• 攻击可以安装一个特洛伊木马程序不请自来的电子邮件发送软件目的是金融活动造成损害品牌名称修改公司资源

    Or an attacker might be able to install a Trojan horse program or unsolicited E-mail sending software, aim at financial enrichment or cause brand name damage by modifying company resources.

    youdao

  • 1120日一的《新闻周刊》报道,特洛伊木马蠕虫其它令人讨厌病毒已经侵入了无线领域, 也可能正在攻击手机

    Nov. 20, 2006 issue - Trojan horses, worms and other nasty viruses have gone wireless—and could be targeting your cell phone.

    youdao

  • BreakingPoint系统提供一个5强度的攻击测试包括了侦测网络蠕虫拒绝服务攻击踩点攻击特洛伊木马后门入侵

    The BreakingPoint system delivered a strike level 5 test that included exploits, network worms, denial-of-service attack, reconnaissance attacks, Trojan horse and backdoor intrusions.

    youdao

  • 攻击可以安装一个特洛伊木马程序不请自来的电子邮件发送软件目的是金融活动造成损害品牌名称修改公司资源

    Or an attacker might be able to install a Trojan horse program or unsolicited email sending software, aim at financial enrichment or cause brand name damage by modifying company resources.

    youdao

  • 责任保护系统不受特洛伊木马获取你的用户密码软件攻击或者使用任何其它不信赖的软件。

    You are responsible to keep your system free of trojans or other software that may capture your Login id or Password or any other software that could be considered as being untrustworthy.

    youdao

  • 责任保护系统不受特洛伊木马获取你的用户密码软件攻击或者使用任何其它不信赖的软件。

    You are responsible to keep your system free of trojans or other software that may capture your Login id or Password or any other software that could be considered as being untrustworthy.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定