最简单的方法就是用病毒代码改写可执行文件的开头部分。
The simplest way ( and the least subtle ) was to overwrite the first part of the executable file with the virus code.
它通过寻找计算机病毒的“签名”(已知计算机病毒代码的标本)来做这件事情。
It does this by looking for virus "signatures" - chunks of computer code from known viruses.
Feschotte提议将少量病毒代码注入禽类的基因里,可能产生对同类病毒的抗体。
Feschotte suggests that it is likely having a bit of the virus's code integrated in a bird's genome might have conferred immune protection against similar viruses.
然而,另一个稍晚开始比赛的小组用了两小时二十五分成功的完成了所有九个病毒代码样本的伪装。
However, another team started later but successfully obfuscated all nine samples of malicious code in 2 hours 25 minutes.
耍酷的猪病毒-用户运行了含有MSNWorm .EI蠕虫病毒代码的文件后,电脑上就弹出一张化了妆带着项链和太阳眼镜的猪的图片。
The cool pig - When users run a file containing the MSNWorm. EI code, the worm displays a photo of a pig with makeup, necklaces and sunglasses.
由新西兰安全研究者Simon Howard运营的备受争议的“零病毒检测”竞赛允许各个参赛队伪装计算机病毒代码和漏洞利用代码样本。
The controversial Race to Zero contest, run by New Zealand security researcher Simon Howard, allowed each team to try to obfuscate real computer viruses and exploit code samples.
但对普通计算机用户来说,只需采取一些常识性步骤即可免受病毒和其它恶意代码的侵扰。
But for the average computer user there are some common-sense steps that can help protect against viruses and other malicious computer code.
说到生产代码,DI的一个缺点是它可能感染病毒。
Speaking of production code, one downside to DI is that it can feel viral.
这些所谓的病毒化石并不是矿化后的遗迹,而是存在于现在宿主机体里的基因代码。
These so-called viral fossils are not mineralized relics but rather bits of genetic code held over in the genome of a modern-day host organism.
当系统定期崩溃或是一种病毒劫持了网络,你别无选择:你需要升级整个系统,也许甚至要从下到上重写代码。
When the system crashes regularly or a virus hijacks the network, there's no easy alternative: you need to upgrade the whole system, maybe even rewrite the code from the bottom up.
如果病毒像生物那样生长,它们将搜索被感染系统中的其他病毒,并与他们交换代码,然后繁殖全新的后代。
As the viruses grow more lifelike, they could search for other viruses in the infected system with which they can swap code and create new offspring.
这些代码一但被植入,就会不知不觉地在普通用户的电脑上生成一张自动的“病毒网络”---首先就是易受攻击的“脸谱”用户。
Once embedded, the code would have created a “botnet” of millions of zombie computers capable of launching all manner of scams on innocent folk—starting with gullible Facebook users themselves.
举个例子来说,人类基因代码有大约8%属于内源性的逆转录病毒。
The human genome, for example, is thought to owe some 8 percent of its code to endogenous retroviruses.
Office加载程序的VisualStudio工具使用的默认设置不允许任何程序集运行,以保护用户免受病毒或其他恶意代码的侵害。
The default Settings used by the Visual Studio Tools for Office loader do not permit any assembly to run, which protects users from viruses and other malicious code.
从Web上偶然下载的病毒和其它敌意代码可能造成严重的安全性危险。
Viruses and other hostile code accidentally downloaded from the Web can pose serious security risks.
上周盖博拉在整个网络上的案例增加了近两倍半,而网络安全公司Sophos表示,网站上发现的恶意代码中42%与这个病毒有关。
Last week instances of Gumblar across the web increased by almost two-and-a-half times, while security company Sophos says it was responsible for 42% of all cases of malicious code found on websites.
2008年,有160万新的恶意代码病毒。
2007年,有60万新的恶意代码病毒。
我们的审计检查了“红色代码”修订是否存在,检查了反病毒软件并且抽取出它的版本。
Our audit checks for the presence of the Code Red fix, checks for anti-virus software, and extracts its version.
“他们害怕代码样本流入坊间,”他说,“所有的样本会连同制作小组的名字提交给防病毒产商,因此要是有泄露,产商就会知道是来自哪个小组。”
All samples will be submitted to the antivirus vendors with the name of the team who created it, so if one is released, they will know which team it came from.
修改真实的恶意代码来绕开防病毒软件没能让很多安全厂商高兴。
The modification of actual malicious code to bypass antivirus has not pleased many security-software vendors.
截至第一天,三个小组完成了所有九个代码样本——七个病毒和两个漏洞。
By the end of the first day, three teams had worked through all nine samples — seven viruses and two exploits.
我们看到各种有趣的内容,代码被嵌入网站源文件及有趣的宕机信息被用作病毒式营销以增加网站可见性。
We've seen all kinds of amusing content, from ASCII art embedded in a site's source code to funny downtime messages used as a viral marketing technique to increase the visibility of a site.
去年特征检测技术的问题日渐突出,网络攻击者越来越多的使用代码伪装技术制造出大量的病毒变种,更加重了防病毒分析工作。
The flip side of the problem became evident last year, as online attackers increasingly used obfuscation techniques to produce massive number of variants, taxing antivirus analysts.
他们在51位幸存者和他们的后代身上发现了一种目前为止无人发现的PRNP变体。PRNP是含有库鲁病传染源——朊病毒——一种蛋白质的源代码。
In 51 survivors and their descendants, they discovered a hitherto-unknown variant of PRNP, the gene which makes prions, the proteins that spread the disease.
第三类是研究病毒和恶意软件的代码。
第三类是研究病毒和恶意软件的代码。
应用推荐