- 更多网络例句与杀病毒的相关的网络例句 [注:此内容来源于网络,仅供参考]
-
And to trojan and baleful software, the understanding of lucky star and strange tiger is different also, insist to be mixed with safe bodyguard all the time to strange tiger a variety of means such as the software that reduce toxin handle trojan program and virus, lucky star thinks the trojan is a kind of virus, instead trojan and turn over virus to be mixed in technical principle intercept and capture, there are any distinctions on flow of analysis, processing, is to persuade an user to stay, strange tiger with " of a year of operating period, the component reducing toxin that functional course cuts out " pretend to be " the permanent and free software that reduce toxin " will cheat an user, it is a crammer.
而对于木马和恶意软件,瑞星与奇虎的认识也不同,对于奇虎一直坚持用安全卫士和杀毒软件等多种方式处理木马程序以及病毒,瑞星认为木马是病毒的一种,反木马和反病毒在技术原理和截获、分析、处理流程上没有任何区别,而正是为了挽留用户,奇虎便以"一年使用期的、功能经过裁剪的杀毒组件"冒充"永久免费的杀毒软件"来欺骗用户,是一个谎言。
-
Your temperature rises and you get a fever, but the heat of your body is killing the virus.
你体温上升开始发烧,但你的身体热量正在杀病毒。
-
Kaspersky Internet Security 7.0 is a sophisticatedsystem of protection of the micro-computers against all the data-processingtypes of threats, which they are malevolent programs, of attacks of pirates,tools of dissimulation of activity, software spies, letters of hame onnage, of pop-up windowinvading,etc In more of different the types of antivirus, the application proposesa personal fire wall of last generation, proactive the Défense component whichensures the protection against the new threats, the component Anti-Swindlerwhich protects you from the swindles on line and the component Anti-Spam whichfilters the undesirable mail.
卡巴套装7.0是防止微型电脑受到各种危害的一个复杂保护系统,它防止的危害有:恶意软件,隐私入侵,活动隐藏工具,间谍软件,有害邮件,广告窗口等等。卡巴套装7.0除了提供防范各种病毒的杀软外,它还加入了最新一代的防火墙、防范新病毒的主动防御、防范在线诈骗的反诈骗程序以及能过滤非法邮件的邮件保护程序
-
It includes four parts: 1 Part I, it introduces the basic knowledge of computer viruses such as computer virus definition, history and important viruses events, features, behavior phenomena, difference with computer software and hardware troubles, damage behavior and capability, classification, naming, future trend, etc; 2 Part II, it introduces the corresponding knowledge of computer systems related to computer viruses such as the composing of software and hardware of the computer system, storage media and its working mechanism, interrupt technologies,.com/.exe/.pe file formats and their working mechanism, etc; 3 Part III, it introduces computer virus mechanism and theory such as computer virus structure, work flow, working mechanism of key modules, typical technologies used to design computer viruses including the corresponding traditional technologies (interrupt filching, memory resident, etc.), the corresponding new routine technologies (self-encrypting, Mutation Engine, etc.), and the corresponding new technologies used by some prevalence computer viruses such as macro viruses, e-mail viruses, worm, hacker, Trojan, mobile phone viruses, the working mechanism analysis of some kinds of typical and prevalence computer viruses such as file-type viruses, macro viruses, e-mail viruses, worm viruses, hacker, Trojan, mobile phone viruses, the analysis of some typical and prevalence computer viruses examples including BALL viruses, WORD macro viruses, WantJob viruses, Code Red viruses, BO Trojan, etc; 4 Part IV, it introduces the defense and killing technologies of computer viruses such as the aim and criterion of computer viruses defense and killing, prevention methods and corresponding technologies, detection technologies (comparison method, character code scanning method, behavior inspecting method, analysis method, etc.), manual and automatic killing technologies, immunity technologies such as IBM digital immunity system, new anti-viruses technology trends (real-time anti-viruses technologies, 32 kernel technologies, active kernel technologies, etc.), some typical virus defense and killing softwares (Symantec AntiVirus product, PC-Cillin AntiVirus product, etc.), the defense and killing method analysis of some kinds of typical and prevalence computer viruses (file-type viruses, macro viruses, worm viruses, hacker, etc.), for example, firewall and intrusion detection technologies for anti-hacker, the defense and killing of some typical and prevalence computer viruses examples including WORD macro viruses, Code Red viruses, BO Trojan, etc.
