进程隐藏是木马设计的关键技术。
Process hidden is the key technologies to design Trojan program.
而在系统健壮性方面,采用系统进程隐藏及软、硬件结合的软件保护方法,保证系统自身的安全性和完整性。
In system robust respect, this paper USES process hidden and software protected technical which combining software with hardware to insure system's integrality and security.
未禁用信号处理程序时,进程在“当前”状态中可能表现为正在进行信号处理,从而可能隐藏了真正问题。
When the signal handler doesn't disable, the process might show up in the "current" status as signal handling, which might hide the real problem.
例如,可以通过修改文件属性把这个文件改为隐藏和加密的,同时允许DB 2实例所有者进程访问它,见图1。
For example, you can change file property so that it is hidden and encrypted while being accessible to the DB2 instance owner processes, as shown in Figure 1.
让他们设定进程,如果你是开车旅行,那么孩子要停车就停车,没准你因为停车而发现一块隐藏的宝石呢,而如果你不停车你就与它失之交臂了。
Let them set the pace. If you're driving and your child wants to stop, then stop. You might find a hidden gem by stopping somewhere you otherwise would have driven past.
在浓密的云层之下,木星隐藏着一些基本变化进程和环境条件的秘密,这些变化进程和环境条件在我们的太阳系形成之初,曾经支配着太阳系。
Underneath its dense cloud cover, Jupiter safeguards secrets to the fundamental processes and conditions that governed our solar system during its formation.
这样看来,除非有人积极地搜索你的隐藏进程,它应当是不容易被发现了。
At this point, unless someone is actively searching for your hidden process, you should be safe from discovery.
在达成协议的进程中还有几个隐藏的困难。
实验结果表明,该方法对隐藏进程具有较好的检测效果。
The results show that the new detection is effective in the hidden process searching.
分析LKM后门实现隐藏进程的机理。
This paper analyses the mechanism of LKM backdoor in hiding processes.
寻求设计领域中的线条设计和样板领域中的省道隐藏技术的契合,是适应服装市场多样化进程的重要方式。
To adapt to the diversification of the garment market, it is important to seek the combination of the line design in the design and the dart concealing technique in samples.
利用进程对象特征搜索内存能够检测到隐藏进程。
Based on certain detection characteristics of process, hidden process could be uncovered by memory searching.
程序同时也在内存中伪装它所做的改动,并且隐身地控制被隐藏进程。
Programs are also memory camouflage it changes made to the stealth and hidden control process.
程序同时也在内存中伪装它所做的改动,并且隐身地控制被隐藏进程。
Programs are also memory camouflage it changes made to the stealth and hidden control process.
应用推荐