您要查找的是不是:
- new Trojan horse 新型木马
- Reboot your machine and delete the trojan horse. 重新启动你的电脑,删除木马文件。
- I wonder whether he is a Trojan Horse. 我不知道他是否是个内奸。
- Identify the trojan horse file on your hard disk. 确定你磁盘中的木马文件。
- From there,a new approach based on multi-agent cooperative to realize trojan horse auto-detection is put forward. 在此基础上,提出了基于多Agent协作实现未知新木马病毒自动识别新方法。
- The senior civil servant they arrested for spying turned out to be a Trojan horse, planted by enemy intelligence twenty years previously. 他们逮捕的那位因进行间谍活动的高级文职人员,原来是20年前敌人情报机构安插的特洛伊木马。
- There is no evidence of a Trojan horse on your system. 在您的系统中没有发现木马.
- The ingeniously engineered Trojan horse was also his idea. 那个天才的特洛伊木马同样也是他的主意。
- For example, a trojan horse or a virus is considered malware. 例如,一个木马或病毒被认为是恶意软件。
- This thesis is lucubrated on the part of Trojan horse hiding. 本文在木马隐藏部分做了研究。
- In this paper, author proposed a new attacking scheme through combining the digital watermarking technology with conventional computer virus and Trojan horse. 本文从横向思维的角度出发,第一次将现有数字水印技术与传统的病毒、木马机制相结合,产生出一种新的攻击模型。
- In very gradual, complex ways, Britain may prove to be, not the Trojan horse of American influence which France has always feared, but, on the contrary, a counterpoise to the American tide. 虽然过程缓慢,方式也很复杂,可英国也许能够证明他们并非是法国总是害怕的那种美国势力的潜在危险。恰恰相反,他们是与美国潮流抗衡的力量。
- In this paper, author proposed a novel mode of activation using digital watermark technology and provided some new ideas for future research of Trojan horse. 本文作者提出了一种利用数字水印技术实现基于文件监控的激活方式,为木马激活的研究提供了新的思路。
- Ghost in the Machine: A Trojan horse flashes insulting messages on the screen. 一种特洛伊木马,它会在屏幕上闪烁一些侮辱性消息。
- If this is a worm or Trojan horse the length represents the size of the file. 如果这是一个蠕虫或特洛依木马则长度表示为该文件的长度。
- Methods Analyze the hiding mechanism of new Trojan proceeding from the principle of SPI technique and excogitate a method to check and clean this type of Trojan accordingly. 方法从SPI技术原理出发分析新型木马利用SPI技术实现隐藏的机制,找出一种新型木马的检测和清除方法。
- Based on that, I designed and actualized corresponding trojan horse. 此外,本课题提出并实现了的木马自删除和木马自升级技术,设计并实现了相应的实验木马。
- "If a new Trojan or worm can be detected by an antivirus, the author will deliberately modify it until it isn't detected anymore," stated Kaspersky in its VirusList blog. 卡吧-斯基还在他的病毒表博客中补充道:“假如一种新型的种马或虫虫引起了反毒伯乐们的注重,其主人将顽强不懈的修改之直到反毒伯乐们对它完全丧失爱好为止。”
- Trojan horse attacking strategy on quantum cryptography is investigated. 研究了特洛伊木马对量子密码算法的攻击.
- They are defeated only because of the Trojan horse in their country. 他们战败的原因只是因为他们国内有暗藏的敌人。