• Like their biological namesakes, computer viruses replicate by attaching themselves to a host (a program, or a computer) and coopting the host's resources to copy themselves.

    就像他们生物学中的同名物一样计算机病毒复制时就是将自己俯身于宿主上(一个程序或是计算机),然后利用宿主资源复制自己。

    youdao

  • This program can then execute qmail-queue as necessary, which might be useful, for example, to filter out email messages that contain viruses.

    这个程序可以执行所需的qmail-queue,可能有用过滤哪些包含病毒的邮件消息

    youdao

  • Shell viruses wrap themselves around a host program and don't modify the original program.Shell programs are easy to writewhich is why about half of viruses are of this type

    外壳病毒将它们自己包裹程序四周,对源程序修改。 外壳型病毒容易编写正是有一半病毒程序这种类型原因。

    youdao

  • A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. All computer viruses are manmade.

    计算机病毒一个程序或者代码觉察时进入你的电脑,从事违反意愿的活动。所有病毒出来的。

    youdao

  • Computer viruses and other legal procedures, is an executable program, but it is not a complete program, but parasitic in other executable program, so it enjoys all the program can get power.

    计算机病毒其他合法程序一样,段可执行程序不是完整的程序,而是寄生其他可执行程序上,因此享有一切程序所能得到权力

    youdao

  • The cell phone virus is a computer program, and other computer viruses (procedures) with the same infectious and destructive.

    手机病毒也是一种计算机程序其它计算机病毒(程序)一样具有传染性破坏性

    youdao

  • Once attached to the host program, the viruses then look for other programs to "infect".

    病毒程序一旦附加一个程序上,就开始寻找其他可以进行“感染”的程序

    youdao

  • The program can even neutralize all current and future email viruses.

    计划甚至可以抵消所有当前未来电子邮件病毒

    youdao

  • By extracting the program behavior pattern which matches with virus's behavior pattern, thus the purpose of detecting unknown viruses is reached.

    方法通过抽取程序行为模式,将之病毒行为模式进行匹配,达到检测未知病毒目的

    youdao

  • Todays viruses are being written to attack a specific person, company or program.

    如今病毒用来攻击特定公司程序

    youdao

  • Shell and intrusive viruses most commonly attack executable program flies-those with a. com or. exe extension, although data flies are also at some risk.

    外壳型入侵型病毒通常攻击可执行文件,即带有或扩展名的文件。当然数据文件受攻击的危险

    youdao

  • Once attached to me host program, the viruses then look for other programs to "infect".

    病毒一但注入(附属)的宿主程序后﹐他寻求别的程序并且感染它们。

    youdao

  • Since new viruses are created and released daily, the antivirus program must update its database frequently.

    因为病毒天天创建发布病毒程序必须频繁地更新(病毒特征)数据库

    youdao

  • A more effective antivirus program is going to have less work to do, because viruses will have fewer opportunities to attack your systems.

    一个有效的反病毒程序机会被激活,因为攻击系统病毒数量更了。

    youdao

  • Viruses are usually not able to run on their own, they always need a host program where they can attach with to be started.

    通常病毒自身无法自我运行它们通常需要一个可以接触启动它们的程序才可以运行。

    youdao

  • Viruses are usually not able to run on their own, they always need a host program where they can attach with to be started.

    通常病毒自身无法自我运行它们通常需要一个可以接触启动它们的程序才可以运行。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定