按计算机病毒入侵系统的途径可将计算机病毒分为源码病毒、入侵病毒、操作系统病毒和外壳病毒。
According to a computer virus intrusion system approach can be divided into source virus, computer virus virus, operating system viruses and shell viruses.
首先,写一个全球个人电脑都容易收到感染的病毒会比去写一个很少人使用的操作系统病毒更为有效率。
For one, writing nastiness that the vast majority of the world's personal computers are susceptible to is a more efficient use of resources than writing the same evil for a sliver of the population.
病毒已使他的计算机操作系统受到传染。
The virus has infected the operating system of his computer.
服务器应该包含操作系统和Domino病毒扫描功能。
The server should contain operating system and Domino virus scanning capabilities.
Linux不像其他操作系统那样易遭受病毒攻击,而且它提供了一种远程管理的安全方法。
Linux is not subject to the same level of virus attacks as other operating systems, and it provides a secure method of remote administration.
本文演示的技术对任何操作系统都起作用;但是我们选择Linux 而不选择MicrosoftWindows,因为 Linux比较不容易成为病毒和黑客攻击的目标。
The techniques demonstrated in this article work with any operating system; however, we chose Linux over Microsoft Windows as a less vulnerable target to viruses and hacking.
博客上还写道,到时大家一定会非常关注这样一款无需担心安全漏洞和病毒的操作系统。
It added that there would be a heavy focus on creating a system that would not require users to worry about security holes and virus warnings.
操作系统一旦拥有最多的和最易感染的用户,这样的环境同样为病毒提供了繁殖的肥沃土壤。
The same ecosystem that provides the biggest, most susceptible audience also provides the most fertile breeding ground for the nasty executables.
当然,我们首先要在操作系统上完成自己的工作,并希望得到安全免受病毒侵袭,我们也想省点钱。
Sure, we like to be secure from viruses. Sure, we like to save money.
现在Linux屹立不倒仅仅是因为没几个病毒制造者傻到为一个市场占有量不到5%的操作系统编写病毒。
As it currently stands, Linux is a safe OS only because few virus creators will fool around with an OS that has less than 5% of the market.
有四种类型的病毒程序:外壳型、入侵型、操作系统型和源码型。
There are four main types of viruses: shell, intrusive, operating system and source ode.
有四种类型的病毒程序:外壳型、入侵型、操作系统型和源码型。
There are four main types of viruses: shell, intrusive, operating system and source ode.
我们希望Google和手机运营和制造商们要考虑下手机的安全问题和防病毒软件,为将来的操作系统升级准备下方面的应用程序。
We hope that Google and device carriers and manufacturers will think about security and antivirus options when planning on-board apps for future OS updates.
安全专家称,该病毒通过利用Windows操作系统以前的未知漏洞专门袭击西门子控制设备。
Security experts say Stuxnet attacked the software in specialized industrial control equipment made by Siemens by exploiting a previously unknown hole in the Windows operating system.
病毒对计算机的破坏程度取决于它是操作系统型、外壳型还是入侵型或源码型。
The extent of damage to computer virus depends on it is operating system type, shell type or intrusive or source type.
俄罗斯当地的一次手机木马病毒的爆发告诉我们一个新的事实:Android操作系统看来需要一个防病毒软件。
A local outbreak of a mobile Trojan in Russia has shown us something new: The Android operating system might need an antivirus.
黑客们一般设计针对微软“视窗”操作系统(Windows)的病毒;这并不是因为这些黑客们讨厌个人电脑,而只是世界上个人计算机终端机用户的数量是最大的。
Hackers generally design viruses that infect systems running on Windows; it's not because they hate PCs, it's because there are more PC users.
当你的操作系统运行时,文件对软盘可以读而不触发启动磁盘病毒。
When your operating system is running, files on the diskette can be read without triggering the boot disk virus.
周二安全专家警告第一个侵袭Android操作系统手机的木马病毒,是通过发送手机信息传播给用户的。
Security experts warned on Tuesday about what is believed to be the first Trojan targeting Android-based mobile devices that racks up charges by sending text messages to premium-rate Numbers.
这种非常复杂的蠕虫病毒利用了微软的Windows操作系统中的多个安全漏洞。
The very sophisticated worm exploits multiple secure flaws in Microsoft's Windows OS's.
有四种类型的病毒:外壳、入侵、操作系统和源码。
There are four main types of viruses: shell, intrusive, operating system, and source code.
病毒专门攻击一款叫做WinCC的西门子软件,该软件的运行环境是微软的Windows操作系统。
It targets a piece of Siemens software, called WinCC, which runs on Microsoft Windows.
所有数据将是云存储,使用者不会受到病毒的困扰:谷歌称它将监管代码以阻止在其铬金操作系统网络程序上的恶意行为。
All data will be stored in the cloud, and users won't even have to bother with anti-virus software: Google claims it will monitor code to prevent malicious activity in Chrome OS web apps.
此时,识别病毒DNA后,细菌设置一套操作系统最终导致病毒崩溃。
At that point, the viral DNA is recognised, after which the bacteria set a system into operation that ultimately leads to the breakdown of the virus.
操作系统可能会因为木马病毒的攻击而中止。
Operating systems can be brought to a halt by a Trojan Horse.
这种决策取决于终端设备的信息,如终端设备的当前抗病毒状况和操作系统补丁程序级别。
This decision can be based on information about the endpoint device such as its current antivirus state and operating system patch level.
这种决策取决于终端设备的信息,如终端设备的当前抗病毒状况和操作系统补丁程序级别。
This decision can be based on information about the endpoint device such as its current antivirus state and operating system patch level.
应用推荐