该木马利用Adobe软件中的漏洞向用户电脑安装额外的恶意软件组件从而进行进一步感染。
The Trojan horse exploits a flaw in the Adobe software to allow it to install additional malware components and further compromise the vulnerable computer.
绿色网络技术条件(恶意信息、病毒、木马、漏洞、垃圾软件);
The Element of Green Network Technology: Rejection and Block of Malicious Information, Virus, Trojan, System Hole and Software Garbages.
该文提出了基于木马的漏洞扫描模型,并对其攻击原理以及关键攻击技术实现作了进一步的研究。
This article proposed scans the model based on wooden horse's crack, and realized to its attack principle as well as the key attack technology has done the further research.
利用木马客户端用于通过互联网进行交易的银行软件的漏洞。
Trojans exploit vulnerabilities of banking software used by clients to carry out transactions over the Internet.
在此基础之上,本文提出了一个基于木马体系结构的漏洞扫描模型。
NVS is based on Trojan horse architecture and facing to network attack.
在此基础之上,本文提出了一个基于木马体系结构的漏洞扫描模型。
NVS is based on Trojan horse architecture and facing to network attack.
应用推荐