go top

Trojan horse attack

  • 特洛伊木马攻击

网络释义专业释义

  特洛伊木马攻击

... 特洛伊木马有多重 How Much The Trojan Horse Weighs 特洛伊木马攻击 Trojan horse attack 特洛伊木马清除工具 Loaris Trojan Remover ...

基于22个网页-相关网页

  • 特洛伊木马攻击
  • 特洛伊木马攻击

·2,447,543篇论文数据,部分数据来源于NoteExpress

双语例句权威例句

  • The BreakingPoint system delivered a strike level 5 test that included exploits, network worms, denial-of-service attack, reconnaissance attacks, Trojan horse and backdoor intrusions.

    BreakingPoint系统提供一个5强度的攻击测试包括了侦测网络蠕虫拒绝服务攻击踩点攻击特洛伊木马后门入侵。

    youdao

  • This article discusses the work principles and attack technology and defending policies on Trojan Horse.

    本文介绍了木马的攻击原理、常用攻击技术以及防范策略

    youdao

  • The experiment result shows that the worm-kind Trojan horse can play positive role in the network attack and defense.

    实验结果表明蠕虫木马可以网络攻防发挥积极作用

    youdao

更多双语例句
  • The latest attack is a so-called Trojan horse, code used to swipe information from compromised PCs, named Myfip.

    FORBES: Chinese Take Out

  • Rouland points out that ISS Tuesday discovered a chat room called "IP Victims" on Yahoo that is being used for the exchange of IP addresses of machines compromised by the Trojan horse Back Orifice and an older distributed denial-of-service attack tool called Sub Seven.

    CNN: New denial-of-service attack tool uses chat programs

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定