你是想通过邮件销售蠕虫程序吗?
与此同时,网络上的蜘蛛、蠕虫、代理程序和其他类型的自动化病毒越来越多,这些病毒旨在渗透站点,寻找信息并对其进行分类。
At the same time, the Net is increasingly populated with spiders, worms, agents and other types of automated beasts designed to penetrate the sites and seek out and classify information.
一个蠕虫是一个复制自身但并不感染宿主的程序。
A worm is a program that multiplies itself but that does not infect the host.
另一个破坏We b站点或应用程序的常见方式是使用蠕虫。
Another common way to compromise a Web site or application is through the use of worms.
震网蠕虫病毒(Stuxnetworm)成为了最受高度关注的一个恶意程序用于潜在破坏关键基础设施。
The Stuxnet worm has become the most high-profile piece of malware with the potential to harm key infrastructure.
也就是说,我们不可能编出一个计算机程序,让它正确地鉴别某任意的程序是不是一个病毒、蠕虫之类—无论你为解决这个问题拼上多少计算能力。
That is, it is impossible to write a computer program that will identify correctly whether an arbitrary program is a virus, a worm, etc. - no matter how much computing power is thrown at the problem.
蠕虫因此并不和其他程序在同一个序列。
Worms can consequently not form part of other program sequences.
智慧城市网络通信过程中存在信息安全隐患,主要有木马程序、拒绝服务攻击、欺骗攻击、SQL注入和蠕虫病毒等。
There are hidden dangers of information security in the process of network communication in smart cities, such as Trojans, denial of service attacks, spoofing attacks, SQL injection and worms.
USB设备的保护是一个轻量级且易于使用的应用程序,提供必要的安全,以您的计算机免受感染各种电子威胁,如蠕虫usb闪存驱动器。
USB Device Protection is a lightweight and easy-to-use application that provides necessary security to your computer against USB flash drives infected with various e-threats, such as worms.
蠕虫:一个执行时无需用户介入,自我复制的独立程序。蠕虫创建自身拷贝,并且它们不需要宿主程序来感染系统。
Worms: A self-replicating, self-contained program executes without user intervention. Worms create copies of themselves, and they don't require a host program to infect a system.
相反,其功能是掩蔽其他类型(常常是恶意的)软件,如木马程序、病毒或蠕虫。
Instead, its function is to mask the presence of other types of (usually malicious) software, such as Trojan horses, viruses or worms.
USB快速检查是一个小而易于使用的应用程序,这将有助于保护您的计算机免受病毒,木马,蠕虫和其他恶意攻击。
USB Quick Check is a small and easy to use application that will help protect your computer against viruses, trojans, worms and other malicious attacks.
特洛伊木马、蠕虫和其他恶性程序代码形式,业已证明在瘫痪电子邮件系统和因特网供应商方面是非常成功的。
Trojan horses, worms, and other malicious forms have proven to be incredibly successful at paralyzing email systems and Internet providers.
特洛伊木马、蠕虫和其他恶性程序代码形式,业已证明在瘫痪电子邮件系统和因特网供应商方面是非常成功的。
Trojan horses, worms, and other malicious forms have proven to be incredibly successful at paralyzing email systems and Internet providers.
应用推荐