• 木马利用Adobe软件中的漏洞用户电脑安装额外的恶意软件组件从而进行进一步感染。

    The Trojan horse exploits a flaw in the Adobe software to allow it to install additional malware components and further compromise the vulnerable computer.

    youdao

  • 绿色网络技术条件(恶意信息病毒木马漏洞垃圾软件);

    The Element of Green Network Technology: Rejection and Block of Malicious Information, Virus, Trojan, System Hole and Software Garbages.

    youdao

  • 该文提出了基于木马漏洞扫描模型攻击原理以及关键攻击技术实现作了进一步研究

    This article proposed scans the model based on wooden horse's crack, and realized to its attack principle as well as the key attack technology has done the further research.

    youdao

  • 利用木马客户端用于通过互联网进行交易银行软件漏洞

    Trojans exploit vulnerabilities of banking software used by clients to carry out transactions over the Internet.

    youdao

  • 基础之上,本文提出了一个基于木马体系结构漏洞扫描模型。

    NVS is based on Trojan horse architecture and facing to network attack.

    youdao

  • 基础之上,本文提出了一个基于木马体系结构漏洞扫描模型。

    NVS is based on Trojan horse architecture and facing to network attack.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定