您要查找的是不是:
- Identify the trojan horse file on your hard disk. 确定你磁盘中的木马文件。
- Reboot your machine and delete the trojan horse. 重新启动你的电脑,删除木马文件。
- In very gradual, complex ways, Britain may prove to be, not the Trojan horse of American influence which France has always feared, but, on the contrary, a counterpoise to the American tide. 虽然过程缓慢,方式也很复杂,可英国也许能够证明他们并非是法国总是害怕的那种美国势力的潜在危险。恰恰相反,他们是与美国潮流抗衡的力量。
- They are defeated only because of the Trojan horse in their country. 他们战败的原因只是因为他们国内有暗藏的敌人。
- Come to the protection and the clearance techniques that the here sees the latest virus and the Trojan horse. 计算机中招了?来这里看看最新的病毒和木马的防护和清除技巧吧。
- A Trojan priest of Apollo who was killed along with his two sons by two sea serpents for having warned his people of the Trojan horse. 拉奥孔特洛伊的太阳神祭师,因警告特洛伊人不要中木马计而连同其二个儿了一起被两条海蟒杀死
- This paper has discussed the operation principle of the Trojan Horse virus that caused the harm greatly to computer security. 讨论对计算机安全危害极大的“木马”病毒的工作原理。
- They were defeated because of the Trojan horses in their country. 他们被打败了,因为他们的国家出现了奸细。
- They are always sending the Trojan horses to many countries in the world. 他们总是向世界许多国家派遣奸细。
- In very gradual,complex ways,Britain may prove to be,not the Trojan horse of American influence which France has always feared,but,on the contrary,a counterpoise to the American tide. 虽然过程缓慢,方式也很复杂,可英国也许能够证明他们并非是法国总是害怕的那种美国势力的潜在危险。恰恰相反,他们是与美国潮流抗衡的力量。
- At that time, I was lovely child, the daily PuPu red face, with their names in the city through the streets, very happy, rain, wind chasing after the leaves, rotate the Trojan horse. 那时候,我是可爱的孩子,红仆仆的脸蛋,每天背负着自己的名字穿行在城市的大街小巷,很快乐的追逐过风,雨,落叶,旋转的木马。
- A better protection against Trojan horses requires a thorough understanding of the work principles of the Trojan horse program and methods of its application. 知己知彼方可百战不殆,要更好地防治木马,首先要深入瞭解木马程式的工作原理和使用方法。
- The superpowers are always sending the Trojan horses to many countries in the world. 一些超级强权大国总是派遣许多间谍到世界各个国家。
- stratagem of the Trojan horse; Trojan horse 木马计
- Establishment of a model system to the detection and defence against the Trojan horses based on the artifical immunology. 提出了一个基于人工免疫机制的木马检测与防御模型。
- The senior civil servant they arrested for spying turned out to be a Trojan horse, planted by enemy intelligence twenty years previously. 他们逮捕的那位因进行间谍活动的高级文职人员,原来是20年前敌人情报机构安插的特洛伊木马。
- With internet widely used in our daily life, the Trojan horses are emerging one after another and have become the main threat of network security. 摘要随着互联网越来越生活化,层出不穷的木马已是网络安全的主要威胁,其隐蔽性很强,使一般检测工具难以检测。
- How to Prevent the Trojan Horse through the Port 如何通过端口防木马
- Tell me who again build the Trojan horse 告诉我是谁再次把特洛伊木马兴建
- With a wide usage of Internet, the instrusion events happened continually by the hakers, among which the Trojan horses play an important role acted as a kind of attack tools with invisiblity and enormous damage. 伴随着INTERNET的广泛应用,“黑客”入侵事件不断出现,特洛伊木马作为一种隐蔽性很强、危害性极大的攻击工具在其中扮演了举足轻重的角色。