Trojan horse

美 [ˌtroʊdʒən ˈhɔːrs]英 [ˌtrəʊdʒən ˈhɔːs]
  • n.特洛伊木马;(特洛伊)木马程序(一种欺骗程序,看起来有用,实际却旨在毁坏数据等);(来自外部的)颠覆分子(或活动)

复数: Trojan horses

Trojan horseTrojan horse

noun

1

特洛伊木马;(来自外部的)颠覆分子(或活动)
a person or thing that is used to trick an enemy in order to achieve a secret purpose

2

(特洛伊)木马程序(一种欺骗程序,看起来有用,实际却旨在毁坏数据等)
a computer program that seems to be helpful but that is, in fact, designed to destroy data, etc.

Trojan horse

频次

  • 1
    N-COUNT (用于掩盖真实目的或意图的)特洛伊木马,幌子
    If you describe a person or thing as a Trojan horse, you mean that they are being used to hide someone's true purpose or intentions.

    Was Colombo the emissary of Pope Paul, his Trojan horse within the Commission?...

    科隆博是教皇保罗的特使吗?是他在委员会内部设下的卧底吗?

  • 2
    N-COUNT 木马病毒
    A Trojan horse is a computer virus which is inserted into a program or system and is designed to take effect after a particular period of time or a certain number of operations.

    Operating systems can be brought to a halt by a Trojan Horse.

    操作系统可能会因为木马病毒的攻击而中止。

  1. He said the new malware , dubbed Duqu , was a Trojan Horse designed to collect and relay back information about the host system .

    他说这个被称为Duqu的新病毒是一种特洛伊木马病毒,专门收集并反馈客户系统的信息。

  2. The recent Kernel-mode driver virus is Trojan horse virus , downloader virus , backdoor virus . Rootkit technology as a whole complex of the virus .

    近期出现的内核模式驱动级病毒是集特洛伊木马病毒、下载器病毒、后门病毒、Rootkit技术为一体的复合型病毒。

  3. Operating systems can be brought to a halt by a Trojan Horse .

    操作系统可能会因为木马病毒的攻击而中止。

  4. Both factions accused each other of using the organization as a Trojan horse to advance their causes .

    两派都相互指责对方利用该组织作幌子以发展各自的事业。

  5. Was Colombo the emissary of Pope Paul , his Trojan horse within the Commission ?

    科隆博是教皇保罗的特使吗?是他在委员会内部设下的卧底吗?

  6. Design and Implementation of Remote Control System Based on Trojan Horse Technology

    基于木马技术的远程控制系统设计与实现

  7. A new trojan horse on Windows operating system is presented .

    研究了Windows操作系统下的一种新型木马技术。

  8. And it also analyses the development trend of Trojan horse defense technology .

    并分析了未来木马防御技术的发展趋势。

  9. A Study on the Techniques of Trojan Horse Attack and Protection

    木马攻击与防范技术研究

  10. The analysis , detection and prevention to the Trojan horse virus

    木马病毒的分析、检测与防治

  11. New Scheme for the Injection of Trojan Horse Based on DLL

    基于DLL技术的特洛伊木马植入新方案

  12. The Analysis and Trend Predicts for the New Trojan Horse

    新型木马技术剖析及发展预测

  13. Grade . Research and Improvement of Kernel Trojan horse Based on Memory Mapping

    内存映射型内核级木马的研究与改进

  14. There is no evidence of a Trojan horse on your system .

    在您的系统中没有发现木马。

  15. Study on a New Type of Trojan Horse Based on SPI and Remote Thread

    基于SPI及远程线程技术的新型木马研究

  16. Research on the concealing technology of Trojan horse based on DLL

    基于DLL的特洛伊木马隐藏技术研究

  17. Research and Practice Based on Survivability of Trojan Horse

    特洛伊木马可生存性研究及攻防实践

  18. The Design and Implementation of the Trojan Horse Based on Kernel Hacking

    基于内核入侵的木马设计与实现

  19. Aim To keep away the new type of Trojan horse based on SPI .

    目的防范基于SPI技术漏洞的新型木马。

  20. Finally , the current detection technology of Trojan horse based API HOOK it presented .

    最后,讨论了基于APIHOOK技术的特洛伊木马的检测技术。

  21. Trojan Horse Attack Mechanism Analysis and Preventive Measures

    基于木马攻击机制的防范措施剖析

  22. This paper introduces the port scan and Trojan horse detection model pieces in it .

    这里主要介绍其中的端口扫描和木马检测两个模块。

  23. The Research of the Injection and Defense of Web page Trojan Horse Based on Email

    基于邮件的网页木马植入与防范方法研究

  24. Trojan Horse and the security of system

    木马程序与系统安全

  25. A feasible defending method of a new Trojan horse based on service provider interface flaws

    基于SPI技术漏洞的新型木马的防范方法

  26. Design and Analysis of a Kind of Model for Searching and Killing Trojan Horse Based on Heuristic Analysis

    一种启发式木马查杀模型的设计与分析

  27. Analysis of Trojan Horse and Its Detection

    木马病毒分析及其检测方法研究

  28. Research on Trojan Horse Detection Based-on Heuristic Analysis

    基于启发式分析的木马检测技术研究

  29. This paper takes lots of experiments which use the real Trojan horse program on the Windows system .

    本文选择实际的木马程序,在Windows系统下进行了大量的实验。

  30. You mean send a virus or a Trojan horse ?

    你是说发送个病毒或是特洛伊木马进去?