• Trojan Horse is a hacker program. It contains two parts: client end (server) program and control end program.

    木马一种黑客程式一般两个程式组成用户端伺服器)程式控制(控制器)程式。

    youdao

  • Criminal investigators, under the direction of the FBI, believe a Microsoft employee received email containing a common hacker program known as a Trojan horse, which he or she unknowingly launched.

    在美国联邦调查局指挥之下刑事调查人员相信,某位微软公司员工收到带有“特洛伊木马”这个常见骇客程序电子邮件,然后在不知情的状况下激活该程序。

    youdao

  • In a buffer overflow attack, the hacker takes advantage of specific type of computer program bug that involves the allocation of storage during program execution.

    缓冲溢出攻击黑客利用程序执行期间存储分配中的特定计算机程序漏洞

    youdao

  • Program design, network technology, hacker attack and defense, and other e-books.

    程序设计网络技术黑客攻防各种电子书。

    youdao

  • Especially this kind of virus can be in the long-range server site that is appointed by hacker of join of infection computer tiring-room, download other and baleful program and move.

    尤其是这种病毒感染计算机后台连接黑客指定远程服务器站点下载其他恶意程序运行

    youdao

  • Xiaowang has set up an anti-hacker device before starting the program.

    程序启动已经预设了黑客装置

    youdao

  • Xiaowang has set up an anti-hacker device before starting the program.

    程序启动已经预设了黑客装置

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定