• This paper analyses the harm of malicious mobile code and presents a radical solution of the harm of malicious mobile code and some self safeguards.

    介绍恶意移动代码危险性能力,提出了防止恶意移动代码的一些方法和一些自我保护的措施。

    youdao

  • Code (software) that is transferred from a host to a client (or another host computer) to be executed (run). When we talk about malicious mobile code we may use a Worm as an example.

    代码(软件)主机传送客户机上(或者传送到另一台主机上)执行(运行)。譬如蠕虫

    youdao

  • Unfortunately, many computer users have experienced firsthand the effects of malicious mobile code, including viruses and worms, which can damage or destroy data and cost time and money.

    遗憾是,许多计算机用户亲身体验过恶意移动代码(包括病毒蠕虫)造成的后果这些代码可能会损坏毁坏数据会浪费时间和资金。

    youdao

  • So protection technologies of mobile code in malicious host attract much attention and there are very important theoretical and practical significance.

    因此恶意主机环境下移动代码保护技术研究具有重要理论现实意义受到极大重视

    youdao

  • For any mobileapplication, since the client code runs on a mobile device, it's possible thatan untrustworthy client could edit that code and issue malicious requests.

    很多手机应用,由于客户端的代码运行手机装置上,这个客户端可能不值得信任可能编辑代码发出恶意请求

    youdao

  • Among these security problems, how to protect mobile code from malicious host is a new issue that cannot be dealt by traditional technologies.

    这些安全问题中,如何保护移动代码不受主机的损害传统安全技术无法处理需求

    youdao

  • Among these security problems, how to protect mobile code from malicious host is a new issue that cannot be dealt by traditional technologies.

    这些安全问题中,如何保护移动代码不受主机的损害传统安全技术无法处理需求

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定