最后在此基础上完成了一个基于内核入侵的木马设计与实现。
Based on that, has completed the design and the realization of a kind of kernel hacking Trojan Horse Finally.
很多计算机病毒、蠕虫和特洛伊木马的设计都利用了弱口令。
Many computer viruses, worms, and Trojan horses are designed to exploit weak passwords.
哈尔滨市中信木艺工艺品厂是国内唯一设计制造实木空心地球仪、木制啤酒桶、木托、木马车、木制足球的专业厂商。
Harbin Zhongxin wood Artistic Product Factory is the only professional manufacturer in China to make solid wood hollow globe, wood beer barrel, wood pallet, wood horse-cart, and wooden football.
最后,为验证端口反弹通信连接,设计了一个原型木马。
Finally, a prototype PRTH is designed to validate the port recall communication connection.
本文提出的木马查杀设计思想在该领域是具有一定的指导意义,为计算机网络安全提供了一种全新的探索方法。
The design idea of detecting Trojan which presents in this paper has a guiding significance in the concerned field. This paper introduces a new exploration method for the computer network's security.
本文提出的木马查杀设计思想在该领域是具有一定的指导意义,为计算机网络安全提供了一种全新的探索方法。
The design idea of detecting Trojan which presents in this paper has a guiding significance in the concerned field. This paper introduces a new exploration method for the computer network's security.
应用推荐