a trojan horse program, it is used for study.
一个木马程序,用来学习用的。
in some respects, the requirements to obtain the box is a trojan horse in your house. another potential source of income is the measurement bandwidth.
在某些方面,要求是特洛伊木马获得方块在您的房子。另一个潜在的收入来源是带宽计量。
he said the new malware, dubbed duqu, was a trojan horse designed to collect and relay back information about the host system.
他说这个被称为duqu的新病毒是一种特洛伊木马病毒,专门收集并反馈客户系统的信息。
or an attacker might be able to install a trojan horse program or unsolicited e-mail sending software, aim at financial enrichment or cause brand name damage by modifying company resources.
或攻击者可以安装一个特洛伊木马程序或不请自来的电子邮件发送软件,目的是在金融活动或造成损害品牌名称,修改公司的资源。
they claim that our insistence on something larger, something firmer and more honest in our public life is just a trojan horse for higher taxes and the abandonment of traditional values.
我们对民众生活中更庞大、更坚固和更正直的事物之坚持,就如同一只特洛伊木马,只会导致更高的税收,以及传统价值的流失。
trojan horse malware that masquerades as non-malicious software.
特洛伊木马软件,经常伪装成无害软件。
at last the paper describes the progress of executing trojan horse and affords all-around test result.
文中细致地描绘了木马的功能执行过程。最后提供了全面的测试结果。
based on that, has completed the design and the realization of a kind of kernel hacking trojan horse finally.
最后在此基础上完成了一个基于内核入侵的木马设计与实现。
assistant speculate in gold and completely free, no plug-ins, no trojan horse for the green software, you can extract, and do not need to install.
炒金小帮手完全免费,无插件,无木马,为绿色软件,解压即可用,无需安装。
the playstation 3 was used as a trojan horse to get this technology standard accepted by the world.
ps3当作推广这项技术的特洛伊木马。
conservative critics contend the movement is a trojan horse for a secret soros agenda.
有批评人士称,这场运动是索罗斯秘密计划的「特洛伊木马」。
arp discussed in the text of the virus in my fault, the fault principle. and gives the user inspection and handling of the 「arp spoofing」 trojan horse approach.
本人在文中讨论了arp病毒的故障现象、故障的原理、并给出了用户检查和处理「arp欺骗」木马的方法。
a better protection against trojan horses requires a thorough understanding of the work principles of the trojan horse program and methods of its application.
知己知彼方可百战不殆,要更好地防治木马,首先要深入了解木马程式的工作原理和使用方法。
the breakingpoint system delivered a strike level 5 test that included exploits, network worms, denial-of-service attack, reconnaissance attacks, trojan horse and backdoor intrusions.
breakingpoint的系统提供了一个5级强度的攻击测试,包括了侦测、网络蠕虫、拒绝服务攻击、踩点攻击、特洛伊木马和后门入侵。
outfitted with a keystroke-capture mechanism, the trojan horse records the user names and passwords.
自带了键盘输入机制的木马病毒就会记录下用户的网银账号和密码。
the trojan horse avoids antivirus software, fire wall's alarm, the perception of the system manager and decrease probability of being detected trojan horse.
防止杀毒软件和防火墻报警,并且尽量避免被系统管理员的察觉,减少被发现的概率。