英语人>网络例句>Trojan horse 相关的网络例句
Trojan horse相关的网络例句

查询词典 Trojan horse

与 Trojan horse 相关的网络例句 [注:此内容来源于网络,仅供参考]

This is the Greek legend of the Trojan Horse.

这就是希腊传说中的木马计。

A Trojan Horse program,it is used for study.

一个木马程序,用来学习用的。

Downloading from unpoliced P2P networks can be a dicey proposition thanks to virus- and Trojan-horse-infected files.

从不受监管的P2P网络下载文件将可能下载到被病毒和木马感染的文件。

PPMate is a webTV on the Internet large-scale software PPMate in the development and launch full account of the user's experience, does not include any plug-ins, such as the Trojan horse program, Green is a solemn commitment to free network TV software.

PPMate在开发及推出时充分考虑用户的感受,不包括任何插件、木马等程序,郑重承诺是一个绿色免费网络电视软件。

For first aspect, previous studies have shown that the adoptively transferred stem cell have characteristics to target and to migrate to tumor lesion in vivo. Therefore, human mesenchymal stem cells were used to target murine sarcoma-derived lung metastases and viewed as a "Trojan Horse".

第一部分是利用干细胞具有活体趋癌的特性,以人类间叶干细胞为媒介追踪由小鼠肉瘤细胞引起之肺脏转移,并结合蛋白质疫苗针对干细胞趋癌所诱发体内免疫来抑制肿瘤之生长。

The E-payment has spawned new classes of injuries, such as the flood of online Trojan horse programs, virus and Phishing website and Credit card fraud, signature forgery and identity theft far more widespread "offline", which are choking E-payment and bilking unwary consumers.

有些客户因担心太容易被欺诈和侵害,拒绝电子支付服务。

Causes harm: Launches a denial of service attack at a target IP address, defaces Web servers, or plants Trojan horse programs for later execution.

损害原因:对一个目标IP地址实施一个拒绝服务攻击,损伤Web服务器,或者放上一个木马程序用来稍候执行。

Characteristics of blended threats include the following:· Causes harm: Launches a denial of service attack at a target IP address, defaces Web servers, or plants Trojan horse programs for later execution.

被混和的害虫的特征包含有如下几个方面:·损害原因:对一个目标IP地址实施一个拒绝服务攻击,损伤Web服务器,或者放上一个木马程序用来稍候执行。

Characteristics of blended threats include the following:· Causes harm: Launches a denial of service attack at a target IP address, defaces Web servers, or plants Trojan horse programs for later execution.

被混和 害虫特征包含如下几个方面:·损害原因:对个目标IP地址实施个拒绝服务攻击,损伤Web服务器,或者放上个木马程序用来稍候执行。

In this paper, we analyzed one of the methods of attacking- Trojan horse and explicated the methods of the prevention.

本文重点分析了黑客攻击的手段之一—木马,并提出清除与防范手段,对广大网民具有一定实际意义

第3/8页 首页 < 1 2 3 4 5 6 7 8 > 尾页
相关中文对照歌词
Trojan Horse
推荐网络例句

In the negative and interrogative forms, of course, this is identical to the non-emphatic forms.

。但是,在否定句或疑问句里,这种带有"do"的方法表达的效果却没有什么强调的意思。

Go down on one's knees;kneel down

屈膝跪下。。。下跪祈祷

Nusa lembongan : Bali's sister island, coral and sand beaches, crystal clear water, surfing.

Nusa Dua :豪华度假村,冲浪和潜水,沙滩,水晶般晶莹剔透的水,网络冲浪。