You may at any time easily use it to uninstall the malicious program.
您可在任何时候轻易地用它来卸载恶意程序。
This is malicious program and none of information shouldn't be trusted.
这是恶意程序和信息都不应是不可信的。
When you compile the code, consider whether there is some way a malicious program could modify it.
当您编译程式码时,请想想恶意程式码是否可以利用某种方式来修改它。
Use this mode to temporarily lock down computers during a known network attack or when a malicious program is spreading.
使用这种模式,可以在一个已知的网络攻击或者病毒程序沿着网络传播期间,暂时地锁定电脑。
Callous virus writers are using the London bomb attacks to spread a malicious program on computers across the country.
那些冷酷无情的电脑病毒编写者们现在开始在全英范围内传播新的病毒程序,这次选用的题材便是刚刚的伦敦连环爆炸案。
A rootkit also known as (root kit) is basically a set of tools that are used to conceal a malicious program from the computer user.
一个rootkit也被称为(根工具包),基本上是一组用来隐瞒计算机用户恶意程序工具。
In addition to controlling malicious program at the source, users are entitled to customizing the protection lever for your computer.
除控制恶意节目之外在来源,用户的有资格获得定做您的计算机的保护杠杆。
A keylogger is a malicious program that tracks keystrokes on the victim's computer to illegally capture the user's personal data, such as passwords.
键盘记录器是一种恶意程序,跟踪击键在受害者的电脑,非法获取用户的个人数据,如密码。
The malicious program quickly found its way into computers controlling industrial processes the world over, demonstrating how vulnerable control systems are to such attacks.
提及的恶性程序能很快发现并进入控制世界上工业过程的计算机组,这说明控制系统在面对这种攻击时是多么的不堪一击。
In this following example, taken from the Microsoft blog, a malicious program (circled in red) is pretending to be the safe option (circled in green) of viewing and opening files.
在下面这个例子里(取自Microsoft博客),一个恶意程序(红圈)假装成某一安全的查看和打开文件选项(绿圈)。
We advice that parents should to turn off the administrative right to the computer, so that they don't install malicious program or change any important configuration in the operating system.
建议父母关闭计算机的管理员权限,这样孩子们就不能安装恶意软件或改变系统重要配置。
If you can keep malicious data from entering your program, or at least keep it from being processed, your program becomes much harder to attack.
如果您能不让恶意的数据进入您的程序,或者至少不在程序中处理它,您的程序在面对攻击时将更加健壮。
If the attacked program was initiated by a system administrator, the malicious code will then run as a part of the original program, giving the attacker administrator privileges on the system.
如果受攻击的程序是由系统管理员启动的,那么恶意代码将作为原始程序的一部分进行执行,给黑客系统中的管理员特权。
A new program aims to put the squeeze on malicious software that can disable, infiltrate or transform a computer system into an unwitting zombie - before the cyber attack ever materializes.
一种新的程序旨在对恶意软件施加压力,该程序可以在网络攻击开始之前以禁用,渗透或变换的方法阻止计算机在不知情的情况下成为一个僵尸电脑。
If the attacker is able to fill in just enough space with dummy data (i.e., NOPs) and then add a bit of malicious code or a value, the program will execute the malicious code or use that new value.
如果黑客能够用伪数据(也就是,NOP)填充足够的空间,然后添加一点恶意代码或值,那么程序将执行恶意代码或使用新值。
An attacker could set the PATH environment variable to change where saposcol looked for other programs, and then create a malicious "expand" program for saposcol to run.
攻击者可以通过设置PATH环境变量来改变saposcol寻找其他程序的位置,然后为saposcol创建一个恶意的“扩展”程序来运行。
If the program has not been carefully written, a vandal with malicious intent could submit an entry that's 30,000 characters long instead of the expected 30.
如果一个程序的代码没有被认真编写,一个有恶意意图的破坏者就能够提交一个30000个字符长的条目,而不是预计的30个字符长。
If the program has not been carefully written, a vandal with malicious intent could submit an entry that's 30, 000 characters long instead of the expected 30.
如果一个程序的代码没有被认真编写,一个有恶意意图的破坏者就能够提交一个30000个字符长的条目,而不是预计的30个字符长。
The application included a program named saposcol, which failed to protect itself against malicious input values.
这个应用程序中有一个名为saposcol的程序,没有能保护自己免受恶意输入值的攻击。
In one familiar example of this vulnerability, the built-in Windows calculator program is executed; however, the executed program could have just as easily been something of a more malicious nature.
在一个这种脆弱性的熟悉的实例中,内嵌的Windows计算器程序被执行,然而,被执行的程序很容易是更恶意的。
An extraordinary behind-the-scenes struggle is taking place between computer security groups around the world and the brazen author of a malicious software program called Conficker.
在全球范围内,一场非同寻常的幕后战斗正在计算机安全组织同那些被叫做conficker的邪恶程序的无耻的病毒编制者之间展开。
Any program that allows an external entity to input data is vulnerable to malicious activity, such as buffer overflows and embedded control characters.
任何允许外部实体来输入数据的程序都容易受到恶意的攻击,例如缓冲区溢出和嵌入式控制字符。
The e-mail contained a PDF file that was intended to install a malicious software program known as Poison Ivy, which was meant to give an intruder complete control of the victim's computer.
邮件包含了一份PDF文件企图安装一个名为“有毒常春藤”的恶意程序以便入侵者能完全控制受害人的电脑。
"Any action taken by the program which is not in the model must be something malicious," Wool said.
“程序所进行的任何行为只要不在良好行为的模型中就一定是恶意的。”Wool说。
Software tamper resistance is the art of crafting a program such that it cannot be modified by a potentially malicious attacker without the attack being detected.
介绍软件抗篡改是编写程序的艺术,使代码在没有攻击检测的情况下,不会被潜在的有恶意的攻击代码所修改。
Software tamper resistance is the art of crafting a program such that it cannot be modified by a potentially malicious attacker without the attack being detected.
介绍软件抗篡改是编写程序的艺术,使代码在没有攻击检测的情况下,不会被潜在的有恶意的攻击代码所修改。
应用推荐