• 最后基础上完成一个基于内核入侵木马设计实现

    Based on that, has completed the design and the realization of a kind of kernel hacking Trojan Horse Finally.

    youdao

  • 很多计算机病毒蠕虫特洛伊木马设计利用口令

    Many computer viruses, worms, and Trojan horses are designed to exploit weak passwords.

    youdao

  • 哈尔滨市中信艺工艺品国内唯一设计制造实木空心地球仪木制啤酒、木木马木制足球专业厂商

    Harbin Zhongxin wood Artistic Product Factory is the only professional manufacturer in China to make solid wood hollow globe, wood beer barrel, wood pallet, wood horse-cart, and wooden football.

    youdao

  • 最后,为验证端口反弹通信连接设计一个原型木马

    Finally, a prototype PRTH is designed to validate the port recall communication connection.

    youdao

  • 本文提出木马查杀设计思想领域是具有一定指导意义计算机网络安全提供了一种全新的探索方法

    The design idea of detecting Trojan which presents in this paper has a guiding significance in the concerned field. This paper introduces a new exploration method for the computer network's security.

    youdao

  • 本文提出木马查杀设计思想领域是具有一定指导意义计算机网络安全提供了一种全新的探索方法

    The design idea of detecting Trojan which presents in this paper has a guiding significance in the concerned field. This paper introduces a new exploration method for the computer network's security.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定