Hidden computer viruses and computer viruses polymorphism is more difficult to detect.
隐性计算机病毒和多态性计算机病毒更使人难以检测。
I mean, you can see that it can get a bit cluttered because maybe those features that are hidden behind, or maybe we have trouble seeing if we don't have a computer, that looks very readable.
你也可以得到一些很杂乱的图像,因为那些特征被隐藏在后面,或者我们没有很好可视化电脑,而看不到清晰的图像,图像是很直观的。
A catalog name is the name associated with a hidden directory on the local computer.
目录名称是与本地计算机上隐藏目录相关联的名称。
The study traced the spread of one particular spying malware, usually spread by a "phishing" email which, if opened, downloaded a hidden programme on to the computer network.
这项研究跟踪了一个钓鱼程序。 这个钓鱼程序通过电子邮件传播,一旦打开,自动从互联网下载某个隐藏的恶意软件。
"Video Girl" Barbie has a small built-in camera, a hidden LCD display screen and a USB cord that allows kids to upload videos to a computer.
“视频女孩”芭比娃娃具备一个内置摄像头,一个隐藏LCD显示屏以及usb接口,通过这些装置,使用芭比娃娃的小朋友就将拍摄的视频传到电脑上。
The demo was silky smooth, but the touchscreen Microsoft used was connected to a hidden desktop computer, rather than contained within the portable hardware.
演示的效果虽然非常棒,但他们使用的触摸屏后面隐蔽地连接着一台台式电脑,主机并没有嵌在便携式设备里。
Error DOCTOR 2006 will fix hidden bugs and errors on your PC and increase the overall performance speed of your computer by as much as 300%.
错误的医生2006年将修正隐藏的错误和错误,在您的PC上,增加整体表现的速度在您的计算机上高达300 %。
Error DOCTOR will fix hidden bugs and errors on your PC and increase the overall performance speed of your computer by as much as 300%.
错误的医生将修补程序隐藏的错误和错误,对您的PC和增加整体表现的速度在您的计算机上高达300 %。
Support * IDE SATA USB drive to install, has solved the other GHOST system in part of SATA to restore or has a hidden partition on a computer.
支持IDESATAUSB光驱安装,解决了其他GHOST系统在部份SATA或有隐藏分区的电脑上无法正常恢复的问题。
This gives you information about all the programs, hidden and visible that your computer is currently running.
这给你提供所有的节目,并隐藏着,你的电脑正在运行。
Computer software hidden in a computer with the purpose of collecting information about the use of the computer.
隐藏在计算机中的用于收集计算机使用信息的软件。
Disk Investigator helps you to discover all that is hidden on your computer hard disk.
磁盘调查可以帮助您发现所有的即是隐藏在您的计算机硬盘上。
In the BIOS setup cd-rom, select the first automatic equipment to hard disk partition first. Have a hidden partition name-brand computer manual equipment.
在BIOS中设置光驱发起,选择第一项即可自动设备到硬盘第一分区。有躲藏分区的品牌机主张手动设备。
The hidden line and hidden surface removal is one of the difficult problems in computer graphics.
隐藏线和隐藏面的消除是计算机图形学中较为困难的问题之一。
For multilayer perceptron with single hidden layer, the computer simulation is done to get the number of hidden neurons and quantization bit which satisfy the design requirement.
针对单隐层感知器的硬件设计进行了计算机仿真,得到了满足设计要求的隐层神经元个数和量化比特数。
At present, computer virus enters all fields of information society, and brings enormous damage and hidden threats for computers all over the world.
目前计算机病毒可以渗透到信息社会各个领域,给全球计算机系统带来了巨大破坏和潜在威胁。
Double click the [Computer] 4 open - click on the [view] - [hidden] a project.
打开双击【计算机】—点击【查看】—将【隐藏的项目】等打上钩。
Note: If you want to remove all partitions from a GPT disk, you may need to convert it to a MBR disk (using e. g. the Computer Management tool) in order to remove hidden partitions.
注意:如果您想从GPT磁盘中移除所有分区,您可能需要把它转换为MBR磁盘(使用诸如计算机管理工具)以便移除隐藏分区。
Work days range anywhere from spending countless hours on the computer editing photos to photographing the Milky Way Galaxy or backpacking in search of hidden waterfalls!
每日的工作类别不一,从花数小时在电脑上剪辑照片到拍摄银河,或是徒步寻找隐蔽的瀑布都有,不一而足。
Computer Science A set of instructions hidden inside a legitimate program, causing a computer to perform illegitimate functions.
非法命令,病毒:一套隐藏在合法程序中的命令,指示计算机进行不合法的运作。
This method of computing the use of powerful computer pattern recognition and the ability to 'tap' a large amount of data hidden in the law.
这种方法利用计算机强大的运算及模式识别能力,来‘挖掘’大量数据中所蕴藏的规律。
Then turn on the computer but do not boot the hidden system.
之后打开计算机但不要启动隐形系统。
The only thing I can find some written records, but they spoil big, like a huge monster hidden in my computer, every click to enter, I will not withdraw into the maze.
我唯一能够找到的是一些文字记录,但它们太宠大了,像个巨大的怪物藏在我电脑里,每一次点击进入,我就要陷入迷宫无法抽身。
This article analyses the process and the character of the hacker attacking the computer and the hidden troubles in the library computer data, in order to protect computer 's security.
以一则真实的入侵实例分析黑客人侵过程、常用手段、特征及图书馆数据安全存在的隐患、危害及防范措施。
New drugs could routinely be checked in the computer for additional hidden targets and potential use in different therapeutic areas.
新药将通过电脑进行常规检测来寻找潜伏的靶点和更多的作用范围。
Trusted computing platform is a computer soft hardware entity to solve the hidden trouble of information security, which makes people pay more and more attention to it.
可信计算平台作为解决信息安全隐患的计算机软硬件实体,引起了人们越来越多的关注。
Computer program hidden in another computer program with the purpose of destroying software or collecting information about the use of the computer.
它是一个破坏计算机软件和窃取计算机用户的计算机木马程序。
With megabytes of sensitive files and private data on your computer or USB drive you can not imagine life without the hidden partition that is created using this wonderful tool.
它将在计算机或usb闪存驱动器中创建被保护的隐藏分区,对于有着大量敏感文件和保密数据的用户来说,是不能够想象在他们的电脑或US B驱动器里没有本可以利用这个工具来创建的隐藏分区。
The computer network is influencing our life and work day by day, because of the openness of network, it also exists enormous security hidden danger when brings us with convenient.
计算机网络已经日渐地深入到我们的日常生活和工作之中,由于网络的开放性,在带给我们方便的同时,也存在着极大的安全隐患。
The computer network is influencing our life and work day by day, because of the openness of network, it also exists enormous security hidden danger when brings us with convenient.
计算机网络已经日渐地深入到我们的日常生活和工作之中,由于网络的开放性,在带给我们方便的同时,也存在着极大的安全隐患。
应用推荐