蠕虫的
- 与 蠕虫的 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
So, in this paper, the novel concepts of mature friendly worm, memory friendly worm and bacterin friendly worm are presented according to the idea of biology immune, and a novel Internet worm immune model is built based on the novel concepts above.
因此本文通过借鉴生物免疫思想,在提出了成熟良性蠕虫、记忆良性蠕虫和疫苗良性蠕虫这三种良性蠕虫新概念的基础上,建立了新的网络蠕虫免疫模型。
-
Some sea worms, such as the bristle worm, wander the sea floor with a covering of tiny bristles that can deliver a painful sting if threatened.
一些海上蠕虫,如刚毛蠕虫,徜徉海楼一个涵盖微小的刷毛可以为消费者提供一个痛苦螫如果受到威胁。
-
It was at Worms that the envoys of these high contracting parties met, and on September 23, 1122, they produced the two statements, papal and imperial, which, together, constitute the Concordat of Worms.
正是在蠕虫特使这些缔约各方会晤,并於1122年9月23日,他们制作了两份声明,教皇和帝国,其中一起,构成了协约的蠕虫。
-
It includes four parts: 1 Part I, it introduces the basic knowledge of computer viruses such as computer virus definition, history and important viruses events, features, behavior phenomena, difference with computer software and hardware troubles, damage behavior and capability, classification, naming, future trend, etc; 2 Part II, it introduces the corresponding knowledge of computer systems related to computer viruses such as the composing of software and hardware of the computer system, storage media and its working mechanism, interrupt technologies,.com/.exe/.pe file formats and their working mechanism, etc; 3 Part III, it introduces computer virus mechanism and theory such as computer virus structure, work flow, working mechanism of key modules, typical technologies used to design computer viruses including the corresponding traditional technologies (interrupt filching, memory resident, etc.), the corresponding new routine technologies (self-encrypting, Mutation Engine, etc.), and the corresponding new technologies used by some prevalence computer viruses such as macro viruses, e-mail viruses, worm, hacker, Trojan, mobile phone viruses, the working mechanism analysis of some kinds of typical and prevalence computer viruses such as file-type viruses, macro viruses, e-mail viruses, worm viruses, hacker, Trojan, mobile phone viruses, the analysis of some typical and prevalence computer viruses examples including BALL viruses, WORD macro viruses, WantJob viruses, Code Red viruses, BO Trojan, etc; 4 Part IV, it introduces the defense and killing technologies of computer viruses such as the aim and criterion of computer viruses defense and killing, prevention methods and corresponding technologies, detection technologies (comparison method, character code scanning method, behavior inspecting method, analysis method, etc.), manual and automatic killing technologies, immunity technologies such as IBM digital immunity system, new anti-viruses technology trends (real-time anti-viruses technologies, 32 kernel technologies, active kernel technologies, etc.), some typical virus defense and killing softwares (Symantec AntiVirus product, PC-Cillin AntiVirus product, etc.), the defense and killing method analysis of some kinds of typical and prevalence computer viruses (file-type viruses, macro viruses, worm viruses, hacker, etc.), for example, firewall and intrusion detection technologies for anti-hacker, the defense and killing of some typical and prevalence computer viruses examples including WORD macro viruses, Code Red viruses, BO Trojan, etc.
