• The trojanmedia player” that’s causing concern today isn’t available in the Android Market.

    这个今天引起关注媒体播放器木马并未出现Android Market上。

    youdao

  • The sculpture shows the Trojan priest Laocoon and his sons being crushed to death by sea snakes.

    雕塑显示特洛伊祭司拉奥孔儿子撞死,海蛇死刑

    youdao

  • In addition, the Trojan still can modify the quick way of the browser, point to specific website.

    此外木马修改浏览器快捷方式指向特定网站

    youdao

  • Outfitted with a keystroke-capture mechanism, the Trojan horse records the user names and passwords.

    自带了键盘输入机制木马病毒就会记录用户的网银账号密码。

    youdao

  • UPDATE: Reader Jon Oberheide emailed us to say he’d gotten a copy of the trojan and dissected its code.

    更新读者JonOberheide给我们电邮搞到了一个木马拷贝解读了的代码。

    youdao

  • A terrible storm ensued, and the Trojan ships were driven out of their course towards the coast of Africa.

    场可怕的风暴随之而来特洛伊刮离航道,非洲海岸漂去。

    youdao

  • Night ambush in the Trojan warriors come out to open the city gates, Greek soldiers rush to capture the city.

    到了夜间埋伏木马中的勇士跳出来,打开城门希腊将士一拥而入攻下了城池。 ?。

    youdao

  • Won't flip a farfetched page again not only, was to reduce more again toxic the odds of the Trojan in mixing.

    不仅不会弹出乱七八糟页面,更是降低了再次中毒木马几率

    youdao

  • "The Trojan was smart enough to be able to look at the [victim's] bank balance," says Yuval Ben-Itzhak, CTO of Finjan.

    木马十分狡猾,能够看到受害者的账户余额比其他银行木马都要高级。

    youdao

  • Suitable for all kinds of operating system, from the Trojan scavenger extracted rubbish, don't visit. Download use.

    适合各种操作系统木马清道夫提取出来垃圾清理器,访下载用用呀。

    youdao

  • Finally, German mercenaries clad only in costumes from the Trojan Women leapt into the harbor for no apparent reason.

    最后德国雇佣兵穿着《特洛伊女人》中的戏服跳进中,原因不明

    youdao

  • Applied the artificial immune principle in the Trojan detection because of the adaptive and the immunity study capacity.

    利用人工免疫具有适应以及免疫学习能力特点,将人工免疫原理应用木马检测

    youdao

  • At first I was pushed into the Trojan Greek people outside the gates of trojans, then was found, was dragged into the city.

    首先希腊特洛伊城门然后特洛伊发现,被城里

    youdao

  • But even if the Trojan hypothesis is wrong, it might be something just as interesting: planets in resonance with each other.

    即使木马假说错误的,行星相互共振也是十分有趣的现象。

    youdao

  • This paper has discussed the operation principle of the Trojan Horse virus that caused the harm greatly to computer security.

    讨论计算机安全危害极大木马病毒工作原理

    youdao

  • Most schoolchildren know the basics of the Trojan horse, but Virgil outlines all of the intriguing details of myth and legend.

    上学孩子都熟知特洛伊木马故事,但是吉尔这个神话故事的复杂细节做了描述。

    youdao

  • Through studying techniques of the Trojan and anti-Trojan, this paper presents the Trojan-detection technology based on behavioral analysis.

    本文通过木马木马检测技术研究,提出基于行为分析的木马检测技术

    youdao

  • Thus it can be seen that the Trojan horse is the most harmful to mobile banking and can easily steal the money from the bank card at any time!

    由此可见木马病毒手机银行危害性最大可以随时轻易盗取银行卡里的钱财

    youdao

  • Once installed, the Trojan starts sending SMS messages behind the scenes that cost several dollars per message, without the device owner knowing it.

    安装后,手机用户毫不知情的情况下,木马以每短信美元后台开始发送短信

    youdao

  • Once infection moves, the Trojan can release file name to systematic folder DLL of random ill will and sys file, average user is aware of very hard.

    一旦感染运行木马系统文件夹释放文件名随机恶意dllSYS文件普通用户很难察觉

    youdao

  • The Trojan horse exploits a flaw in the Adobe software to allow it to install additional malware components and further compromise the vulnerable computer.

    木马利用Adobe软件中的漏洞用户电脑安装额外的恶意软件组件从而进行进一步感染。

    youdao

  • But Achilles' heel did not get wet, and during the Trojan war Paris, prince of Troy, shot and killed Achilles by hitting him with an arrow in the heel.

    然而阿基里斯脚跟并未被冥河之水浸湿特洛伊战争期间特洛伊王子巴里斯射箭击中阿基里斯脚跟,阿基里斯因而丧命

    youdao

  • This paper introduces the Trojan horse and its damage to computer system, and advances some methods and defensive measures for killing the Trojan horse.

    介绍木马病毒及其计算机系统危害性,提出了几种查杀木马病毒的方法防御措施

    youdao

  • This paper introduces the Trojan horse and its damage to computer system, and advances some methods and defensive measures for killing the Trojan horse.

    介绍木马病毒及其计算机系统危害性,提出了几种查杀木马病毒的方法防御措施

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定