trojans

美 [ˈtroʊdʒən]英 [ˈtrəʊdʒ(ə)n]
  • n.〈口〉勤勉的人;拳击家;酒友;特洛伊人
  • adj.特洛伊 城[人]的
  • 网络木马;特洛伊木马;木马程式

复数:Trojans

trojanstrojans

trojans

木马

...感区域、特定目录的扫描,全面查杀隐藏在系统中的各类木马Trojans)、后门(Backdoors)、蠕虫(Worms)、间谍软 …

特洛伊木马

... 分布式拒绝服务攻击( DDOS - Distributed Denial of Service ) 特洛伊木马( Trojans ) 自动响应( Automated Response ) ...

木马程式

员工将木马程式Trojans)、蠕虫(Worms)甚至病毒(Viruses)带进公司内部网路-其可能是心怀不轨想要采取报复行动, …

木马程序

员工将木马程序Trojans)、蠕虫(Worms)甚至病毒(Viruses)带进公司内部网络-可能是恶意要采取报复行动,或者只是 …

特洛伊人

7 —— 南加州大学(USC) “特洛伊人” (Trojans) (注:USC女队叫做特洛伊女战士‘Women of Troy’)USC的昵称“特洛伊人”显得很 …

特洛伊木马程式

特洛伊木马程式Trojans) 广告软体(Adware) ....Leopard如果可以安装在X86上应该也没中毒的疑虑吧?私人讯息 引用连结 …

特洛伊人队

NCAA 美国大学男子篮球各联盟的学校... ... (Paladins 侠客队) (Trojans 特洛伊人队) (Huskies 爱斯基摩犬队) ...

1
The Trojans interpreted it as a sign that it was alright to let the gift horse in without looking into its contents. 木马解释为一个信号,表明它是好的,让没有寻找到它的内容在它马的礼物。
2
If you, Patroclus, could be in his armor, and perhaps the very sight of it may drive back the Trojans. 普特洛克勒斯,如果你能穿上他的盔甲,也许能令特洛伊人望而生畏、退避三舍。
3
Process is trying to register its copy as startup autorun object . This behaviour is typical of Trojans . 进程试图注册它的副本为开机自动运行对象。这种行为是木马的特征。
4
or be in the server start in join now the starting program of any popular trojans, consequence is unimaginable also. 或是在服务器的启动项中加入现在任何流行木马的启动程序,后果也不堪设想。
5
Customers embrace its iconic device, and then, like the hapless Trojans, find they have fallen into the hands of the gift-givers. 消费者信奉的是它的苹果徽标,然而之后却像不幸的特洛伊一样,发现自己落入了送礼人的圈套之中。
6
The Trojans had no warning of the attack. No time to gather together their soldiers. Greek warriors appeared out of the night like ghosts. 特洛伊人事先没有收到任何袭击警报号,他们还没来得及召集士兵,希腊士兵就已如天兵般出现在夜色里。
7
Trojans exploit vulnerabilities of banking software used by clients to carry out transactions over the Internet. 利用木马客户端用于通过互联网进行交易的银行软件的漏洞。
8
This has long been a standard modus operandi for many PC viruses and Trojans. 而这是长久以来,个人电脑病毒和特洛伊木马所惯用的伎俩。
9
He said Trojans worked very hard to protect their city. 他在诗作中说特洛伊人努力保护自己的城市。
10
Trojans can allow hackers to open backdoors on your system , giving them access to your files and even network connectivity . 木马可以让黑客打开后门进入你的系统,让他们存取档案,甚至网络连通。
11
Simply stated, trojans and droppers are malware that appear to be something they're not ( ala the original Trojan Horse). 简单的说,特洛伊木马和下载者是外表不像(原始的特洛伊木马)的恶意软件。
12
Some veteran hackers are now designing, tweaking and selling Trojans since it is the only thing they know, says Mr Wan. EagleWan表示,如今某些黑客老手在设计、改进和出售特洛伊木马,因为这些人只懂得这个。
13
Click on the harm of the Trojans , with the growth in online advertising growth, interest is the main driving force. 点击木马的危害范围是随着网络广告的增长而增长的,利益是最主要的推动力。
14
Quttera is unable and should not be used to detect Viruses and Trojans spreads as common computer programs or executable files. Quttera无法和不应该被用来检测病毒,特洛伊木马病毒传播作为共同的计算机程序或可执行文件。
15
The Trojans thought that the Greeks had given up and left the horse as a gift. 特洛伊人认为希腊人放弃了攻城并留下木马当作礼物。
16
The Trojans asleep, the Greek soldiers crept out of the hollow wooden horse. 特洛伊人睡着了,于是希腊士兵从中空的木马里悄悄爬了出来。
17
These Trojans harvest banking and payment information from local machines or even corporate servers and then forward it to the master. 这些木马收获银行和支付信息从本地机器,甚至公司的服务器,然后转发给主。
18
Trojans are malicious programs that hide themselves on your PC, record your passwords, and then send them to the hacker. 木马程式是一种会潜入用户个人电脑、暗自记录用户密码,并将所收集资讯送回骇客手上的恶意程式。
19
Web Shield in turn connects to the requested web server and while downloading the content it scans it for viruses and Trojans. 网页防护连接请求的网页服务器,在下载网页内容的时候扫描病毒和木马。
20
Speed Worm Malware Joke Reporter protects against viruses, trojans, spyware, adware, spam, phishing and Internet identity theft. 9下载速度蠕虫恶意玩笑记者盗窃抵御病毒,木马,间谍软件,广告软件,垃圾邮件,网络钓鱼和网络身份。
21
Unlike viruses, trojans do not self-replicate. 不像病毒,木马不自我复制。
22
For a long time, this group of Trojans constituted a significant portion of the daily 'catch' for antivirus companies worldwide. 长期以来,这个木马小组成立了一个日常的追赶反病毒公司在全球的很大一部分。
23
Perpetually Exploit Backdoor Bot Reporter is a tool to stay safe from dangerous spyware, worms, and Trojans. 35下载后门博特记者无穷的漏洞是一个工具,住宿安全,从危险的间谍软件木马,蠕虫和。
24
SMS trojans have been around for years on mobile phones, even predating the smartphones we all know and love. SMS木马在移动电话中传播已经有数年的历史了,出现日期甚至早于我们熟知和喜爱的智能手机。
25
The Trojans awoke from their dreams of peace to see their homes in flames . 特洛伊人从恬静的梦中醒来,看到他们的家宅在燃烧。
26
The Trojans, at the sight of the well-known armor, struck with terror, looked everywhere for refuge. 特洛伊人一看到那赫赫有名的战甲,果然惊慌失措,四散逃开,到处寻找避难所。
27
When Odysseus left Ithaca to fight the Trojans, he entrusted Mentor, a good friend, with his home, lands and wealth. 当奥德赛离开伊萨卡跟特洛伊作战时,他将他的家、土地和财产委托给一位好朋友曼托。
28
Trojan. Dropper is a Trojan horse that drops Trojan horses or back door Trojans onto compromised computers. Trojan. Dropper是特洛伊木马跌落特洛伊木马或后门木马程序的计算机上妥协。
29
Nonetheless, its detection means it is highly likely there are other, more suitable Trojans out there waiting to be found. 不过,这一发现意味着很可能存在着其他更合适的特洛伊小行星有待发现。
30
The occasion of the dead of night, Trojans, the Greek soldiers hiding belly open gates, the fall of Troy. 夜深人静之际,木马腹中躲藏的希腊士兵打开城门,特洛伊沦陷。