Trojan horse
- n.特洛伊木马;(特洛伊)木马程序(一种欺骗程序,看起来有用,实际却旨在毁坏数据等);(来自外部的)颠覆分子(或活动)
复数: Trojan horses
Trojan horse
-
1
N-COUNT (用于掩盖真实目的或意图的)特洛伊木马,幌子
If you describe a person or thing as a Trojan horse, you mean that they are being used to hide someone's true purpose or intentions.Was Colombo the emissary of Pope Paul, his Trojan horse within the Commission?...
科隆博是教皇保罗的特使吗?是他在委员会内部设下的卧底吗?
-
2
N-COUNT 木马病毒
A Trojan horse is a computer virus which is inserted into a program or system and is designed to take effect after a particular period of time or a certain number of operations.Operating systems can be brought to a halt by a Trojan Horse.
操作系统可能会因为木马病毒的攻击而中止。
-
He said the new malware , dubbed Duqu , was a Trojan Horse designed to collect and relay back information about the host system .
他说这个被称为Duqu的新病毒是一种特洛伊木马病毒,专门收集并反馈客户系统的信息。
-
The recent Kernel-mode driver virus is Trojan horse virus , downloader virus , backdoor virus . Rootkit technology as a whole complex of the virus .
近期出现的内核模式驱动级病毒是集特洛伊木马病毒、下载器病毒、后门病毒、Rootkit技术为一体的复合型病毒。
-
Operating systems can be brought to a halt by a Trojan Horse .
操作系统可能会因为木马病毒的攻击而中止。
-
Both factions accused each other of using the organization as a Trojan horse to advance their causes .
两派都相互指责对方利用该组织作幌子以发展各自的事业。
-
Was Colombo the emissary of Pope Paul , his Trojan horse within the Commission ?
科隆博是教皇保罗的特使吗?是他在委员会内部设下的卧底吗?
-
Design and Implementation of Remote Control System Based on Trojan Horse Technology
基于木马技术的远程控制系统设计与实现
-
A new trojan horse on Windows operating system is presented .
研究了Windows操作系统下的一种新型木马技术。
-
And it also analyses the development trend of Trojan horse defense technology .
并分析了未来木马防御技术的发展趋势。
-
A Study on the Techniques of Trojan Horse Attack and Protection
木马攻击与防范技术研究
-
The analysis , detection and prevention to the Trojan horse virus
木马病毒的分析、检测与防治
-
New Scheme for the Injection of Trojan Horse Based on DLL
基于DLL技术的特洛伊木马植入新方案
-
The Analysis and Trend Predicts for the New Trojan Horse
新型木马技术剖析及发展预测
-
Grade . Research and Improvement of Kernel Trojan horse Based on Memory Mapping
内存映射型内核级木马的研究与改进
-
There is no evidence of a Trojan horse on your system .
在您的系统中没有发现木马。
-
Study on a New Type of Trojan Horse Based on SPI and Remote Thread
基于SPI及远程线程技术的新型木马研究
-
Research on the concealing technology of Trojan horse based on DLL
基于DLL的特洛伊木马隐藏技术研究
-
Research and Practice Based on Survivability of Trojan Horse
特洛伊木马可生存性研究及攻防实践
-
The Design and Implementation of the Trojan Horse Based on Kernel Hacking
基于内核入侵的木马设计与实现
-
Aim To keep away the new type of Trojan horse based on SPI .
目的防范基于SPI技术漏洞的新型木马。
-
Finally , the current detection technology of Trojan horse based API HOOK it presented .
最后,讨论了基于APIHOOK技术的特洛伊木马的检测技术。
-
Trojan Horse Attack Mechanism Analysis and Preventive Measures
基于木马攻击机制的防范措施剖析
-
This paper introduces the port scan and Trojan horse detection model pieces in it .
这里主要介绍其中的端口扫描和木马检测两个模块。
-
The Research of the Injection and Defense of Web page Trojan Horse Based on Email
基于邮件的网页木马植入与防范方法研究
-
Trojan Horse and the security of system
木马程序与系统安全
-
A feasible defending method of a new Trojan horse based on service provider interface flaws
基于SPI技术漏洞的新型木马的防范方法
-
Design and Analysis of a Kind of Model for Searching and Killing Trojan Horse Based on Heuristic Analysis
一种启发式木马查杀模型的设计与分析
-
Analysis of Trojan Horse and Its Detection
木马病毒分析及其检测方法研究
-
Research on Trojan Horse Detection Based-on Heuristic Analysis
基于启发式分析的木马检测技术研究
-
This paper takes lots of experiments which use the real Trojan horse program on the Windows system .
本文选择实际的木马程序,在Windows系统下进行了大量的实验。
-
You mean send a virus or a Trojan horse ?
你是说发送个病毒或是特洛伊木马进去?