• 攻击可以安装一个特洛伊木马程序不请自来的电子邮件发送软件目的是金融活动造成损害品牌名称修改公司资源

    Or an attacker might be able to install a Trojan horse program or unsolicited E-mail sending software, aim at financial enrichment or cause brand name damage by modifying company resources.

    youdao

  • 位于僵尸网络中的电脑种名为Torpig木马程序控制目的是窃取Windows用户的隐私财务信息

    The botnet in question is controlled by Torpig (also known as Sinowal), a malware program that aims to gather personal and financial information from Windows users.

    youdao

  • 这个木马其他应用程序一样运行于沙盒中

    This Trojan operates in the same sandbox that other apps do.

    youdao

  • 木马需要用户执行它们病毒,因此它们需要把自己装扮成合法程序达到目的。

    A Trojan is a virus that requires the user to execute it, and it usually "disguises" itself as a legitimate program in order to accomplish this.

    youdao

  • 但是可以导致连接一些病毒偷盗密码为了违法目的木马程序的网站。

    But it can also lead to a page that infects your computer with a virus or another piece of malicious software that then steals your passwords or USES your machine for other nefarious purposes.

    youdao

  • 份报告指出,在阻止之前,所谓的“特洛伊木马程序(附着看似平淡无奇电子文档中)正在窃取160gb情报

    According to one report the so-called Trojan Horse programme (attached to a seemingly innocuous electronic file) was siphoning off 160 gigabytes of information when it was stopped.

    youdao

  • 木马病毒只是计算机程序

    Trojan horse is simply a computer program.

    youdao

  • 身上莫名其妙地被走了”“没收短信怎么钱就没有了”这种钱财丢失手机短信拦截木马程序所入侵

    Card on the body, the money somehow turned away, and did not receive the message how the money will not have this money is the loss of SMS interception Trojan program invasion.

    youdao

  • 例如AntivirusProLookout的应用程序应用市场令人意外地颇受好评我们猜想它们评分是在那个木马发现之后几天内骤升的。

    Apps like Antivirus Pro and Lookout have surprisingly good reviews in the Market, and we imagine their Numbers have gone up in the last few days since the Trojan was discovered.

    youdao

  • 下载了那个免费游戏后结果一个特洛伊木马程序

    When he downloaded the free game it turned out to be a Trojan horse.

    youdao

  • 智慧城市网络通信过程存在信息安全隐患,主要有木马程序拒绝服务攻击欺骗攻击、SQL注入蠕虫病毒

    There are hidden dangers of information security in the process of network communication in smart cities, such as Trojans, denial of service attacks, spoofing attacks, SQL injection and worms.

    youdao

  • 发现木马程序,并将这窃贼收缴。

    It found and captured TROJAN, the pilferer.

    youdao

  • 打开具有木马程序邮件时,就会植入控制计算机帮助窃密远程窃密。

    When open a Trojan mail, it will implant and control computer, help qiemi remote qiemi.

    youdao

  • 一个木马程序

    I say it's a Trojan horse.

    youdao

  • 系统属于木马程序我们有益

    This system is a hobbyhorse procedure, but we do the beneficial thing with it.

    youdao

  • 一个木马程序用来学习用的。

    A Trojan Horse program, it is used for study.

    youdao

  • 攻击可以安装一个特洛伊木马程序不请自来的电子邮件发送软件目的是金融活动造成损害品牌名称修改公司资源

    Or an attacker might be able to install a Trojan horse program or unsolicited email sending software, aim at financial enrichment or cause brand name damage by modifying company resources.

    youdao

  • 木马病毒只是计算机程序

    A Trojan horse is simply a computer program.

    youdao

  • 木马病毒的一种,它表面是电脑程序实际上却潜伏的电脑里破坏有时甚至的硬盘格式化。

    Trojan horse is a computer program that claims to do one thing, but actually does something that damages your computer when you run it. Sometimes it can erase your hard disk.

    youdao

  • 如果系统感染了恶意软件(木马程序),并且所有其他恢复技术失效可能需要重新安装系统。

    If your system affected baleful software (be like Trojan program), and all and other restore a technology when invalidation, you may need to reinstall a system.

    youdao

  • 当用启输入口令时,按键记录程序木马病毒禁用防止记录击键

    Keystroke loggers or Trojan viruses are disabled and prevented from recording keystrokes as users input their passwords.

    youdao

  • 当然还有可能上网被人恶意侵入计算机放置木马程序

    Of course, there may be a time when you were malicious access to your computer intrusion, and placed a Trojan horse.

    youdao

  • 木马通常上述文件配置文件列表中的程序用来隐藏显示

    The trojaned files above often have configuration files that list the programs to hide and which to display.

    youdao

  • 知道冰河木马程序那里下载

    Who knows, "Ice Trojan," the source where to download?

    youdao

  • 阁下必须自行采取必要措施确保所点选网站内容没有病毒寄生虫木马程序其他有害内容。

    It is up to you to take precautions to ensure that whatever you select for your use is free of such items as viruses, worms, Trojan horses and other items of a destructive nature.

    youdao

  • 木马程序目的造成损失被窃计算机数据破坏系统

    Trojans are designed to cause loss or theft of computer data, and to destroy your system.

    youdao

  • 木马程序可以出现合法目的实际上无用有害影响

    Trojans are programs that can appear to serve a legitimate purpose but actually have an unwanted or harmful effect.

    youdao

  • 在美国联邦调查局指挥之下刑事调查人员相信,某位微软公司员工收到带有“特洛伊木马这个常见骇客程序电子邮件然后在不知情的状况下激活程序

    Criminal investigators, under the direction of the FBI, believe a Microsoft employee received email containing a common hacker program known as a Trojan horse, which he or she unknowingly launched.

    youdao

  • 在美国联邦调查局指挥之下刑事调查人员相信,某位微软公司员工收到带有“特洛伊木马这个常见骇客程序电子邮件然后在不知情的状况下激活程序

    Criminal investigators, under the direction of the FBI, believe a Microsoft employee received email containing a common hacker program known as a Trojan horse, which he or she unknowingly launched.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定