首页 / 词典 / good

trojan

美 [ˈtroʊdʒən]英 [ˈtrəʊdʒən]
  • n./adj.(小亚细亚古城)特洛伊人
trojantrojan

adj.

(小亚细亚古城)特洛伊人
a person from the ancient city of Troy in Asia Minor

习语
  1. You 're the only Trojan who could say that .

    你是唯一可以这么做的特洛伊人。

  2. Some Trojan or Lycian archer has wounded him with an arrow to our dismay , and to his own great glory .

    某个擅使弓箭的射手,某个特洛伊人或鲁基亚人射伤了他:对射手,这是一份光荣;但对我们,它却带来了忧愁。

  3. Operating systems can be brought to a halt by a Trojan Horse .

    操作系统可能会因为木马病毒的攻击而中止。

  4. Both factions accused each other of using the organization as a Trojan horse to advance their causes .

    两派都相互指责对方利用该组织作幌子以发展各自的事业。

  5. Was Colombo the emissary of Pope Paul , his Trojan horse within the Commission ?

    科隆博是教皇保罗的特使吗?是他在委员会内部设下的卧底吗?

  6. You have to work like a Trojan , especially in the beginning .

    你必须非常努力工作,尤其是在一开始的时候。

  7. Design and Implementation of Trojan Detection System Based on Network Communication Content

    基于网络通信内容的木马检测系统设计与实现

  8. Design and Implementation of Remote Control System Based on Trojan Horse Technology

    基于木马技术的远程控制系统设计与实现

  9. Analysis of Hide Mechanism for Trojan Based on Windows System

    基于Windows系统的木马程序隐蔽行径分析

  10. Process hidden is the key technologies to design Trojan program .

    进程隐藏是木马设计的关键技术。

  11. A new trojan horse on Windows operating system is presented .

    研究了Windows操作系统下的一种新型木马技术。

  12. The Trojan detection has been the focus of network security .

    显然,木马的检测已经成为当前网络安全技术的研究重点。

  13. Design and Implementation of a Self-Learning Trojan Detection and Prevention System

    自主式学习的木马检测预防系统的设计与实现

  14. The Remote Control Operation based on Trojan Program

    一种基于木马程序的远程控制与实现

  15. And it also analyses the development trend of Trojan horse defense technology .

    并分析了未来木马防御技术的发展趋势。

  16. A dynamic Trojan detection system based on Detours library was designed .

    设计了基于Detours库的木马动态检测系统。

  17. The analysis , detection and prevention to the Trojan horse virus

    木马病毒的分析、检测与防治

  18. Research of unknown Trojan detection based on artificial immune

    人工免疫在未知木马检测中的应用研究

  19. New Scheme for the Injection of Trojan Horse Based on DLL

    基于DLL技术的特洛伊木马植入新方案

  20. Analysis on the Trojan House Virus and Its Preventive Measures

    浅析木马病毒及其防范措施

  21. Trojan horses are a huge security threat to computer network .

    木马的存在给计算机网络带来了不容忽视的安全问题。

  22. The Analysis and Trend Predicts for the New Trojan Horse

    新型木马技术剖析及发展预测

  23. Grade . Research and Improvement of Kernel Trojan horse Based on Memory Mapping

    内存映射型内核级木马的研究与改进

  24. I don 't want to see another Trojan die because of me .

    我不想看见特洛伊人再为我送命了。

  25. Research on the concealing technology of Trojan horse based on DLL

    基于DLL的特洛伊木马隐藏技术研究

  26. Research and Practice Based on Survivability of Trojan Horse

    特洛伊木马可生存性研究及攻防实践

  27. In this paper , we designed and implement a process behavior match based analysis of Trojan detection system .

    本文设计和实现了基于进程行为的木马分析检测系统。

  28. The Design and Implementation of the Trojan Horse Based on Kernel Hacking

    基于内核入侵的木马设计与实现

  29. I knew the real reason for the Trojan war .

    我知道,特洛伊战争发生的真正原因。

  30. Final experiment had proved that in windows system , this system could detect Trojan efficiently .

    最终的测试结果表明该系统可以有效地进行木马动态检测。

  • 习语

adj.

work like a Trojan

埋头苦干;卖力干活
to work very hard