• 技术理想保护儿童不受零日威胁形式病毒木马

    The technology is ideal at protecting against zero-day threats in the form of Viruses and Trojans.

    youdao

  • 滑动器,称为旋转木马组织有序可交互并且流畅表达信息方式。滑动器是一种非常流行的技术因为确实非常实用。

    Sliders, also known as carousels, are an organized, interactive and quite smooth way to present information.

    youdao

  • 为了未来信息战掌握主动权研究木马网络攻击技术具有重要军事战略意义

    To have the initiative in future weapon of information, will study the wooden horse network attack technology to have the important military strategy significance.

    youdao

  • 该文提出了基于木马漏洞扫描模型攻击原理以及关键攻击技术实现作了进一步研究

    This article proposed scans the model based on wooden horse's crack, and realized to its attack principle as well as the key attack technology has done the further research.

    youdao

  • 绿色网络技术条件(恶意信息病毒木马漏洞垃圾软件);

    The Element of Green Network Technology: Rejection and Block of Malicious Information, Virus, Trojan, System Hole and Software Garbages.

    youdao

  • 如果系统感染了恶意软件(木马程序),并且所有其他恢复技术失效可能需要重新安装系统。

    If your system affected baleful software (be like Trojan program), and all and other restore a technology when invalidation, you may need to reinstall a system.

    youdao

  • 本文介绍木马攻击原理、常用攻击技术以及防范策略

    This article discusses the work principles and attack technology and defending policies on Trojan Horse.

    youdao

  • 隐藏技术一直木马设计人员研究重要技术

    Concealing technology is important to designer of Trojan horses all through.

    youdao

  • 进程隐藏木马设计关键技术

    Process hidden is the key technologies to design Trojan program.

    youdao

  • 方法SPI技术原理出发分析新型木马利用SPI技术实现隐藏机制,找出一种新型木马检测清除方法

    Methods Analyze the hiding mechanism of new Trojan proceeding from the principle of SPI technique and excogitate a method to check and clean this type of Trojan accordingly.

    youdao

  • 木马作为一种危害性大隐蔽性远程控制工具目前比较常用网络入侵技术

    As a highly dangerous and covert remote control tool, trojan horse is commonly used techniques on network intrusion.

    youdao

  • 最后,讨论了基于APIHOOK技术特洛伊木马检测技术

    Finally, the current detection technology of Trojan horse based API HOOK it presented.

    youdao

  • 主要方式网上教授病毒木马制作技术各种网络攻击技术

    Its main means has: online professor viruses, Trojan horses production technology and various network attack technology;

    youdao

  • 本文木马误杀问题常见木马病毒通用防治方法等方面进行一些原理技术分析和探讨。

    This paper has also discussed the problem of Trojan wrongly detected and common prevention methods for the Trojan-like virus in the view of some principles and technical analysis.

    youdao

  • 恶意代码检测技术主要分为基于主机基于网络节点的检测,本文主要研究针对基于主机的高隐藏木马的检测技术

    Malware detection techniques can be divided into host-based and network-based, this paper mainly focuses on studies of host-based deep hidden Trojan detection techniques.

    youdao

  • 木马利用HTTP隧道技术打破网络安全防护设备网络安全造成严重白勺威胁

    Some Trojans use HTTP tunnel to pass through a variety of network security devices, which will pose a serious threat to current network security.

    youdao

  • 本文通过木马木马检测技术研究,提出基于行为分析木马检测技术

    Through studying techniques of the Trojan and anti-Trojan, this paper presents the Trojan-detection technology based on behavioral analysis.

    youdao

  • 本文通过木马木马检测技术研究,提出基于行为分析木马检测技术

    Through studying techniques of the Trojan and anti-Trojan, this paper presents the Trojan-detection technology based on behavioral analysis.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定