Trojan horses

美 [ˈtroʊdʒən ˈhɔːrsɪz]英 [ˈtrəʊdʒən ˈhɔːsɪz]
  • n.特洛伊木马;(特洛伊)木马程序(一种欺骗程序,看起来有用,实际却旨在毁坏数据等);(来自外部的)颠覆分子(或活动)
  • Trojan horse的复数
Trojan horsesTrojan horses

Trojan horses

频次

  • 1
    N-COUNT (用于掩盖真实目的或意图的)特洛伊木马,幌子
    If you describe a person or thing as a Trojan horse, you mean that they are being used to hide someone's true purpose or intentions.

    Was Colombo the emissary of Pope Paul, his Trojan horse within the Commission?...

    科隆博是教皇保罗的特使吗?是他在委员会内部设下的卧底吗?

  • 2
    N-COUNT 木马病毒
    A Trojan horse is a computer virus which is inserted into a program or system and is designed to take effect after a particular period of time or a certain number of operations.

    Operating systems can be brought to a halt by a Trojan Horse.

    操作系统可能会因为木马病毒的攻击而中止。

  1. Defense against Trojan horses in network security management

    网络安全管理之特洛伊木马的防御

  2. The term Backdoor describes a specific group of Trojan Horses .

    任期后门描述的一个特定群体,特洛伊木马程式。

  3. Trojan horses are a huge security threat to computer network .

    木马的存在给计算机网络带来了不容忽视的安全问题。

  4. Behavioral Analysis of Trojan Horses and Research on a New Anti-Trojan Strategy

    木马的行为分析及新型反木马策略的研究

  5. They are always sending the Trojan horses to many countries in the world .

    他们总是向世界许多国家派遣奸细。

  6. Concealing technology is important to designer of Trojan horses all through .

    隐藏技术一直是木马设计人员研究的重要技术。

  7. The superpowers are always sending the Trojan horses to many countries in the world .

    一些超级强权大国总是派遣许多间谍到世界各个国家。

  8. Our 360 Safe services are eliminating about 60 million Trojan horses daily for Chinese Internet users .

    齐向东表示,360公司软件每天为中国网民扫描约6000万木马程序。

  9. Hackers can plant Trojan horses in computers on the other side of the world .

    骇客能够给世界另一端的电脑种植木马病毒。

  10. Anatomy of veil technique for the Trojan Horses ( continuation )

    剖析特洛伊木马的隐藏技术(续)

  11. They were defeated because of the Trojan horses in their country .

    他们被打败了,因为他们的国家出现了奸细。

  12. For example , viruses , worms , and Trojan horses are malicious software .

    例如,病毒、蠕虫以及特洛伊木马都属于恶意软件。

  13. Educating people about computer viruses and Trojan horses will help , and using updated antivirus software is also important .

    为了能够让大众更安全地上网,政府应该普及有关计算机病毒和特洛伊木马病毒(Trojanhorses)的各种知识,让公众能够识别并预防,除此之外,还应该不断更新使用的杀毒软件。

  14. Many computer viruses , worms , and trojan horses are designed to exploit weak passwords .

    很多计算机病毒、蠕虫和特洛伊木马的设计都利用了弱口令。

  15. Trojan Horses of European Securities Regulation

    欧洲证券监管的特洛伊木马

  16. Some hackers on the network trafficking network viruses , Trojan horses , formed a special interest chain .

    一些黑客在网络上贩卖网络病毒、木马程序,形成了特殊的利益链条。

  17. Establishment of a model system to the detection and defence against the Trojan horses based on the artifical immunology .

    提出了一个基于人工免疫机制的木马检测与防御模型。

  18. Swing , Trojan horses , toy house .

    秋千,木马,玩具屋。

  19. Checking the integrity of files of the host can hold up unknown viruses and Trojan horses effectively .

    通过对主机文件系统的完整性验证,能有效地拦截系统未知的病毒和木马。

  20. Design and Implementation of Dual-link Trojan Horses

    一种双链路的特洛伊木马设计与实现

  21. The technology , that protects the system from been intruding by viruses and Trojan horses , is real-time and active .

    利用文件完整性检查防范计算机病毒和木马,具有较好的实时性和主动性。

  22. Antispyware XP2009 is distributed via different online security scanners , Trojan horses , misleading sites , malicious software .

    反间谍XP的2009年是通过不同的分布式网络安全扫描,木马,误导性网站,恶意软件。

  23. In the last few years mass viruses , worms , Trojan horses and other malicious code have caused massive damage to individuals and organizations .

    一直以来,大量的病毒、蠕虫、木马以及其它恶意代码对计算机系统造成巨大危害。

  24. At present , malicious code in the Internet flow content is a major threat to the computer network security , such as the various Trojan horses , worms .

    当前,含在因特网流量内容中的恶意代码是计算机网络安全的重要威胁之一,如各种木马、蠕虫等。

  25. There are various forms of malicious code , such as Trojan horses , malicious URLs , viruses and phishing websites .

    恶意代码有各种各样的形式,例如木马、恶意URL、病毒和钓鱼网站等等。

  26. Security experts first flagged digital picture frames as a danger a year ago , when several models of the devices were found to be carrying Trojan horses .

    早在一年前,当一些型号的设备被发现携带有木马病毒之后,就有安全专家提出电子相框是一种安全威胁的途径。

  27. Bringing great convenience , Computers and networks also brought many of threats to people , such as computer viruses , Trojan horses , worms and so on .

    计算机和网络在给人们带来极大便利的同时,也带来的了令人应接不暇的计算机安全问题,如病毒,特洛伊木马,蠕虫等。

  28. Trojan horses , worms , and other malicious forms have proven to be incredibly successful at paralyzing email systems and Internet providers .

    特洛伊木马、蠕虫和其他恶性程序代码形式,业已证明在瘫痪电子邮件系统和因特网供应商方面是非常成功的。

  29. Dramas smuggled across the border have even been described as cultural Trojan horses , sneaking visions of the South into the tightly controlled North .

    走私过朝韩边境的电视剧已经被形容为文化的特洛伊木马,暗藏着韩国入侵朝鲜的迹象。

  30. Instead , its function is to mask the presence of other types of ( usually malicious ) software , such as Trojan horses , viruses or worms .

    相反,其功能是掩蔽其他类型(常常是恶意的)软件,如木马程序、病毒或蠕虫。