Or an attacker might be able to install a Trojan horse program or unsolicited E-mail sending software, aim at financial enrichment or cause brand name damage by modifying company resources.
或攻击者可以安装一个特洛伊木马程序或不请自来的电子邮件发送软件,目的是在金融活动或造成损害品牌名称,修改公司的资源。
If it succeeds, the attack will download a Trojan with a keylogger component that many anti-virus software packages do not yet identify, according to Websense.
成功的话,攻击者会下载一个键盘记录木马的组成部分,许多反病毒软件还没有确定。
Trojan horse Malware that masquerades as non-malicious software.
特洛伊木马软件,经常伪装成无害软件。
Now they install "Trojan" software that ransacks hard drives for bank details and the like.
如今他们安装了“木马”软件,它会洗劫用户的硬盘,寻找上面有关银行的细节和类似的信息。
The Trojan horse exploits a flaw in the Adobe software to allow it to install additional malware components and further compromise the vulnerable computer.
该木马利用Adobe软件中的漏洞向用户电脑安装额外的恶意软件组件从而进行进一步感染。
Torpig is a type of malicious software called a Trojan that hides in infected computers, allowing them to be controlled remotely.
Torpig是一种称为“特洛伊木马”的恶意软件,隐藏在受感染的电脑中。
Hastings' Trojan horse-netflix's software, embedded on myriad consumer devices-is already in place.
黑斯廷斯的特洛伊木马——Netflix的软件,嵌入于众多消费电子产品中,已经占据其位了。
Install virus detection software on your computer to protect from known viruses such as Trojan Horses.
您的计算机上安装病毒检测软件,以保护已知的特洛伊木马病毒,例如。
In order to prevent the Trojan invasion, the computer to install and update anti-virus software upgrade, not open the unknown email, no computer access to the internet.
为防止木马侵入,计算机要安装杀毒软件并及时更新升级,不随意打开不明电子邮件,严禁将涉密计算机接入互联网。
First of all, of course, is the mobile phone security software must be installed, but also develop a regular habit of killing the virus Trojan, ensure the relatively safe state of terminal.
首先,当然是手机一定要安装安全软件了,还要养成定期查杀病毒木马的习惯,确保终端处于相对安全的状态。
Users scan code seems to install the car rental software, in fact, the phone was implanted Trojan.
用户扫码后看似安装了租车软件,其实手机却被植入了木马。
It is through a variety of ways to induce other people to download to mobile phone, such as the popular social software, posing as buyers or online shopping platform to send the seller a Trojan link.
它通过各种方式去诱导其他人下载到手机,比如通过时下热门社交软件、或者假扮买家给网购平台上的卖家发送“木马”链接。
Secondly, can be screened by antivirus software, antivirus software open after choose security, virus killing, to detect APP, make sure to install APP not carrying Trojan virus.
其次,可以借助杀毒软件来进行甄别,打开杀毒软件后选择安全防护—病毒查杀,对APP进行检测,确保要安装的APP没有携带病毒木马。
This software is supposed to be a defense against Trojan horses, worms, and other types of viruses.
这个软件是用来对抗特洛伊木马,蠕虫病毒和其他种类的病毒的。
Or an attacker might be able to install a Trojan horse program or unsolicited email sending software, aim at financial enrichment or cause brand name damage by modifying company resources.
或攻击者可以安装一个特洛伊木马程序或不请自来的电子邮件发送软件,目的是在金融活动或造成损害品牌名称,修改公司的资源。
Trojan horse programs : Delivery vehicles for destructive code, which appear to be harmless or useful software programs such as games.
木马程序:破坏性指令的载体,它们外表没有危害或者是寄付在某些有用的软件程序如游戏中。
If your system affected baleful software (be like Trojan program), and all and other restore a technology when invalidation, you may need to reinstall a system.
如果你的系统感染了恶意软件(如木马程序),并且所有其他恢复技术都失效时,你可能需要重新安装系统。
Instead, its function is to mask the presence of other types of (usually malicious) software, such as Trojan horses, viruses or worms.
相反,其功能是掩蔽其他类型(常常是恶意的)软件,如木马程序、病毒或蠕虫。
Although there are many removal Trojan horse software that can automatically remove Trojan.
虽然现在有很多的清除特洛伊木马的软件,可以自动清除木马。
E-mail to customers with bank swindlers, falsely claimed that the Trojan program for the anti-spamming software and encourage them to download;
骗徒以银行名义向客户发电邮,讹称该木马程序为防垃圾电邮软件,鼓励他们下载;
The Element of Green Network Technology: Rejection and Block of Malicious Information, Virus, Trojan, System Hole and Software Garbages.
绿色网络技术条件(恶意信息、病毒、木马、漏洞、垃圾软件);
The Element of Green Network Technology: Rejection and Block of Malicious Information, Virus, Trojan, System Hole and Software Garbages.
绿色网络技术条件(恶意信息、病毒、木马、漏洞、垃圾软件);
应用推荐