• In malicious host surroundings, a software can be reverse engineered and also can be tampered with.

    恶意主机环境下软件系统可以逆向工程篡改,其机密性、完整性与可用性受到威胁。

    youdao

  • How to protect application program from malicious host is a new issue that cannot be dealt by traditional technologies.

    如何保护应用程序恶意主机的破坏传统安全技术无法处理的。

    youdao

  • This paper proposed a mobile agent static routing protocol based on the reference state which can prevent from malicious host.

    本文提出了一种基于参考状态移动代理防患恶意主机的静态路由协议

    youdao

  • External malicious host can still through the NAT equipment and the public address using private address arrive the slogan "protected" host.

    外部恶意主机仍然可以通过NAT设备公有地址端口号到达使用私有地址的“受到保护”的主机。

    youdao

  • Among these security problems, how to protect mobile code from malicious host is a new issue that cannot be dealt by traditional technologies.

    这些安全问题中,如何保护移动代码不受主机的损害传统安全技术无法处理需求

    youdao

  • First is the security of mobile agent system, especially the malicious host problem; Second is the fair exchange problem in electronic commerce.

    首先移动代理系统安全问题特别是恶意主机问题其次电子商务中的公平交易问题。

    youdao

  • So protection technologies of mobile code in malicious host attract much attention and there are very important theoretical and practical significance.

    因此恶意主机环境下移动代码保护技术研究具有重要理论现实意义受到极大重视

    youdao

  • Reverse engineering has become possible or distorted wilfully for software system in malicious host surroundings, the security, integrity and availability of software system are threatened.

    恶意主机环境下,主机可以软件系统进行逆向工程或者肆意的篡改,安全性完整性可用受到了很大的威胁。

    youdao

  • If a malicious user gets hold of this key information, then the security of that host machine can be compromised very easily.

    如果恶意用户获得了这些密钥信息那么主机安全性容易受到威胁。

    youdao

  • Many Chinese saw the narrow failure of their bid to host the games in 2000 as the result of malicious western attempts to keep their country in check.

    许多中国人认为2000年那次申奥功亏一篑是由于心怀不轨西方人企图它们自己国家榜上有名

    youdao

  • The monstrous complexity of contemporary computer systems inevitably results in design and implementation errors, most of which allow malicious users to gain control of the remote host or damage it.

    现代计算机系统设计实现错误是由自身高度复杂性引起的,大多数错误容许恶意用户获得主机远程控制权或者受到损害

    youdao

  • Code (software) that is transferred from a host to a client (or another host computer) to be executed (run). When we talk about malicious mobile code we may use a Worm as an example.

    代码(软件)主机传送客户机上(或者传送到另一台主机上)执行(运行)。譬如蠕虫

    youdao

  • Code (software) that is transferred from a host to a client (or another host computer) to be executed (run). When we talk about malicious mobile code we may use a Worm as an example.

    代码(软件)主机传送客户机上(或者传送到另一台主机上)执行(运行)。譬如蠕虫

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定