请输入您要查询的英文单词:

 

单词 木马
释义

马木 noun ()

Mamou n

Examples:

特洛伊木马

Trojan horse

旋转木马

carousel
merry-go-round
Carousel, South Korean TV soap opera

木马病毒

Trojan horse (type of computer virus)

See also:

adj

wooden adj
simple adj

n

wood n
tree n
numbness n

numb
coffin
surname Mu

horse or cavalry piece in Chinese chess
surname Ma
knight in Western chess

External sources (not reviewed)

它支持安全密码输入(SPE)功能,PIN输入和验证均在设备内部完成,从而避免了敏感信息暴露于电脑和工作站等易 木马 病 毒或USB数据监听攻击的设备中。
acs.com.hk
Supporting Secure PIN Entry (SPE), it requires both PIN entry and authentication to be done within the device, thus eliminating the exposure of
[...]
sensitive information to PC’s or workstations that are vulnerable to security
[...] attacks such as Trojans and USB sniffers.
acs.com.hk
此外,您负责采取预防措施确保您选用的任何信息没有病毒、蠕虫、特洛 木马 等 危害及其它带有破坏性质的内容。
delaval.cn
In addition, it is up to you to take precautions and to ensure that whatever
[...]
you select for your use is free of such items as
[...] viruses, worms, Trojan horses and other items of [...]
a destructive nature.
delaval.com
同时,娜鲁延迟导致他们的地方在海洋中被称为混乱的旋 木马 , 那里的人们忘记他们在做什么,他们的任务真菌。
zh-cn.seekcartoon.com
Meanwhile, Nalu has delayed the Fungi in their quest by leading them to a place in the ocean called the Carousel of Confusion, where people forget what they’re doing.
seekcartoon.com
员工如果浏览与业务无关的网站,最终会把 僵尸网络客户端木马、间 谍软件、键盘记录程序、垃圾邮件程序等各种恶意软件带入公司网络。
watchguard.com
Employees who surf to non-business-related
[...]
sites end up inviting into the corporate network
[...] bot clients, Trojans, spyware, keyloggers, [...]
spambots… the entire gamut of malware.
watchguard.com
因为PIN码只会被输入至ACR83
[...] PINeasy的键盘上,而不会被暴露在易受攻击的电脑或工作站上,从而避免 木马 病 毒或USB数据监听工具截获PIN码的可能性。
acs.com.hk
Supporting Secure PIN Entry (SPE), it requires both PIN entry and authentication to be done within the device, thus eliminating the exposure of
[...]
sensitive information to PC’s or workstations that are vulnerable to security
[...] attacks such as Trojans and USB sniffers.
acs.com.hk
这一明示的免责声明包括因您访问、使用或浏览本网站,您的计算机硬件、软件、内存或您或他人的任何其他财产可能遭受的由于病毒、蠕虫 木马 或 任 何其他计算机软件或异常所导致的感染、影响或破坏等损害。
emerson.com
This express disclaimer includes damages caused by viruses, worms, trojans or any other computer software or anomaly that may infect, affect, or damage your computer hardware, software, memory or any other property of yours or others, as a result of your access to, use of, or browsing in this site.
emerson.com
木马受小 孩子欢迎的地方是,造型具真实或怀旧意味(如历经数代儿童而不衰者)和可以发声。
cpsc.gov
Features
[...] that make rocking horses popular include [...]
their realistic or nostalgic (like those popular for previous generations
[...]
of children) appearance, and their ability to make sounds.
cpsc.gov
网络安全成为目前国家和社会各界关注的焦点,网络安全不仅关系到国家网络与信息的
[...] 安全保障,也与个体网民日常生活中的信息和交易安全息息相关,因此本次报告专门展开了 针对网络安全的调查,分别对网民受到病毒 木马 攻 击 、号码被盗等安全事件进行询问,同 时调查网民电脑安装安全软件的情况。
apira.org
Network security has become a nationwide and social focus, which is not only related to the security guarantee of national networks and information, but also the information and transaction security of individual Internet users in daily life, therefore this report conducted a special survey on network security, inquired
[...]
of Internet users about security
[...] events like virus, Trojan horse attack and number [...]
stealing, and surveyed the installation of security software.
apira.org
爱马仕国际不提供任何保证或证明以确保Hearts and Crafts网站无病毒、无删除信息程序、 木马 或 其 它破坏程序。
lesmainsdhermes.com
HERMÈS INTERNATIONAL cannot guarantee and certify that the Hermès
[...]
Hearts and Crafts website is free from any virus, data
[...] overwriting programs, Trojan horses or any other destructive [...]
material.
lesmainsdhermes.com
病毒查杀:若您使用Linux作为服务器的话,建议定期扫描病毒、蠕虫 木马 , 对 于连接到Internet的服务器需要更加注意,即便是服务器遭到了入侵,那些对Linux一知半解的管理员往往还被蒙在鼓里。
bsdrc.com
Virus Killing: If you use Linux as a
[...]
server, then, suggest a periodic scan for
[...] viruses, worms and Trojans, for connecting [...]
to Internet servers require more attention,
[...]
even the server been invaded, those little knowledge of Linux administrators are also kept in the drums.
bsdrc.com
