new ideas for future research of Trojan horse. 本文作者提出了一种利用数字水印技术实现基于文件监控的激活方式,为木马激活的研究提供了新的思路。
- Keylogger software is often a component of Trojan horses. 键盘记录器软件通常是特洛伊木马的一个组成部分。
- This paper firstly summarizes some conceptions of Trojan Horse program, and then emphasizes the concealing technology of Trojan Horse program and the familiar methods of concealing technology. 首先介绍了特洛伊木马程序的一些概念,然后重点分析了木马程序的隐藏技术和常见的隐藏方式。
- A new scheme is studied to realize the injection of Trojan horse by combining the technology of DLL(dynamic linking library) and that of remote thread injection on the Windows platform. 研究了如何将Windows环境下的动态链接库(DLL)技术与远程线程插入技术结合起来实现特洛伊木马植入的新方案。
- By the introduction to the current detection methods of Trojan Horse, we then present a Trojan Horse detection algorithm on the basis of correlated analysis of time-frequency, and make a test of the algorithm to the real Trojan horse. 论文在介绍木马检测现状的基础上,提出了基于时频联合分析的木马检测算法,并针对真实的木马对算法做了模拟测试,取得较好的效果;
- The Principium and Cleanup of Trojan Horse 特洛伊木马的工作原理及清除
- The Harm of Trojan Horse and the Resolution 木马的危害及应对策略
- Analysis of Trojan Horse and Its Detection 木马病毒分析及其检测方法研究
- ANALYSIS AND PREVENTION OF TROJAN HORSE 木马分析与防范
- There is no evidence of a Trojan horse on your system. 在您的系统中没有发现木马.
- We consider the actions of Trojan horses and viruses in real computer systems and suggest a minimal framework for an adequate formal understanding of the phenomena. 我们认为,使用行动特洛伊木马和病毒实时启动计算机系统,并应提出最低限度的范围内适当的正式理解的现象。
- A Defense Research on the ARP Deceit of Trojan Horse Virus ARP欺骗木马病毒分析与防御研究
- Reboot your machine and delete the trojan horse. 重新启动你的电脑,删除木马文件。
- Research on the concealing technology of Trojan horse based on DLL 基于DLL的特洛伊木马隐藏技术研究
- I wonder whether he is a Trojan Horse. 我不知道他是否是个内奸。
- Automatic startup of Trojan horse based on IAT table 基于IAT表的木马自启动技术