• 通过跟踪这个恶意程序获得入侵使用服务器电脑访问权限,McAfee识别出了72个受危害公司组织

    Through tracing this malware and also gaining access to a "command and control" computer server used by the intruders, McAfee identified 72 compromised companies and organisations.

    youdao

  • 恶意软件与日俱增(间),典型用途偷盗密码其他数据或者打开电脑的“后门[注4]”以便入侵控制。

    Malware is exploding (see chart 2). It is typically used to steal passwords and other data, or to open a "back door" to a computer so that it can be taken over by outsiders.

    youdao

  • 认为恶意软件蠕虫病毒其他病毒都会很快入侵平板手机。

    I'd expect to see malware, worms and viruses jump onto tablets and phones.

    youdao

  • 基于进程行为入侵检测技术主机防范入侵和检测恶意代码重要技术手段之一

    Intrusion Detection based on process 'behaviors is one of the mainstream techniques for defend against intrusion and malicious code.

    youdao

  • 密码管理器将密码存储智能卡芯片上,芯片上具有密码保护PIN保护功能,所以不易使恶意插件入侵电脑

    Its password manager stores passwords on the smart card chip, where they are encrypted and PIN-protected, and thus not vulnerable to malware infecting the computer.

    youdao

  • 入侵检测系统联用时,关于恶意软件行为数据包捕获恶意二进制文件本身这些有价值信息就可以获得

    When used in conjunction with an Intrusion Detection System, valuable information about the behavior of the malware, packet captures and the malware binary itself may be obtained.

    youdao

  • 入侵检测系统联用时,关于恶意软件行为数据包捕获恶意二进制文件本身这些有价值信息就可以获得

    When used in conjunction with an Intrusion Detection System, valuable information about the behavior of the malware, packet captures and the malware binary itself may be obtained.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定