• BreakingPoint系统提供一个5强度的攻击测试包括了侦测网络蠕虫拒绝服务攻击踩点攻击特洛伊木马后门入侵

    The BreakingPoint system delivered a strike level 5 test that included exploits, network worms, denial-of-service attack, reconnaissance attacks, Trojan horse and backdoor intrusions.

    youdao

  • 短期内后门相结合功能大多数其他类型木马一个封装中

    In short, backdoors combine the functionality of most other types of Trojans in one package.

    youdao

  • 特洛伊木马——这种程序进入系统并不复制自己可以用来打开系统的“后门”。

    Trojan Horse - a program that doesn't replicate when entering a system but can be effectively used to open 'back doors. '

    youdao

  • Rootkit后门-通常被称为特洛伊木马-通常可以分为本地节目网络服务

    Rootkit backdoorsoften called trojan horses — can typically be divided into two categories: local programs and network services.

    youdao

  • Rootkit后门-通常被称为特洛伊木马-通常可以分为本地节目网络服务

    Rootkit backdoorsoften called trojan horses — can typically be divided into two categories: local programs and network services.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定