• This is malicious program and none of information shouldn't be trusted.

    恶意程序信息应是不可信

    youdao

  • When you compile the code, consider whether there is some way a malicious program could modify it.

    编译程式时,请想想恶意程式是否可以利用某种方式来修改

    youdao

  • Use this mode to temporarily lock down computers during a known network attack or when a malicious program is spreading.

    使用这种模式可以一个已知网络攻击或者病毒程序沿着网络传播期间暂时地锁定电脑

    youdao

  • Callous virus writers are using the London bomb attacks to spread a malicious program on computers across the country.

    那些冷酷无情的电脑病毒编写者们现在开始全英范围内传播新的病毒程序,这次选用的题材便是刚刚的伦敦连环爆炸案

    youdao

  • A rootkit also known as (root kit) is basically a set of tools that are used to conceal a malicious program from the computer user.

    rootkit称为(工具包),基本上用来隐瞒计算机用户恶意程序工具

    youdao

  • In addition to controlling malicious program at the source, users are entitled to customizing the protection lever for your computer.

    控制恶意节目之外来源用户资格获得定做您的计算机保护杠杆

    youdao

  • A keylogger is a malicious program that tracks keystrokes on the victim's computer to illegally capture the user's personal data, such as passwords.

    键盘记录器一种恶意程序跟踪键在受害者电脑非法获取用户个人数据,如密码。

    youdao

  • The malicious program quickly found its way into computers controlling industrial processes the world over, demonstrating how vulnerable control systems are to such attacks.

    提及的恶性程序能很快发现进入控制世界工业过程计算机组,这说明控制系统面对这种攻击时是多么不堪一击

    youdao

  • In this following example, taken from the Microsoft blog, a malicious program (circled in red) is pretending to be the safe option (circled in green) of viewing and opening files.

    下面这个例子里(取自Microsoft博客),恶意程序()假装某一安全查看打开文件选项(绿圈)。

    youdao

  • We advice that parents should to turn off the administrative right to the computer, so that they don't install malicious program or change any important configuration in the operating system.

    建议父母关闭计算机管理员权限这样孩子们就不能安装恶意软件改变系统重要配置

    youdao

  • If you can keep malicious data from entering your program, or at least keep it from being processed, your program becomes much harder to attack.

    如果不让恶意数据进入程序或者至少不在程序中处理,您的程序在面对攻击时将更加健壮。

    youdao

  • If the attacked program was initiated by a system administrator, the malicious code will then run as a part of the original program, giving the attacker administrator privileges on the system.

    如果攻击程序系统管理员启动的,那么恶意代码作为原始程序的一部分进行执行黑客系统中的管理员特权。

    youdao

  • A new program aims to put the squeeze on malicious software that can disable, infiltrate or transform a computer system into an unwitting zombie - before the cyber attack ever materializes.

    新的程序旨在恶意软件施加压力程序可以网络攻击开始之前禁用渗透变换的方法阻止计算机在不知情的情况下成为僵尸电脑。

    youdao

  • If the attacker is able to fill in just enough space with dummy data (i.e., NOPs) and then add a bit of malicious code or a value, the program will execute the malicious code or use that new value.

    如果黑客能够数据(也就是NOP填充足够空间然后添加一点恶意代码,那么程序执行恶意代码或使用值。

    youdao

  • An attacker could set the PATH environment variable to change where saposcol looked for other programs, and then create a malicious "expand" program for saposcol to run.

    攻击可以通过设置PATH环境变量改变saposcol寻找其他程序的位置,然后saposcol创建一个恶意的“扩展程序来运行。

    youdao

  • If the program has not been carefully written, a vandal with malicious intent could submit an entry that's 30,000 characters long instead of the expected 30.

    如果程序的代码没有认真编写,一个恶意意图破坏者就能够提交个30000个字符长的条目而不是预计的30个字符长。

    youdao

  • If the program has not been carefully written, a vandal with malicious intent could submit an entry that's 30, 000 characters long instead of the expected 30.

    如果程序的代码没有认真编写,一个恶意意图破坏者就能够提交个30000个字符长的条目而不是预计的30个字符长。

    youdao

  • The application included a program named saposcol, which failed to protect itself against malicious input values.

    这个应用程序中有一个名为saposcol程序没有保护自己免受恶意输入的攻击。

    youdao

  • In one familiar example of this vulnerability, the built-in Windows calculator program is executed; however, the executed program could have just as easily been something of a more malicious nature.

    一个这种脆弱性熟悉实例中,嵌的Windows计算器程序执行然而,被执行的程序很容易恶意的。

    youdao

  • An extraordinary behind-the-scenes struggle is taking place between computer security groups around the world and the brazen author of a malicious software program called Conficker.

    全球范围内,一场非同寻常幕后战斗正在计算机安全组织同那些被叫做conficker邪恶程序无耻的病毒编制者之间展开。

    youdao

  • Any program that allows an external entity to input data is vulnerable to malicious activity, such as buffer overflows and embedded control characters.

    任何允许外部实体输入数据程序容易受到恶意的攻击,例如缓冲区溢出嵌入式控制字符

    youdao

  • The e-mail contained a PDF file that was intended to install a malicious software program known as Poison Ivy, which was meant to give an intruder complete control of the victim's computer.

    邮件包含了PDF文件企图安装一个名为有毒常春藤恶意程序以便入侵者完全控制受害人电脑

    youdao

  • "Any action taken by the program which is not in the model must be something malicious," Wool said.

    程序进行任何行为只要不在良好行为的模型中就一定恶意的。”Wool

    youdao

  • Software tamper resistance is the art of crafting a program such that it cannot be modified by a potentially malicious attacker without the attack being detected.

    介绍软件抗篡改编写程序艺术,使代码没有攻击检测的情况下,不会潜在的恶意攻击代码所修改

    youdao

  • Program files that do not appear in our blacklist and whitelist are scanned using QVM, and any 'hits' returned by this technology are presumed to be malicious and removed or quarantined.

    项目档案出现我们黑名单白被扫描使用QVM任何精选经由这个技术同样认为恶意的、删除隔离

    youdao

  • Program files that do not appear in our blacklist and whitelist are scanned using QVM, and any 'hits' returned by this technology are presumed to be malicious and removed or quarantined.

    项目档案出现我们黑名单白被扫描使用QVM任何精选经由这个技术同样认为恶意的、删除隔离

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定