首页 / 词典 / good

trojans

美 [ˈtroʊdʒənz]英 [ˈtrəʊdʒənz]
  • 网络特洛伊木马;木马程式
trojanstrojans
  1. Simple , light and practical , it can scan and disinfect more than 58,000 viruses and Trojans directly over the Internet .

    简单,轻便实用,它可以扫描和消毒超过58000病毒及特洛伊木马直接上网。

  2. He starting getting warnings about viruses and trojans and soon he couldn 't get Windows to boot up at all .

    之后,他就开始收到各种有关病毒和特洛伊木马的警告,最后连Windows系统都无法启动了。

  3. Designs a detection system for unknown Trojans based on behavior analysis .

    对基于行为分析的未知木马检测系统进行了设计。

  4. He said Trojans worked very hard to protect their city .

    他在诗作中说特洛伊人努力保护自己的城市。

  5. He is less likely to fight for us than trojans .

    他比特洛伊人还不愿意为我们作战。

  6. In recent years , many researchers make their research focus on defense and detection of Trojans .

    木马的防御与检测也成为近年来网络安全研究者们的研究热点。

  7. The Analysis of Trojans Programming Technology

    木马编程技术分析

  8. This paper presents a new method to detect the HTTP tunneling Trojans by using operation behavior characteristics .

    由此提出一种利用木马操作行为特征检测网络中白勺HTTP隧道木马白勺方法。

  9. In recent years , malwares like Trojans have brought increasing threaten to network security .

    近年来,木马等恶意程序对网络安全所造成的威胁日益严重。

  10. For ten long years the Greeks fought the Trojans but could not win .

    希腊人与特洛伊人交战了十几年,但从未获胜过。

  11. The report also said that trojans account for some 70 percent of all malware .

    报告还称所有恶意软件中木马占大约70%。

  12. Trojans are designed to cause loss or theft of computer data , and to destroy your system .

    木马程序的目的是造成损失或被窃的计算机数据,并破坏您的系统。

  13. The mathematical model of Trojans ' communication concealment is established according to the Trojan communication principle .

    根据木马通信原理建立了木马通信隐蔽模型。

  14. We declared that the wooden horse would bring good luck to the Trojans .

    我们声明木马会给特洛伊人带来好运的。

  15. Currently , Trojans appear abnormally active and bring more and more severe damage to us .

    目前,计算机木马呈现异常活跃的态势,带来的危害日益严重。

  16. The two Trojans slew such of the enemy as they could without exciting alarm .

    这两个特洛伊人尽力杀伤敌人而不惊动他们。

  17. The current monetization scheme used by most mobile Trojans involves sending text messages to short numbers .

    目前大多数手机木马所使用的货币化计划涉及短号码发送短信。

  18. Traditional methods using signatures to detect and remove the Trojans definitely lag behind Trojans appear .

    传统方式通过对木马特征码查杀木马,必然滞后于木马出现。

  19. This thesis mainly studies the principle of Trojans ' covert communication and the approaches of Trojan communication detection .

    本文主要研究网络中木马的隐蔽通信原理及木马通信的检测问题。

  20. He can 't be controlled . he 's as likely to fight us as the trojans .

    他难以控制,和特洛伊人一样想对付我们。

  21. He wrote about the Trojans who lived in the city of Troy .

    他书写了住在特洛伊城的特洛伊人。

  22. They all worked like trojans .

    他们工作都极为勤奋。

  23. For a long time , this group of Trojans constituted a significant portion of the daily'catch'for antivirus companies worldwide .

    长期以来,这个木马小组成立了一个日常的追赶反病毒公司在全球的很大一部分。

  24. In recent years computer viruses , Trojans , the number of exponential growth , proliferation , a serious threat to network security .

    近几年来计算机病毒、木马数量成指数增长,泛滥成灾,严重威胁着网络安全。

  25. With viruses and trojans , surfers are suspicious of demands to install software .

    在病毒和木马程序肆虐的网络上,网民们会对安装软件的要求充满猜疑。

  26. Combined with the form and characteristics of Trojans , a united alarm form is designed to increase the accuracy of Trojan detection .

    同时结合木马通信形式和特点,设计了木马网络通信特征联合报警机制,提高了对目标网络中木马检测的准确性。

  27. Many virus , Trojans and worms use computer vulnerabilities to spread and attack causing serious economy loss and harm to society .

    大量的病毒、木马、蠕虫利用计算机的漏洞进行广。泛的传播,造成了严重的经济损失和社会危害。

  28. A tale involves Botnets and run somewhere trojans . Allow me to explain a bit .

    故事涉及到僵尸网络和勒索木马,请允许我解释一下。

  29. The Iliad makes it clear that destruction came upon Troy because the Trojans stole Greek women .

    《伊利亚特》说得很明白,特洛伊城之所以被毁,原因是特洛伊人拐走了希腊的妇女。

  30. The technology is ideal at protecting against zero-day threats in the form of Viruses and Trojans .

    该技术是理想的,在保护儿童不受零日威胁形式的病毒和木马。