或攻击者可以安装一个特洛伊木马程序或不请自来的电子邮件发送软件,目的是在金融活动或造成损害品牌名称,修改公司的资源。
Or an attacker might be able to install a Trojan horse program or unsolicited E-mail sending software, aim at financial enrichment or cause brand name damage by modifying company resources.
据11月20日一期的《新闻周刊》报道,特洛伊木马、蠕虫和其它令人讨厌的病毒已经侵入了无线领域, 也可能正在攻击你的手机。
Nov. 20, 2006 issue - Trojan horses, worms and other nasty viruses have gone wireless—and could be targeting your cell phone.
BreakingPoint的系统提供了一个5级强度的攻击测试,包括了侦测、网络蠕虫、拒绝服务攻击、踩点攻击、特洛伊木马和后门入侵。
The BreakingPoint system delivered a strike level 5 test that included exploits, network worms, denial-of-service attack, reconnaissance attacks, Trojan horse and backdoor intrusions.
或攻击者可以安装一个特洛伊木马程序或不请自来的电子邮件发送软件,目的是在金融活动或造成损害品牌名称,修改公司的资源。
Or an attacker might be able to install a Trojan horse program or unsolicited email sending software, aim at financial enrichment or cause brand name damage by modifying company resources.
你有责任保护你的系统不受特洛伊木马等能获取你的用户名和密码的软件的攻击或者使用任何其它不信赖的软件。
You are responsible to keep your system free of trojans or other software that may capture your Login id or Password or any other software that could be considered as being untrustworthy.
你有责任保护你的系统不受特洛伊木马等能获取你的用户名和密码的软件的攻击或者使用任何其它不信赖的软件。
You are responsible to keep your system free of trojans or other software that may capture your Login id or Password or any other software that could be considered as being untrustworthy.
应用推荐