The trojan “media player” that’s causing concern today isn’t available in the Android Market.
这个今天引起关注“媒体播放器”木马并未出现在Android Market上。
The sculpture shows the Trojan priest Laocoon and his sons being crushed to death by sea snakes.
雕塑显示了特洛伊祭司拉奥孔和他的儿子被撞死,海蛇死刑。
In addition, the Trojan still can modify the quick way of the browser, point to specific website.
此外,木马还会修改浏览器的快捷方式,指向特定网站。
Outfitted with a keystroke-capture mechanism, the Trojan horse records the user names and passwords.
自带了键盘输入机制的木马病毒就会记录下用户的网银账号和密码。
UPDATE: Reader Jon Oberheide emailed us to say he’d gotten a copy of the trojan and dissected its code.
更新:读者JonOberheide给我们电邮说他搞到了一个木马的拷贝并解读了它的代码。
A terrible storm ensued, and the Trojan ships were driven out of their course towards the coast of Africa.
一场可怕的风暴随之而来,特洛伊人的船被刮离航道,向非洲海岸漂去。
Night ambush in the Trojan warriors come out to open the city gates, Greek soldiers rush to capture the city.
到了夜间,埋伏在木马中的勇士跳出来,打开了城门,希腊将士一拥而入攻下了城池。 ?。
Won't flip a farfetched page again not only, was to reduce more again toxic the odds of the Trojan in mixing.
不仅不会再弹出乱七八糟的页面,更是降低了再次中毒和中木马的几率。
"The Trojan was smart enough to be able to look at the [victim's] bank balance," says Yuval Ben-Itzhak, CTO of Finjan.
该木马十分狡猾,能够看到受害者的账户余额,这比其他银行木马都要高级。
Suitable for all kinds of operating system, from the Trojan scavenger extracted rubbish, don't visit. Download use.
适合各种操作系统,从木马清道夫提取出来的垃圾清理器,不访下载用用呀。
Finally, German mercenaries clad only in costumes from the Trojan Women leapt into the harbor for no apparent reason.
最后,德国雇佣兵只穿着《特洛伊女人》中的戏服跳进港中,原因不明。
Applied the artificial immune principle in the Trojan detection because of the adaptive and the immunity study capacity.
利用人工免疫具有自适应以及免疫学习能力的特点,将人工免疫原理应用到木马检测中。
At first I was pushed into the Trojan Greek people outside the gates of trojans, then was found, was dragged into the city.
首先我被希腊人推到特洛伊人的城门外,然后被特洛伊人发现,被拖进了城里。
But even if the Trojan hypothesis is wrong, it might be something just as interesting: planets in resonance with each other.
但即使木马假说是错误的,行星相互共振也是十分有趣的现象。
This paper has discussed the operation principle of the Trojan Horse virus that caused the harm greatly to computer security.
讨论对计算机安全危害极大的“木马”病毒的工作原理。
Most schoolchildren know the basics of the Trojan horse, but Virgil outlines all of the intriguing details of myth and legend.
上学的孩子都熟知特洛伊木马的故事,但是维吉尔对这个神话故事的复杂细节做了描述。
Through studying techniques of the Trojan and anti-Trojan, this paper presents the Trojan-detection technology based on behavioral analysis.
本文通过对木马及木马检测技术的研究,提出了基于行为分析的木马检测技术。
Thus it can be seen that the Trojan horse is the most harmful to mobile banking and can easily steal the money from the bank card at any time!
由此可见木马病毒对手机银行的危害性最大,可以随时轻易的盗取银行卡里的钱财!
Once installed, the Trojan starts sending SMS messages behind the scenes that cost several dollars per message, without the device owner knowing it.
安装后,在手机用户毫不知情的情况下,木马以每条短信几美元在后台开始发送短信。
Once infection moves, the Trojan can release file name to systematic folder DLL of random ill will and sys file, average user is aware of very hard.
一旦感染运行,木马会向系统文件夹释放文件名随机的恶意dll和SYS文件,普通用户很难察觉。
The Trojan horse exploits a flaw in the Adobe software to allow it to install additional malware components and further compromise the vulnerable computer.
该木马利用Adobe软件中的漏洞向用户电脑安装额外的恶意软件组件从而进行进一步感染。
But Achilles' heel did not get wet, and during the Trojan war Paris, prince of Troy, shot and killed Achilles by hitting him with an arrow in the heel.
然而阿基里斯的脚跟并未被冥河之水浸湿,而特洛伊战争期间,特洛伊王子巴里斯射箭击中阿基里斯的脚跟,阿基里斯因而丧命。
This paper introduces the Trojan horse and its damage to computer system, and advances some methods and defensive measures for killing the Trojan horse.
介绍了木马病毒及其对计算机系统的危害性,提出了几种查杀木马病毒的方法和防御措施。
This paper introduces the Trojan horse and its damage to computer system, and advances some methods and defensive measures for killing the Trojan horse.
介绍了木马病毒及其对计算机系统的危害性,提出了几种查杀木马病毒的方法和防御措施。
应用推荐