限制或者禁止非洲小哺乳动物和猴子的移动,可以有效地减缓病毒在非洲之外的扩散。
Restricting or banning the movement of small African mammals and monkeys may be effective in slowing the expansion of the virus outside Africa.
病毒就是通过这些移动硬盘传播的。
The virus is believed to have spread through these removable drives.
如今,它的引擎驱动着为微软、IBM与思科量身定做的防病毒解决方案,并且还延伸到移动市场。
Today, its engines power antivirus solutions for Microsoft, IBM, and Cisco, and it has expanded into mobile.
iOS集成twitter已达成一致,但twitter平台尚未证明自己能作为游戏应用的病毒式传播渠道。而游戏正是移动应用最大最赚钱的应用类别。
The Twitter-iOS integration is promising, but the Twitter platform has not proven itself to be decent viral channel for games, the biggest and most lucrative category of mobile apps.
网秦提供移动安全服务,包括防病毒、防垃圾短信、隐私保护、数据备份恢复和在线病毒扫描等,目前在200多个国家有5500万用户。
NetQin delivers mobile security services, including antivirus, anti-spam, privacy protection, data backup and restoration, and online virus scan, to 55 million users in more than 200 countries.
该病毒可以沿着神经纤维移动,侵袭皮肤细胞,导致皮疹的产生。
The virus moves along the nerve fibers and affects cells of the skin, resulting in a skin rash.
手机病毒利用普通短信、彩信、上网浏览、下载软件与铃声等方式传播,还将攻击范围扩大到移动网关、WAP服务器或其它的网络设备。
Mobile phone viruses use ordinary SMS, MMS, Internet browsing, download software and ringtones, etc, will also be transmitted attack expanded to mobile gateway, WAP server or other network equipment.
和电脑桌面浏览器一样,移动浏览器很容易受到病毒木马的攻击。
Like desktop browsers, mobile browsers are susceptible to attack by Trojan viruses.
您还可以尝试进行登记的变更地址与您的运营商或移动到不同的位置,以蠕虫病毒的方式对您的合同。
You could also try to register a change of address with your carrier or move to a different location to worm your way out of your contract.
遗憾的是,许多计算机用户都亲身体验过恶意移动代码(包括病毒和蠕虫)造成的后果,这些代码可能会损坏或毁坏数据,并会浪费时间和资金。
Unfortunately, many computer users have experienced firsthand the effects of malicious mobile code, including viruses and worms, which can damage or destroy data and cost time and money.
抛开工业方面的障碍,可能感冒难治的最大理由是,鼻病毒有很多类型而且对任何药物或疫苗都呈现出移动靶标。
Industry hurdles aside, perhaps the biggest reason the common cold has long defied treatment is that the rhinovirus has so many strains and presents a moving target for any drug or vaccine.
2小心使用移动存储设备。在使用移动存储设备之前进行病毒的扫描和查杀,也可把病毒拒绝在外。
2 careful use of mobile storage devices. The virus scanning and killing in the use of mobile storage devices, but also the virus was rejected.
通过对狗,猫,雪貂进行了详实的研究,我们知道,狂犬病毒入侵机体,从入侵地方通过神经系统向大脑移动,动物在这段时间,没有发病症状,也被叫做潜伏期,时间从几周到几个月不等。
From numerous studies conducted on rabid dogs, cats, and ferrets, we know that rabies virus inoculated into a muscle travels from the site of the inoculation to the brain by moving within nerves.
因为对于口蹄疫及它所有的毒性而言,病毒最容易的传播途径是通过动物之间的紧密接触;所以限制动物的自由移动就可能隔离病毒、断绝传播源。
For all its virulence, the latter spreads most easily when animals are in close contact with each other, so restricting the movement of animals isolates the virus and stops it from spreading.
移动设备上的可执行文件将不能执行,计算机也就不会再被病毒感染。
The executable file on mobile equipment will cannot carry out, the computer also won't be affected by virus again.
选择此选项会将病毒消息移动到病毒消息队列,以供以后由病毒消息处理应用程序进行处理。
This moves the poison message to a poison message Queue for later processing by a poison message handling application.
这样,研究人员就能观察到绿色荧光病毒微粒向突触移动并进入健康细胞。
In this way, researchers can be observed that the green fluorescent virus particles moving to the synapse and into the healthy cells.
可移动驱动器更容易出现病毒感染,因为它们的便携性使它们在常规的基础上暴露出多个威胁。
Removable drives have always been more prone to virus infection, since their portable nature exposes them to multiple threats on a regular basis.
麦卡菲公司的一名执行官詹·瓦尔·扎克说,有些移动电话公司正在手机上直接安装防病毒软件。但是他接着说,大多数用户仍然易受攻击。
Jan Volzke, an executive at McAfee, says some mobile-phone companies now implant virus protection directly in handsets-but adds that the vast majority of users remain vulnerable.
当移动用户或远程用户访问公司网络时,他们可能从未经保护的公网上不经意地引入病毒和蠕虫。
As they access the corporate network, mobile and remote users inadvertently can infect the network with (75) and worms acquired from unprotected public networks.
当移动用户或远程用户访问公司网络时,他们可能从未经保护的公网上不经意地引入病毒和蠕虫。
As they access the corporate network, mobile and remote users inadvertently can infect the network with (75) and worms acquired from unprotected public networks.
应用推荐