毕竟,计算机病毒是人造形式的生命。
我们应该警惕计算机病毒。
文未讨论了计算机病毒防治的一些问题。
Several viewpoints of prevention of computer viruses are discussed.
因此,研究计算机病毒的防范措施已迫在眉睫。
So it is extremely urgent to seek out strict precautionary measures against computer viruses.
很多计算机病毒、蠕虫和特洛伊木马的设计都利用了弱口令。
Many computer viruses, worms, and Trojan horses are designed to exploit weak passwords.
计算机病毒可以自我复制,然后由用户传给用户。
Computer viruses replicate themselves and are passed along from user to user.
计算机病毒是危极计算机系统安全与完整的一种威胁。
A computer virus is one kind of threat to the security and integrity of computer systems.
一些新的计算机病毒正在上升,每年他们获得比以前更多的恶意。
The number of new computer viruses is rising every year and they are getting more malicious than before.
当今网络上计算机病毒不但种类繁多而且更新的速度之快更是令人目不暇接。
In the network the sorts of computer virus are various and we can not catch the speed of its renewing.After comparing many kinds of virus, in order to be close to reality, I choose the "Worm."
一种计算机病毒,能自身复制,通过互联网快速的到达其他计算机。
A computer virus that can make copies of itself and spread to other computers over the Internet.
计算机病毒是一种计算机程序,被创建用来制造和传播自身的副本。
A computer virus is a computer program that is created to make and spread copies of itself.
为了确保系统的安全与畅通,因此,研究计算机病毒的防范措施已迫在眉睫。
In order to ensure system's security and unimpeded, therefore, studies the computer virus the measure to be imminent.
为了确保信息的安全与畅通,因此,研究计算机病毒的防范措施已迫在眉睫。
It has been imminent to study the measures against computer virus in order to insure information safety and smooth.
它通过寻找计算机病毒的“签名”(已知计算机病毒代码的标本)来做这件事情。
It does this by looking for virus "signatures" - chunks of computer code from known viruses.
按病毒设计者的意图和破坏性大小,可将计算机病毒分为良性病毒和恶性病毒。
According to the intention and destructive virus designers, can be the size computer virus can be divided into benign virus and malignant viruses.
在某种程度上,计算机病毒的传播方式早就表现出了与遗传算法的某些相似之处。
To some extent, virus infections already exhibit processes similar to genetic algorithms.
计算机病毒经常发生变异,也就是说它的不太重要的编码部分会发生细微的改变。
Computer viruses often mutate, as some non-vital sections of its code change slightly.
手机病毒也是一种计算机程序,和其它计算机病毒(程序)一样具有传染性、破坏性。
The cell phone virus is a computer program, and other computer viruses (procedures) with the same infectious and destructive.
计算机病毒是由一系列电脑程序组成的,它对计算机系统的安全性和完整性构成威胁。
Computer virus, whose essential component is a set of instructions, is one kind of threat to the security and integrity of computer system.
病毒程序嵌入到宿主程序中,依赖于宿主程序的执行而生存,这就是计算机病毒的寄生性。
The virus program is embedded into the host program and depends on the execution of the host program.
针对计算机病毒对计算机系统安全性的影响,给出保证计算机系统安全的措施具有现实意义。
In view of the computer virus influence on computer system security, it has real significance to develop measures to protect computer system safety.
目前计算机病毒可以渗透到信息社会各个领域,给全球计算机系统带来了巨大破坏和潜在威胁。
At present, computer virus enters all fields of information society, and brings enormous damage and hidden threats for computers all over the world.
目前计算机病毒可以渗透到信息社会的各个领域,给计算机系统带来了巨大的破坏和潜在的威胁。
The computer viruses can permeate each field of the informational society at present, and have brought enormous destruction and potential threat to computer system.
现代网络环境下的计算机病毒,以其宿主多、传染快、破坏性强等特征,已经成为信息社会的公害。
Under the modern network environment, owing to the characters of multi hosts, fast spread, high destructive effect, etc, computer virus has become public nuisance of the information society.
按计算机病毒入侵系统的途径可将计算机病毒分为源码病毒、入侵病毒、操作系统病毒和外壳病毒。
According to a computer virus intrusion system approach can be divided into source virus, computer virus virus, operating system viruses and shell viruses.
一个能够开发软件防止或消除计算机病毒的计算机病毒模拟试验系统,最近在北京通过了技术鉴定。
A computer virus simulated test system, which can develop software to prevent or eliminate computer viruses, passed technical appraisal recently in Beijing.
微软不仅致力于为我们的客户和社会提供安全情报,而且最准确和最全面的评估(计算机病毒)威胁的情形。
Microsoft is not only committed to providing security intelligence for our customers and the community, but the most accurate and comprehensive view of the realities of the threat landscape.
微软不仅致力于为我们的客户和社会提供安全情报,而且最准确和最全面的评估(计算机病毒)威胁的情形。
Microsoft is not only committed to providing security intelligence for our customers and the community, but the most accurate and comprehensive view of the realities of the threat landscape.
应用推荐