一个木马程序,用来学习用的。
木马程序是一种恶意电脑程序。
Trojan Horse programs are a type of malicious computer programs.
它发现了木马程序,并将这窃贼收缴。
我说这是一个木马程序。
本系统属于木马程序,但我们用它来做有益的事。
This system is a hobbyhorse procedure, but we do the beneficial thing with it.
当他下载了那个免费游戏后,结果是一个特洛伊木马程序。
When he downloaded the free game it turned out to be a Trojan horse.
它是一个破坏计算机软件和窃取计算机用户的计算机木马程序。
Computer program hidden in another computer program with the purpose of destroying software or collecting information about the use of the computer.
木马程序的目的是造成损失或被窃的计算机数据,并破坏您的系统。
Trojans are designed to cause loss or theft of computer data, and to destroy your system.
那些广告是用户在不知情的情况下安装的“木马程序”鼓捣出来的。
The ads were delivered by "spyware" that the user had unwittingly installed.
木马程序可以出现,以一个合法的目的,但实际上有一个无用或有害的影响。
Trojans are programs that can appear to serve a legitimate purpose but actually have an unwanted or harmful effect.
当打开具有木马程序的邮件时,它就会植入和控制计算机,帮助窃密者远程窃密。
When open a Trojan mail, it will implant and control computer, help qiemi remote qiemi.
但是也可以导致你连接到一些有病毒和偷盗你密码为了违法目的的木马程序的网站。
But it can also lead to a page that infects your computer with a virus or another piece of malicious software that then steals your passwords or USES your machine for other nefarious purposes.
相反,其功能是掩蔽其他类型(常常是恶意的)软件,如木马程序、病毒或蠕虫。
Instead, its function is to mask the presence of other types of (usually malicious) software, such as Trojan horses, viruses or worms.
当然,还有一种可能是当你上网时被人恶意侵入了你的计算机,并放置了木马程序。
Of course, there may be a time when you were malicious access to your computer intrusion, and placed a Trojan horse.
骗徒以银行名义向客户发电邮,讹称该木马程序为防垃圾电邮软件,鼓励他们下载;
E-mail to customers with bank swindlers, falsely claimed that the Trojan program for the anti-spamming software and encourage them to download;
木马程序:破坏性指令的载体,它们外表没有危害或者是寄付在某些有用的软件程序如游戏中。
Trojan horse programs : Delivery vehicles for destructive code, which appear to be harmless or useful software programs such as games.
那些难以删除的文件,例如病毒留下的一些文件和特洛伊木马程序,或者是已经损坏文件名的文件。
Delete files that are difficult to delete, such as some files left by viruses and trojans, or files with corrupted file names.
阁下必须自行采取必要措施,以确保你所点选的网站内容是没有病毒、寄生虫、木马程序与其他有害内容。
It is up to you to take precautions to ensure that whatever you select for your use is free of such items as viruses, worms, Trojan horses and other items of a destructive nature.
如果你的系统感染了恶意软件(如木马程序),并且所有其他恢复技术都失效时,你可能需要重新安装系统。
If your system affected baleful software (be like Trojan program), and all and other restore a technology when invalidation, you may need to reinstall a system.
位于僵尸网络中的电脑被一种名为Torpig的木马程序控制,它的目的是窃取Windows用户的隐私及财务信息。
The botnet in question is controlled by Torpig (also known as Sinowal), a malware program that aims to gather personal and financial information from Windows users.
智慧城市网络通信过程中存在信息安全隐患,主要有木马程序、拒绝服务攻击、欺骗攻击、SQL注入和蠕虫病毒等。
There are hidden dangers of information security in the process of network communication in smart cities, such as Trojans, denial of service attacks, spoofing attacks, SQL injection and worms.
或攻击者可以安装一个特洛伊木马程序或不请自来的电子邮件发送软件,目的是在金融活动或造成损害品牌名称,修改公司的资源。
Or an attacker might be able to install a Trojan horse program or unsolicited E-mail sending software, aim at financial enrichment or cause brand name damage by modifying company resources.
或攻击者可以安装一个特洛伊木马程序或不请自来的电子邮件发送软件,目的是在金融活动或造成损害品牌名称,修改公司的资源。
Or an attacker might be able to install a Trojan horse program or unsolicited email sending software, aim at financial enrichment or cause brand name damage by modifying company resources.
或攻击者可以安装一个特洛伊木马程序或不请自来的电子邮件发送软件,目的是在金融活动或造成损害品牌名称,修改公司的资源。
Or an attacker might be able to install a Trojan horse program or unsolicited email sending software, aim at financial enrichment or cause brand name damage by modifying company resources.
应用推荐