According to Kaspersky Labs' Alex Gostev, Waledac will download a rogue antivirus application onto infected machines, as well as an email-worm that can steal data and send spam.
根据卡巴斯基实验室的Alex Gostev提供的信息,Waledac也会下载一个流氓杀毒软件到感染机器,以及一个可以窃取数据和发送垃圾邮件的电子邮件蠕虫病毒。
The honeypot host under distributed honeynet performed high inveiglement to worms and possesses "come in easily, out strictly" data control policy, this influenced worm propagation and control.
分布式蜜网下的蜜罐对蠕虫表现出强诱骗性和“宽进严出”的数据控制策略等特性,影响到蠕虫的传播及控制。
In the design of the worm hob CAD system, all the work is focused on the data processing from the design calculation to the view output.
在蜗轮滚刀CAD系统的设计中,从设计计算到图形输出都是以数据处理为中心来组织的。
In order to verify the validity of the algorithm, this paper designed an experimental methods to apply the algorithm through the existing network worm propagation data to verify its effectiveness.
为了验证上述算法的有效性,本文设计了一套实验方法,通过对现有网络蠕虫传播数据归档文件应用该算法进行检测来验证其有效性。
In order to verify the validity of the algorithm, this paper designed an experimental methods to apply the algorithm through the existing network worm propagation data to verify its effectiveness.
为了验证上述算法的有效性,本文设计了一套实验方法,通过对现有网络蠕虫传播数据归档文件应用该算法进行检测来验证其有效性。
应用推荐