课程内容具体包括四大部分:1)第一部分,介绍计算机病毒基本知识,包括:计算机病毒定义、病毒发展史及重大事件、病毒特点、病毒表现现象及与软硬件故障的区别、病毒破坏行为及危害性、病毒的传播途径及媒介、病毒分类、病毒的命名及计算机病毒技术发展趋势等内容;2)第二部分,介绍与计算机病毒有关的计算机系统相关知识,包括:计算机系统软硬件组成、存储介质结构及工作原理、计算机系统引导机理及流程、中断技术、。com/。exe/。pe等文件格式及工作机理等内容;3)第三部分,讲解计算机病毒机理,包括:计算机病毒的组成结构、病毒工作流程、病毒引导/触发/感染/破坏等模块的工作机理、计算机病毒所采取的编制技术(包括中断窃取/内存驻留等传统编制技术、自加密/隐形/变形机等新的常规编制技术、宏病毒/电子邮件病毒/网络蠕虫/特洛伊木马/黑客/手机病毒等一些新的流行病毒所采取的编制技术等)、一些类型的典型或流行计算机病毒的工作机理分析(包括:引导型病毒、文件型病毒、宏病毒、电子邮件病毒、蠕虫病毒、黑客、特洛伊木马、手机病毒等)、一些典型或流行的计算机病毒实例剖析(包括:小球病毒、WORD宏病毒、求职信病毒、红色代码病毒、冰河木马等)等内容;4)第四部分,讲解计算机病毒防治技术,包括:计算机病毒防治目的、病毒防治策略及规范、病毒在管理和技术上的预防措施、病毒检查技术(包括:比较法/病毒特征码扫描法/行为监测法/虚拟执行法/分析法等)、手工和自动病毒清杀技术、病毒免疫技术(包括:针对某种一次性感染病毒的基于病毒标签的免疫方法/基于自我完整性检查的计算机病毒免疫方法/IBM的数字免疫系统等)、反病毒技术的新发展(包括:实时反病毒技术/32位内核技术/主动内核技术/以毒攻毒技术等)、诺顿/趋势/金山等公司的病毒防治软件产品、一些类型的典型或流行的计算机病毒(包括:引导型病毒、文件型病毒、宏病毒、蠕虫病毒、电子邮件病毒、手机病毒、黑客、特洛伊木马)的防治措施(其中,也包括介绍面向防范黑客攻击的防火墙、入侵检测技术)、一些典型或流行的计算机病毒防治实例剖析(包括:WORD宏病毒、红色代码病毒、冰河木马v1.1/v2.2等)、多层次病毒防护体系等内容。
-
Partition table for the failure of first-aid methods, we must first of all, killing the virus.
对于分区表故障急救的方法,我们要首先查杀病毒。
-
For most viruses,there is aneed for antimicrobials that target unique viral molecular properties.Acycloviris one such drug.It is activated into ahuman herpesvirusDNA polymerase inhibitor exclusively by HHV kinases and,thus,does not suppress other viruses.Here,we show that ACV suppresses HIV-1in HHV-coinfected human tissues,but not in HHV-free tissue or cell cultures.However,addition of HHV-6-infected cells renders these cultures sensitive to anti-HIV ACV activity.We hypothesized that such HIV suppression requires ACV phosphorylation by HHV kinases.Indeed,an ACV monophosphorylated prodrug bypasses the HHV requirement for HIV suppression.Furthermore,phosphorylated ACV directly inhibits HIV-1reverse transcriptase,terminating DNA chain elongation,and can trap RT at the termination site.These data suggest that ACV anti-HIV-1activity may contribute to the response of HIV/HHV-coinfected patients to ACV treatment and could guide strategies for the development of new HIV-1RT inhibitors.
对大多数病毒而言,都需要有针对其分子特性的靶向杀毒剂阿昔洛韦就是这样一种靶向药物在人疱疹病毒酶的特定作用下,阿昔洛韦被激活成为人疱疹病毒DNA聚合酶抑制剂,因此不能再抑制其它的病毒我们的研究发现阿昔洛韦在共感染人疱疹病毒的组织中可以抑制HIV-1,但在无人疱疹病毒感染的组织或细胞中无此作用然而,加入人疱疹病毒-6感染的细胞却使得其对抗HIV的阿昔洛韦变得敏感我们推测这种抑制作用依赖于人疱疹病毒酶导致的阿昔洛韦磷酸化实际上,单磷酸化的阿昔洛韦前体药物无需人疱疹病毒的参与即可抑制HIV此外,磷酸化的阿昔洛韦能直接抑制HIV-1逆转录酶,将其阻止在终止位点,从而终止DNA链的延长这些结果提示阿昔洛韦的抗HIV-1活性决定了艾滋病病毒/人疱疹病毒共感染的患者对阿昔洛韦的治疗反应,也有助于开发新的HIV-1逆转录酶抑制剂
-
In addition, the rising use of anti-virus software friend, usually after the poisoning, totally disconnected in the network your computer, if you opened the Rising "start scan" function, Rising is able to be injected after Jiesha The virus, but also to go through the above-mentioned methods to remove the virus completely.
