• In recent years, computer worms become an important network security threats.

    近年来,计算机蠕虫成为网络系统安全重要威胁

    youdao

  • Hordes of "digital ants" that find and destroy viruses and computer worms on your PC.

    那就是让成群数字蚂蚁发现摧毁电脑中的病毒电脑蠕虫

    youdao

  • Stuxnet isn't spectacularly original, as computer worms go, and those Iranian systems aren't terribly exotic. They're like ours.

    网病毒蠕虫病毒不一样,它不是原创伊朗计算机系统我们的计算机系统也没有什么明显差别。

    youdao

  • Some computer security experts propose that the best way to ensure computer security is to write software that isn't easily breached by viruses, worms and other hacker tricks.

    一些电脑安全专家建议确保计算机安全最好方法编写出一种那么容易病毒蠕虫其他黑客伎俩破环软件

    youdao

  • Many computer viruses, worms, and Trojan horses are designed to exploit weak passwords.

    很多计算机病毒蠕虫特洛伊木马的设计利用口令。

    youdao

  • Computer users have for years struggled with viruses, worms and all sorts of malware.

    计算机用户长久以来受到病毒网络蠕虫以及各种恶意软件侵扰。

    youdao

  • Under section 1030(a)(5) of the U. S. Computer Fraud and Abuse Act, it's against the law to knowingly disseminate computer viruses, worms, denial-of-service attacks and other security intrusions.

    根据美国计算机欺诈滥用法案第1030条(a)(5),故意散布计算机病毒蠕虫进行拒绝服务攻击其他安全入侵的行为是违法的。

    youdao

  • Under section 1030(a)(5) of the U.S. Computer Fraud and Abuse Act, it’s against the law to knowingly disseminate computer viruses, worms, denial-of-service attacks and other security intrusions.

    根据美国计算机欺诈滥用法案第1030条(a)(5),故意散布计算机病毒蠕虫进行拒绝服务攻击其他安全入侵的行为是违法的。

    youdao

  • USB Device Protection is a lightweight and easy-to-use application that provides necessary security to your computer against USB flash drives infected with various e-threats, such as worms.

    USB设备保护一个轻量级易于使用应用程序提供必要的安全计算机免受感染各种电子威胁蠕虫usb闪存驱动器

    youdao

  • If your computer is connected to the Internet, viruses called worms may infect your machine, then use its connection to seek out and infect other computers.

    如果计算机联网的话,一种蠕虫病毒破坏计算机然后利用网络连接破坏其他计算机

    youdao

  • Computer virus and worms spread in networks that lie on the structure of networks.

    计算机病毒蠕虫网络中的扩散取决于网络结构

    youdao

  • Under section 1030 (a) (5) of the U. s. Computer Fraud and Abuse Act, it's against the law to knowingly disseminate computer viruses, worms, denial-of-service attacks and other security intrusions.

    根据美国计算机欺诈滥用法案第1030条(a)(5),故意散布计算机病毒蠕虫进行拒绝服务攻击其他安全入侵的行为是违法的。

    youdao

  • With the rapid growth of computer application and increasing complexities, the Internet worms are seriously threat the net- work security.

    随着计算机网络应用日益普及复杂性的不断增加,网络蠕虫严重威胁网络安全。

    youdao

  • USB Quick Check is a small and easy to use application that will help protect your computer against viruses, trojans, worms and other malicious attacks.

    USB快速检查一个易于使用应用程序有助于保护计算机免受病毒木马蠕虫其他恶意攻击

    youdao

  • Unfortunately, many computer users have experienced firsthand the effects of malicious mobile code, including viruses and worms, which can damage or destroy data and cost time and money.

    遗憾是,许多计算机用户亲身体验过恶意移动代码(包括病毒蠕虫)造成的后果这些代码可能会损坏毁坏数据会浪费时间和资金。

    youdao

  • Scientists use a computer to watch the worms as they turn. The computer shows the worms as they would look under a microscope. Mr.

    科学家用电脑观察蠕虫如何翻转,电脑显示蠕虫在显微镜下的样子

    youdao

  • Because of the huge damage of network worm epidemics, how to detect and response network worms has become an important task in computer network security field.

    由于网络蠕虫泛滥产生巨大危害如何对网络蠕虫进行检测、预警应对已经成为计算机网络安全研究领域一个重要课题

    youdao

  • It was bad enough when online threats came in the form of worms and viruses causing a company's computer network to crash or files to become corrupted.

    以前,网络攻击病毒“蠕虫”形式出现造成公司网络瘫痪或者毁坏文件糟糕了

    youdao

  • It was bad enough when online threats came in the form of worms and viruses causing a company's computer network to crash or files to become corrupted.

    以前,网络攻击病毒“蠕虫”形式出现造成公司网络瘫痪或者毁坏文件糟糕了

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定