Trojan

[ˈtroʊdʒən][ˈtrəʊdʒən]

n.特洛伊

  • Through studying techniques of the Trojan and anti-Trojan this paper presents the Trojan-detection technology based on behavioral analysis .

    本文通过对 木马及木马检测技术的研究,提出了基于行为分析的木马检测技术。

  • This paper introduces the port scan and Trojan horse detection model pieces in it .

    这里主要介绍其中的端口扫描和 木马检测两个模块。

  • Applied the artificial immune principle in the Trojan detection because of the adaptive and the immunity study capacity .

    利用人工免疫具有自适应以及免疫学习能力的特点,将人工免疫原理应用到 木马检测中。

  • I simulate what a virus trojan or other malicious program can do to your computer .

    i模拟什么病毒, 特洛伊 木马 病毒或其他恶意程式可以做你的电脑。

  • I don 't want to see another Trojan die because of me .

    我不想看见 特洛伊人再为我送命了。

  • Establishment of a model system to the detection and defence against the Trojan horses based on the artifical immunology .

    提出了一个基于人工免疫机制的 木马检测与防御模型。

  • Many computer viruses worms and trojan horses are designed to exploit weak passwords .

    很多计算机病毒、蠕虫和 特洛伊 木马的设计都利用了弱口令。

  • In the case of networks used as spamming platforms a Trojan proxy server will penetrate the victim machines .

    在作为垃圾邮件平台使用网络情况下, 木马代理服务器将渗透到受害者的电脑。

  • The term Backdoor describes a specific group of Trojan Horses .

    任期后门描述的一个特定群体, 特洛伊 木马 程式

  • My special period was Trojan and hadrian .

    我专门研究的是 特洛伊和哈德良”历史时期。

  • Operating systems can be brought to a halt by a Trojan Horse .

    操作系统可能会因为 木马 病毒 攻击而中止。

  • They were defeated because of the Trojan horses in their country .

    他们被打败了,因为他们的国家出现了 奸细

  • This Trojan allows attackers to access your computer stealing passwords and personal data .

    这个 木马运行攻击者访问你的计算机,窃取密码和个人数据。

  • Of course there may be a time when you were malicious access to your computer intrusion and placed a Trojan horse .

    当然,还有一种可能是当你上网时被人恶意侵入了你的计算机,并放置了 木马 程序

  • Is it a virus a worm a Trojan or a backdoor ?

    判断任何任意的程序是一个病毒、蠕虫、 木马,还是后门?

  • This paper introduces the Trojan horse and its damage to computer system and advances some methods and defensive measures for killing the Trojan horse .

    介绍了 木马 病毒及其对计算机系统的危害性,提出了几种查杀木马病毒的方法和防御措施。

  • Research of Trojan Detection System Based on Artificial Immune

    人工免疫机制在 木马检测系统中的应用研究

  • Was Colombo the emissary of Pope Paul his Trojan horse within the Commission ?

    科隆博是教皇保罗的特使吗?是他在委员会内部设下的 卧底吗?

  • This floppy disk has trojan virus which must be killed first .

    这个软盘带有 木马病毒,必须先杀毒。

  • Both factions accused each other of using the organization as a Trojan horse to advance their causes .

    两派都相互指责对方利用该组织作 幌子以发展各自的事业。

  • For example viruses worms and Trojan horses are malicious software .

    例如,病毒、蠕虫以及 特洛伊 木马都属于恶意软件。

  • Do not take your Trojan challenging my password .

    别拿你的 木马,挑战我的密码。

  • Key Technology of Linux Trojan Horse

    Linux 特洛伊 木马关键技术研究

  • Antispyware XP2009 is distributed via different online security scanners Trojan horses misleading sites malicious software .

    反间谍XP的2009年是通过不同的分布式网络安全扫描, 木马,误导性网站,恶意软件。

  • Trojan horse attacking strategy on quantum cryptography is investigated .

    研究了 特洛伊 木马对量子密码算法的攻击。

  • There is no evidence of a Trojan horse on your system .

    在您的系统中没有发现 木马

  • Covert channels and Trojan code .

    隐藏的通道和 特洛伊编码。

  • Nothing will slow your system down like a virus a Trojan horse or other types of malware .

    没有任何东西比病毒, 特洛伊 木马或者其他恶意软件更能减慢你系统速度的了。