课程内容具体包括四大部分:1)第一部分,介绍计算机病毒基本知识,包括:计算机病毒定义、病毒发展史及重大事件、病毒特点、病毒表现现象及与软硬件故障的区别、病毒破坏行为及危害性、病毒的传播途径及媒介、病毒分类、病毒的命名及计算机病毒技术发展趋势等内容;2)第二部分,介绍与计算机病毒有关的计算机系统相关知识,包括:计算机系统软硬件组成、存储介质结构及工作原理、计算机系统引导机理及流程、中断技术、。com/。exe/。pe等文件格式及工作机理等内容;3)第三部分,讲解计算机病毒机理,包括:计算机病毒的组成结构、病毒工作流程、病毒引导/触发/感染/破坏等模块的工作机理、计算机病毒所采取的编制技术(包括中断窃取/内存驻留等传统编制技术、自加密/隐形/变形机等新的常规编制技术、宏病毒/电子邮件病毒/网络蠕虫/特洛伊木马/黑客/手机病毒等一些新的流行病毒所采取的编制技术等)、一些类型的典型或流行计算机病毒的工作机理分析(包括:引导型病毒、文件型病毒、宏病毒、电子邮件病毒、蠕虫病毒、黑客、特洛伊木马、手机病毒等)、一些典型或流行的计算机病毒实例剖析(包括:小球病毒、WORD宏病毒、求职信病毒、红色代码病毒、冰河木马等)等内容;4)第四部分,讲解计算机病毒防治技术,包括:计算机病毒防治目的、病毒防治策略及规范、病毒在管理和技术上的预防措施、病毒检查技术(包括:比较法/病毒特征码扫描法/行为监测法/虚拟执行法/分析法等)、手工和自动病毒清杀技术、病毒免疫技术(包括:针对某种一次性感染病毒的基于病毒标签的免疫方法/基于自我完整性检查的计算机病毒免疫方法/IBM的数字免疫系统等)、反病毒技术的新发展(包括:实时反病毒技术/32位内核技术/主动内核技术/以毒攻毒技术等)、诺顿/趋势/金山等公司的病毒防治软件产品、一些类型的典型或流行的计算机病毒(包括:引导型病毒、文件型病毒、宏病毒、蠕虫病毒、电子邮件病毒、手机病毒、黑客、特洛伊木马)的防治措施(其中,也包括介绍面向防范黑客攻击的防火墙、入侵检测技术)、一些典型或流行的计算机病毒防治实例剖析(包括:WORD宏病毒、红色代码病毒、冰河木马v1.1/v2.2等)、多层次病毒防护体系等内容。
-
To contracting this vermian computer user, virus software prevents in suggesting to open a system " systematic monitoring " function, from register the many sided such as process of watch, system, memory, network to have active defence to all sorts of operations, so OK for a short while monitoring is sealed of virus inbreak activity, achieve all-around the purpose that protects security of all of computer science department.
对未感染该蠕虫的计算机用户,建议打开系统中防病毒软件的&系统监控&功能,从注册表、系统进程、内存、网络等多方面对各种操作进行主动防御,这样可以第一时间监控未知病毒的入侵活动,达到全方位保护计算机系统安全的目的。据新华社
-
I am talking about abseiling down the flagpole in Dataran Merdeka, Abseiling down Berjaya Times Square, Doing rope traverse in the middle of KL Bird Park, eating worms as part of the mystery test, going around Federal Hill looking for obscure JKR numbered home address, counting light poles in some historical mansion along Jalan Ampang.
我说的绳降下来的旗杆在Dataran Merdeka的绳索下降Berjaya时代广场,做好绳遍历中间吉隆坡飞禽公园,吃蠕虫的一部分神秘的测试,四处寻找联邦山模糊公共工程局编号为家庭地址,计数灯杆历史上的一些大厦沿安邦路。
-
The failure frequency of FCC and heavy-tailed property based worm detection algorithm is used as the kernel of the detection system.
在分析蠕虫传播机制基础上,基于入侵检测系统Bro的整体框架,以基于FCC(First Contact Connections,第一次连接)失败概率和重尾特性的蠕虫检测算法为核心,设计并实现了基于Bro的蠕虫检测系统。
-
This lizard's name, krokodilos, is thought to be a compound of krok,"pebble, gravel," and drilos, which is only attested as meaning "circumcised man" but is assumed to mean "worm" as well.
这种蜥蜴的名字krokodilos 被认为是由 kroke一词和 drilos 这一(只被证明有&受割的人&的意思但又被假定有&蠕虫&的意思的)词组成的复合词。
-
Then, biological phase of the system was observed, and it was found that the appearance of predations could have contributions to the reduction of membrane fouling and increases of the removals of the organic pollutants, but it was unfavorable to the removals of total phosphorus and turbidity.
并且在试验过程中,对系统中的生物相进行了分析,发现高浓度蠕虫的出现,有利于膜污染的减缓和有机物的去除,但会影响总磷和浊度的去除。
-
Although some methods already exist for worm gear design and the design integration has been seen in some engineering design areas, however, the integration of multiple techniques into the whole design process of worm gearing has not been seen in the literature, and, hence, the approach reported in this paper is an important contribution to worm gear design.
虽然一些方法为蠕虫齿轮设计已经存在并且设计综合化看了在一些工程设计区域,然而,多个技术的综合化入蠕虫连动的整体设计过程未看在文学,并且,因此,方法被报告在本文里是对蠕虫齿轮设计的重要贡献。
- 推荐网络例句
-
Plunder melds and run with this jewel!
掠夺melds和运行与此宝石!
-
My dream is to be a crazy growing tree and extend at the edge between the city and the forest.
此刻,也许正是在通往天国的路上,我体验着这白色的晕旋。
-
When you click Save, you save the file to the host′s hard disk or server, not to your own machine.
单击"保存"会将文件保存到主持人的硬盘或服务器上,而不是您自己的计算机上。