英语人>网络例句>Trojan horse 相关的网络例句
Trojan horse相关的网络例句

查询词典 Trojan horse

与 Trojan horse 相关的网络例句 [注:此内容来源于网络,仅供参考]

This is the Greek legend of the Trojan Horse.

这就是希腊传说中的木马计。

A Trojan Horse program,it is used for study.

一个木马程序,用来学习用的。

Downloading from unpoliced P2P networks can be a dicey proposition thanks to virus- and Trojan-horse-infected files.

从不受监管的P2P网络下载文件将可能下载到被病毒和木马感染的文件。

PPMate is a webTV on the Internet large-scale software PPMate in the development and launch full account of the user's experience, does not include any plug-ins, such as the Trojan horse program, Green is a solemn commitment to free network TV software.

PPMate在开发及推出时充分考虑用户的感受,不包括任何插件、木马等程序,郑重承诺是一个绿色免费网络电视软件。

For first aspect, previous studies have shown that the adoptively transferred stem cell have characteristics to target and to migrate to tumor lesion in vivo. Therefore, human mesenchymal stem cells were used to target murine sarcoma-derived lung metastases and viewed as a "Trojan Horse".

第一部分是利用干细胞具有活体趋癌的特性,以人类间叶干细胞为媒介追踪由小鼠肉瘤细胞引起之肺脏转移,并结合蛋白质疫苗针对干细胞趋癌所诱发体内免疫来抑制肿瘤之生长。

The E-payment has spawned new classes of injuries, such as the flood of online Trojan horse programs, virus and Phishing website and Credit card fraud, signature forgery and identity theft far more widespread "offline", which are choking E-payment and bilking unwary consumers.

有些客户因担心太容易被欺诈和侵害,拒绝电子支付服务。

Causes harm: Launches a denial of service attack at a target IP address, defaces Web servers, or plants Trojan horse programs for later execution.

损害原因:对一个目标IP地址实施一个拒绝服务攻击,损伤Web服务器,或者放上一个木马程序用来稍候执行。

Characteristics of blended threats include the following:· Causes harm: Launches a denial of service attack at a target IP address, defaces Web servers, or plants Trojan horse programs for later execution.

被混和的害虫的特征包含有如下几个方面:·损害原因:对一个目标IP地址实施一个拒绝服务攻击,损伤Web服务器,或者放上一个木马程序用来稍候执行。

Characteristics of blended threats include the following:· Causes harm: Launches a denial of service attack at a target IP address, defaces Web servers, or plants Trojan horse programs for later execution.

被混和 害虫特征包含如下几个方面:·损害原因:对个目标IP地址实施个拒绝服务攻击,损伤Web服务器,或者放上个木马程序用来稍候执行。

In this paper, we analyzed one of the methods of attacking- Trojan horse and explicated the methods of the prevention.

本文重点分析了黑客攻击的手段之一—木马,并提出清除与防范手段,对广大网民具有一定实际意义

第3/8页 首页 < 1 2 3 4 5 6 7 8 > 尾页
相关中文对照歌词
Trojan Horse
推荐网络例句

As she looked at Warrington's manly face, and dark, melancholy eyes, she had settled in her mind that he must have been the victim of an unhappy attachment.

每逢看到沃林顿那刚毅的脸,那乌黑、忧郁的眼睛,她便会相信,他一定作过不幸的爱情的受害者。

Maybe they'll disappear into a pothole.

也许他们将在壶穴里消失

But because of its youthful corporate culture—most people are hustled out of the door in their mid-40s—it had no one to send.

但是因为该公司年轻的企业文化——大多数员工在40来岁的时候都被请出公司——一时间没有好的人选。