该技术是理想的,在保护儿童不受零日威胁形式的病毒和木马。
The technology is ideal at protecting against zero-day threats in the form of Viruses and Trojans.
滑动器,也称为旋转木马,是一种组织有序,可交互的并且可流畅表达信息的方式。滑动器是一种非常流行的技术因为确实非常实用。
Sliders, also known as carousels, are an organized, interactive and quite smooth way to present information.
为了在未来的信息战中掌握主动权,研究木马型网络攻击技术具有重要的军事战略意义。
To have the initiative in future weapon of information, will study the wooden horse network attack technology to have the important military strategy significance.
该文提出了基于木马的漏洞扫描模型,并对其攻击原理以及关键攻击技术实现作了进一步的研究。
This article proposed scans the model based on wooden horse's crack, and realized to its attack principle as well as the key attack technology has done the further research.
绿色网络技术条件(恶意信息、病毒、木马、漏洞、垃圾软件);
The Element of Green Network Technology: Rejection and Block of Malicious Information, Virus, Trojan, System Hole and Software Garbages.
如果你的系统感染了恶意软件(如木马程序),并且所有其他恢复技术都失效时,你可能需要重新安装系统。
If your system affected baleful software (be like Trojan program), and all and other restore a technology when invalidation, you may need to reinstall a system.
本文介绍了木马的攻击原理、常用攻击技术以及防范策略。
This article discusses the work principles and attack technology and defending policies on Trojan Horse.
隐藏技术一直是木马设计人员研究的重要技术。
Concealing technology is important to designer of Trojan horses all through.
进程隐藏是木马设计的关键技术。
Process hidden is the key technologies to design Trojan program.
方法从SPI技术原理出发分析新型木马利用SPI技术实现隐藏的机制,找出一种新型木马的检测和清除方法。
Methods Analyze the hiding mechanism of new Trojan proceeding from the principle of SPI technique and excogitate a method to check and clean this type of Trojan accordingly.
木马作为一种危害性大、隐蔽性高的远程控制工具,是目前比较常用的网络入侵技术。
As a highly dangerous and covert remote control tool, trojan horse is commonly used techniques on network intrusion.
最后,讨论了基于APIHOOK技术的特洛伊木马的检测技术。
Finally, the current detection technology of Trojan horse based API HOOK it presented.
其主要方式有:网上教授病毒、木马制作技术和各种网络攻击技术;
Its main means has: online professor viruses, Trojan horses production technology and various network attack technology;
本文在木马误杀问题及常见的木马类病毒的通用防治方法等方面也进行了一些原理和技术上的分析和探讨。
This paper has also discussed the problem of Trojan wrongly detected and common prevention methods for the Trojan-like virus in the view of some principles and technical analysis.
恶意代码的检测技术主要分为基于主机的和基于网络节点的检测,本文主要研究针对基于主机的高隐藏性木马的检测技术。
Malware detection techniques can be divided into host-based and network-based, this paper mainly focuses on studies of host-based deep hidden Trojan detection techniques.
木马利用HTTP隧道技术打破网络安全防护设备,给网络安全造成了严重白勺威胁。
Some Trojans use HTTP tunnel to pass through a variety of network security devices, which will pose a serious threat to current network security.
本文通过对木马及木马检测技术的研究,提出了基于行为分析的木马检测技术。
Through studying techniques of the Trojan and anti-Trojan, this paper presents the Trojan-detection technology based on behavioral analysis.
本文通过对木马及木马检测技术的研究,提出了基于行为分析的木马检测技术。
Through studying techniques of the Trojan and anti-Trojan, this paper presents the Trojan-detection technology based on behavioral analysis.
应用推荐