Trojan Horse is a hacker program. It contains two parts: client end (server) program and control end program.
木马是一种黑客程式,它一般由两个程式组成:用户端(伺服器)程式及控制端(控制器)程式。
Criminal investigators, under the direction of the FBI, believe a Microsoft employee received email containing a common hacker program known as a Trojan horse, which he or she unknowingly launched.
在美国联邦调查局指挥之下的刑事调查人员相信,某位微软公司的员工收到带有“特洛伊木马”这个常见的骇客程序电子邮件,然后在不知情的状况下激活该程序。
In a buffer overflow attack, the hacker takes advantage of specific type of computer program bug that involves the allocation of storage during program execution.
在缓冲溢出攻击中,黑客利用了程序执行期间存储分配中的特定计算机程序漏洞。
Program design, network technology, hacker attack and defense, and other e-books.
程序设计、网络技术、黑客攻防等各种电子书。
Especially this kind of virus can be in the long-range server site that is appointed by hacker of join of infection computer tiring-room, download other and baleful program and move.
尤其是这种病毒会在被感染计算机后台连接黑客指定的远程服务器站点,下载其他恶意程序并运行。
Xiaowang has set up an anti-hacker device before starting the program.
程序启动前就已经预设了反黑客装置。
Xiaowang has set up an anti-hacker device before starting the program.
程序启动前就已经预设了反黑客装置。
应用推荐