另外,对于使用瑞星杀毒软件的朋友,通常在中毒之后,在完全断开网络的情况下启动电脑,如果您打开了瑞星的"开机扫描"功能,那么瑞星是能够截杀被注入后的病毒的,但也同样需要经过上述手法彻底清除病毒。
-
The Indian government, which has long been on alert for the virus because that country is on many migration paths in Asia, began killing half a million birds in the hopes of quashing the outbreaks, officials announced Sunday.
印度政府一直对禽流感病毒保持高度警惕,因为印度处在很多亚洲的候鸟迁徙线路上。周日官方宣布,政府已开始扑杀近50,0000只鸟类,希望能够遏制病毒的传播。
-
But the heat of your body is killing the virus.
但热你的身体是杀病毒。
-
And the seriousness that is based on harm of machine dog virus, golden hill poison bully newest the machine dog that roll out / AV terminator / 8749 trojans kill a tool only (the transmission characteristic that Www.duba.net/zhuansha/259.shtml) is aimed at machine dog virus, check kill more complete.
而基于机器狗病毒危害的严重性,金山毒霸最新推出的机器狗/AV终结者/8749木马专杀工具(www.duba.net/zhuansha/259.shtml)针对机器狗病毒的传播特点,查杀更彻底。
- 更多网络解释与杀病毒的相关的网络解释 [注:此内容来源于网络,仅供参考]
-
Antivirus:防病毒
免费瑞星在线杀毒,杀毒速度挺慢的,电脑上文件并不多,免费瑞星在线杀毒竟然杀了2个多小时才杀了一半,不知是不是瑞星本身的问题还是3gp伦理短片下载的安全技术,包括Spyware Doctor、防间谍软件(AntiSpyware)、防病毒(AntiVirus)和Firewall Plus,
-
apron:围裙
十四、目前穿戴之个人防护装备(PPE)包括: 可提供适当呼吸防护的口罩(规格详见後述) 单双包装之手套 护目设备 抛弃式长袍(gown) 围裙(apron) 可消毒式脚套十七、应由穿戴个人防护装备(PPE)之员工以经认可可杀病毒之广效性消毒
-
central point:中心点
电脑病毒的数量持续上升,在这一年已经增加到几百种,杀毒软件这一行业也日益活跃,两个重要的工具软件开发商:"赛门铁克"(Symantec)和"中心点"(Central Point)公司推出了自己的杀毒软件.
-
Eddie:埃迪
"黑暗复仇者"(Dark Avenger)/"埃迪"(Eddie)病毒是最早的反杀毒软件病毒. 该病毒会删除部分杀毒软件. "费雷多"(Frodo)病毒出现. 这个病毒感染文件后具有一定隐蔽性,当用户对被感染计算机进行目录列表检查时,被感染文件的大小也不会发生改变,
-
gown:长袍
十四、目前穿戴之个人防护装备(PPE)包括: 可提供适当呼吸防护的口罩(规格详见後述) 单双包装之手套 护目设备 抛弃式长袍(gown) 围裙(apron) 可消毒式脚套十七、应由穿戴个人防护装备(PPE)之员工以经认可可杀病毒之广效性消毒
-
The Hitcher:幽灵终结者
最后,当所有的外星生物都被消灭,唯一剩下的那只瑞普莉却学>(The Hitcher)里的鲁格豪尔,以搭便车杀驾驶的方式一步步来到波士顿水库边,企图在水中播下病毒,结果如何,看完观众自有分晓;只是这样一路拆解下来,
-
Michelangelo:米开朗基罗
"米开朗基罗"(Michelangelo)病毒出现后感染所有类型的磁碟. 但是,该病毒的散播范围比媒体预先估计的要小一些. Satanbug病毒具有很强的反杀毒软件功能:该变种能够检查到四种杀毒软件,并且破坏相关磁碟. 这是杀毒软件研究人员历史上第一次和美国联邦调查局(FBI)联手逮捕并且起诉了这个还是孩子的病毒编写者
-
VIR:NortonAnti-Virus:或其他杀毒产品用于标识被病毒感染的文件
VIFF:KhorosVisualisation格式 | VIR:NortonAnti-Virus或其他杀毒产品用于标识被病毒感染的文件 | VIV:VivoActivePlayer流视频文件
-
virucidal:杀病毒的
virtual viscosity 有效粘度 | virucidal 杀病毒的 | virucide 杀病毒剂
-
viricidal:杀病毒的
virgin oil 初榨(橄榄)油 | viricidal 杀病毒的 | viricide 杀病毒剂