Trojan horse

[ˈtrodʒən hɔrs][ˈtrəudʒən hɔ:s]

n.<希神>特洛伊木马,木马计,内部颠覆者

  • Design of Trojan Horse Detecting System-Based on Thread Management and Port Intercepting

    基于线程管理-端口截听的 木马检测系统的设计

  • Detection of Trojan Horse Based on Rootkit Technology

    面向Rootkit技术的 木马检测方法研究

  • Key Technology of Linux Trojan Horse

    Linux 特洛伊 木马关键技术研究

  • Research on Concealment Technology of Kernel-based Trojan Horse Under Windows

    Windows下内核 木马隐藏技术研究

  • A totally new project for Trojan horse auto-start is put foward by loading Trojan horse programs into OS service .

    分析其优缺点,提出利用操作系统服务加载木马程序的全新 木马自启动方案。

  • If an effective solution to share files infected with the virus Trojan horse issue we must be able to effectively suppress the virus Trojan horse or the enterprise network all sorts of crimes .

    若能够有效的解决共享文件的病毒 木马感染问题,必定可以有效的抑制病毒或者木马在企业网络中为非作歹。

  • The Research of the Injection and Defense of Web page Trojan Horse Based on Email

    基于邮件的网页 木马植入与防范方法研究

  • There is no evidence of a Trojan horse on your system .

    在您的系统中没有发现 木马

  • Kingsoft Antispy is a free internet security assistant especially in removing Trojan horse and other malicious softwares .

    金山清理专家是一款完全免费的上网安全辅助软件,针对流行 木马、恶意软件插件尤为有效。

  • Restart the computer and then to the registry will Trojan horse key to delete the file .

    重新启动计算机,然后再到注册表中将所有“ 木马”文件的键值删除。

  • Of course there may be a time when you were malicious access to your computer intrusion and placed a Trojan horse .

    当然,还有一种可能是当你上网时被人恶意侵入了你的计算机,并放置了 木马 程序

  • You can create a hash rule for a virus or a Trojan horse to prevent the malicious software from running .

    可以创建针对病毒或 特洛伊 木马 程序的哈希规则,以防止恶意软件运行。

  • Was Colombo the emissary of Pope Paul his Trojan horse within the Commission ?

    科隆博是教皇保罗的特使吗?是他在委员会内部设下的 卧底吗?

  • Operating systems can be brought to a halt by a Trojan Horse .

    操作系统可能会因为 木马 病毒 攻击而中止。

  • Both factions accused each other of using the organization as a Trojan horse to advance their causes .

    两派都相互指责对方利用该组织作 幌子以发展各自的事业。

  • Research is being described as the academic Trojan horse whose personnel have all but captured the city of the intellect .

    研究工作被描绘成学术 领域 特洛伊 木马 ,其工作人员几乎已经占领了智力城。

  • Nest was a Trojan horse into the home .

    Nest就是入侵家居 领域 特洛伊 木马

  • Design and Implementation of Remote Control System Based on Trojan Horse Technology

    基于 木马技术的远程控制系统设计与实现

  • What is a Trojan horse ?

    特洛 木马 病毒是什么?

  • This paper introduces the Trojan horse and its damage to computer system and advances some methods and defensive measures for killing the Trojan horse .

    介绍了 木马 病毒及其对计算机系统的危害性,提出了几种查杀木马病毒的方法和防御措施。

  • At last the famous Greek hero Odysseus came up with the Trojan horse trick made a huge wooden horse and put it out of Troy .

    最后,希腊著名的英雄奥德修斯想出了一个 木马计,用木头做了一匹巨马,放在特洛伊城外。

  • This paper introduces the port scan and Trojan horse detection model pieces in it .

    这里主要介绍其中的端口扫描和 木马检测两个模块。

  • Research on Trojan Horse Detection Based-on Heuristic Analysis

    基于启发式分析的 木马检测技术研究

  • It is a backdoor Trojan horse and gives remote access to your computer .

    木马允许攻击者远程控制您的电脑。

  • Trojan horse attacking strategy on quantum cryptography is investigated .

    研究了 特洛伊 木马对量子密码算法的攻击。

  • Nothing will slow your system down like a virus a Trojan horse or other types of malware .

    没有任何东西比病毒, 特洛伊 木马或者其他恶意软件更能减慢你系统速度的了。

  • This paper has discussed the operation principle of the Trojan horse virus that caused the harm greatly to computer security .

    讨论对计算机安全危害极大的 木马病毒的工作原理。