• 用于磁盘驱动器图标添加界面上。

    Use to add a disk drive icon to an interface.

    youdao

  • 提示这个方法只是隐藏驱动器图标用户使用其他方法访问驱动器内容地址直接键入驱动器目录路径。

    Clew: This method just conceals driver icon, the user still can use other method to visit the content of driver, if key in the catalog method on driver directly in address column.

    youdao

  • 最后并非最不重要的,提供快速访问内容的第二模式放在通过系统托盘图标US B驱动器

    And last but not least, it provides a fairly quick mode to access the content placed on a USB drive via the System Tray icon.

    youdao

  • Knoppix可以自动辨认出来Zip驱动器软盘以及US b存贮设备图标显示桌面上。

    Zip drives, floppy disks, and USB storage devices will be automatically recognized by Knoppix, and ICONS will be placed on the desktop.

    youdao

  • Mepis不会自动发现所有硬盘驱动器分区但是桌面上有用来挂载分区的图标(需要用户了解mount命令参数)。

    Mepis does not automatically mount all the HDD partitions it finds, but it includes an icon on the desktop to mount partitions (without requiring users to know arguments for the mount command).

    youdao

  • 一旦安装完毕USB安全删除系统托盘区的图标自动检测驱动器已经连接PC

    Once installed, USB Safely Remove creates an icon in the system tray area and automatically detects pen drives already connected to the PC.

    youdao

  • 变化病毒定义文件夹属性,在驱动器系统隐藏”,自身复制根,重命名隐藏文件夹文件夹的图标

    Virus defined in changes the attribute of folders in root of drives to "System hidden" and copies itself to root and renames as the hidden folders with the icon of the folders.

    youdao

  • 除了图标地位每个驱动器显示谷歌看到硬盘驱动器温度

    In addition to the status ICONS for each drive shown on Google Sidebar, you will also see your hard drive temperature.

    youdao

  • 用户Windows资源管理器打开这个驱动器任何其他应用程序解析快捷方式图标驱动器受害者系统执行攻击者选择恶意代码

    When the user opens this drive in Windows Explorer, or any other application that parses the icon of the shortcut, the malicious binary will execute code of the attacker's choice on the victim system.

    youdao

  • 用户Windows资源管理器打开这个驱动器任何其他应用程序解析快捷方式图标驱动器受害者系统执行攻击者选择恶意代码

    When the user opens this drive in Windows Explorer, or any other application that parses the icon of the shortcut, the malicious binary will execute code of the attacker's choice on the victim system.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定