• In short, backdoors combine the functionality of most other types of Trojans in one package.

    短期内后门相结合功能大多数其他类型木马一个封装中

    youdao

  • System call hijacking is a common technology used by hackers to keep backdoors on the compromised sys-tem.

    系统调用劫持黑客入侵系统后保留后门常用一项技术

    youdao

  • Rootkit backdoorsoften called trojan horses — can typically be divided into two categories: local programs and network services.

    Rootkit的后门-通常被称为特洛伊木马-通常可以分为本地节目网络服务。

    youdao

  • When you find a compromised system, simply download the clean binaries, set your PATH environment variable to use them, and start looking for backdoors.

    发现一个隐患系统只要下载二进制文件清理设置PATH环境变量使用他们开始寻找后门

    youdao

  • EDIT 1: I could do something like generate a new token that would allow a technician to login via a backdoor, but I'd prefer to avoid backdoors if at all possible.

    编辑1可以这样生成一个新的令牌技术人员登录通过后门宁愿避免后门如果所有可能的。

    youdao

  • EDIT 1: I could do something like generate a new token that would allow a technician to login via a backdoor, but I'd prefer to avoid backdoors if at all possible.

    编辑1可以这样生成一个新的令牌技术人员登录通过后门宁愿避免后门如果所有可能的。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定