Case in point: The growing threat of malware infections.
例证:正在增长的恶意软件感染的威胁。
How do I access the basic Settings of Malware Protector?
如何访问恶意软件保护的基本设置?
How do I upgrade to the latest version of Malware Protector?
我怎么升级到恶意软件保护器的最新版本?
Such a system infection is typical for various kinds of malware.
这种系统的入侵就是一种典型的恶意软件。
Here's a helpful guide to understanding all the different types of malware.
以下指南对于理解所有不同类型的恶意软件将有所帮助。
This way a delayed execution of malware can be detected and remediated.
通过这种方式,恶意软件延迟的执行能够被检测和修复。
There are sometimes 50,000 new forms of malware for Windows released in a day.
要知道,针对Windows的新形式恶意软件有时每天释出超过50000个。
There are sometimes 50, 000 new forms of malware for Windows released in a day.
要知道,针对Windows的新形式恶意软件有时每天释出超过50000个。
Computer users have for years struggled with viruses, worms and all sorts of malware.
计算机用户长久以来都受到病毒、网络蠕虫以及各种恶意软件的侵扰。
Nothing will slow your system down like a virus, a Trojan horse, or other types of malware.
没有任何东西比病毒,特洛伊木马或者其他恶意软件更能减慢你系统速度的了。
To what degree has the monetization of malware increased the level of risk for all of us?
黑客软件的商业价值化在提升计算机的风险等级中起到了何种程度的推动作用?
10 years ago, with the growing number of malware attacks, organized crime proceeds from.
年前,恶意软件攻击不断增长,有组织的犯罪行为从中牟利。
Spammers there still operate huge networks of malware-infected machines that run spambots.
那里的垃圾信息散布者们仍运营着庞大的“肉鸡”网络。
But this particular arms race isn 't in a dead heat the mavens of malware are winning it.
但这不是一场势均力敌的军备竞赛,恶意软件的行家赢了。
One piece of malware, the Vundo Trojan horse, has been especially active the past three months.
其中的一个,VundoTrojanhorse在过去的3个月里异常活跃。
Ah, but could a particularly deceptive bit of malware sneak in under the guise of something legitimate?
啊,有没有可能少数特别的欺骗性的恶意软件假借合法行为的幌子潜入系统?
There have been cases where these 'gifts' have contained Trojan devices and other types of malware.
这就存在这种情况:这些“礼物”含有木马设备和其他类型的恶意软件。”
Some vendors also add a modifier after the suffix that further describes what type of malware it is.
一些厂商还会在后缀的后面加上修饰符,用来进一步说明恶意程序的类型。
Respondents were asked "Where do you suspect is the greatest danger of malware infection on the Internet?"
他们询问调查对象:“你怀疑哪里是互联网中恶意软件感染的最危险地带?”
It is continuously updated to efficiently handle the ever-changing threats posed by all types of malware.
它是不断更新,以有效地处理不断变化的所有类型的恶意软件造成的威胁。
The Stuxnet worm has become the most high-profile piece of malware with the potential to harm key infrastructure.
震网蠕虫病毒(Stuxnetworm)成为了最受高度关注的一个恶意程序用于潜在破坏关键基础设施。
Luckily for Twitter end users, the default URL-shortening service, Bit.ly, began warning users of malware last month.
Twitter的终端用户还算走运,Twitter默认的网址压缩服务Bit . ly上个月就开始向用户提示恶意软件的警告信息。
Smartphones, being sophisticated and fully featured computers, are receiving the growing attention of malware creators.
智能手机越来越成熟,还有功能齐全的电脑,正越来越受到恶意软件创建者的关注。
Hackers have become wholesale providers of malware-viruses, worms and Trojans that infect computers-for others to use.
黑客们已经成了提供恶意软件给他人使用的批发供应商- - -使电脑感染病毒、电脑蠕虫和中木马。
However, it is critical that the response should be prompt, as the new variants of malware are able to spread rapidly.
尽管如此,因为恶意软件的新变种能够迅速传播,及时的响应又是至关重要的。
In fact, that's been par for the course for this piece of malware which has been attacking social networks since July 2008.
实际上,这种事情对于自2008年7月就开始攻击社交网络的恶意软件而言是意料之中的事情。
Categorizations of malware are usually driven by how it infects, how it spreads, or what it modifies to hide or persist.
我们通常按照感染方式、传播方式或者它试图通过修改来隐藏或保存自身的文件类型来分类黑客软件。
Identify changes to security policy, software configurations, and the addition of malware detection and prevention controls.
认定安全策略、软件配置和恶意软件检测和防御控制的改变。
By creating a "root of trust" between software and silicon, the effects of malware can be greatly mitigated, according to Kurtz.
通过建立软件与硅芯片之间的“信任根”,恶意软件的影响是可以大大减轻,根据库尔茨。
By creating a "root of trust" between software and silicon, the effects of malware can be greatly mitigated, according to Kurtz.
通过建立软件与硅芯片之间的“信任根”,恶意软件的影响是可以大大减轻,根据库尔茨。
应用推荐