上传含病毒木马、蠕 虫、定时炸弹、清除器、损坏的文件或者任何类似的、可能损害其他人的计算机或资产的软件或程序。
solvusoft.com
Upload files that
[...] contain viruses, Trojan horses, worms, time bombs, [...]
cancelbots, corrupted files, or any other similar software
[...]
or programs that may damage the operation of another's computer or property of another.
solvusoft.com
2.1.1 用户提供信息是正确、完整、真实、合法的,不存在虚假、欺诈、骚扰性的、中伤他人的、伤害性的、诽谤、侮辱、恐吓、庸俗淫秽等违反法律、公序良俗或社会伦理道德的信息或内容,也不存在危害网络或计算机系统的安全性、完整性、稳定性、连续性的病 毒 木马 程 序 等电脑软件、文档或其他数据资料。
first-top.com
2、The user to provide information   2.1:The user guarantees:     2.1.1 The information is correct, complete, true and legitimate by users, there is no false, fraudulent, harassing, libelous, harmful, defamatory, abusive, threatening, vulgar and obscene, and other violations of the law, public order and good morals or social ethics information or the content of morality, there was no harm the network or computer
[...]
system security, integrity, stability,
[...] continuity of viruses, trojans and other computer [...]
software, documentation or other data.
first-top.com
超级嗅探狗不能实现屏幕监控、禁用USB、记录键盘输入、限制运行单机程序 木马 功 能
imfirewall.com
WFilter can not do screen monitoring, USB forbiding, keystroke recording and forbidding running of special programs which do not need a network connection.
imfirewall.us
云安全”是通过网状的大量客户端对网络中软件行为的异常监测,通过这种广泛的搜索行为获取互联网 木马 、 恶 意程序的最新信息,自动推送到服务端进行自动分析和处理,再把病毒 木马 的 解 决方案分发到每一个客户端,从而达到有效的防范效果。
prayfly.net
Cloud security" is through the network of the client software to network the behavior of the abnormal monitoring, through this extensive search
[...]
behavior acquisition in
[...] the Internet Trojan, malicious programs of the latest information, automatic delivery to the server for automatic analysis and processing, and then the virus and Trojan solutions distributed [...]
to every client,
[...]
so as to achieve effective prevention effect.
prayfly.net
小孩坐上去 时,脚应可触及地面木马的底 座,而 木马 的 摇 摆弧度也应当有所限制。
cpsc.gov
Children’s feet should touch the
[...] floor or the base of the horse when they are seated, and the horse should have [...]
a confined rocking arc.
cpsc.gov
Ken Thompson是一个著名 的黑客,他编写了一个编译器,当编译器编译自己时,就在'login'程序中留下后门 和永久木马。
bsdmap.com
Ken Thompson, in one of the great hacks of all time, wrote a compiler
[...]
that left a back door in the 'login' program and
[...] perpetuated the trojan when the compiler realized it was compiling itself.
bsdmap.com
这并不意味着社交网络诈骗都在下降,他们只是一个更大计划的一小部分 – 发射如宙木马网站攻击。
technologeeko.com
That does not mean that social
[...]
networking scams are declining; they are simply a small part of a bigger plan — launching
[...] Web exploits like the Zeus Trojan.
technologeeko.com
一旦网友不慎上当,特洛木马程序 便会下载并启动其他恶意档案,联机到网站以建立点对点控制的殭尸网络 [...]
(botnet),使个人计算机自动下载广告软件、间谍程序及其他恶意软件,成为传送垃圾邮件的傀儡,更会进一步链接到殭尸网络下载病毒下载器 (Downloader
[...]
),以便随时更新病毒,进一步窃取企业机密。
jfetek.com
Once users
[...] inadvertently taken, the Trojan horse program will start [...]
the download and other malicious files, connect to the
[...]
Web site in order to establish point-to-point control of the zombie network (botnet), so that the PC automatically download adware, Spyware and other malicious programs to send spam to become a puppet, but also further links to the zombie network to download virus-download (Downloader), in order to update the virus, and further to steal corporate secrets.
jfetek.com
万一发生了诸如网络上木马或病 毒试图以某种方式感染操作系统的事件,它们无法传播,等待重新启动。
igel.com
In the unlikely event that trojans or viruses from [...]
the Internet somehow manage to infect the operating system, they can
[...]
only remain there until it is restarted.
igel.com
笔者以为,安全设备的使用,和上述的道理是完全一样的,多学习些Linux系统、编程以及网络方面的知识,将自己的功力修炼得更高些,面对病毒 木马 时 , 才能更加自信,对待自己的工作时才可以游刃有余。
bsdrc.com
I think that safety equipment use, and the truth is exactly the same study more some Linux systems, programming and network knowledge, will have his own
[...]
ability and practice some more, the
[...] face of viruses, Trojan horses, the more confidence [...]
can be , when treatment can be its capability to their own work.
bsdrc.com
只有内容可以接受的网站才被允许进入GRTC网络,降低了网络感染病毒、特洛 木马 、 键 盘记录器、间谍软件或其它恶意程序的风险。
cn.safenet-inc.com
Only web sites with acceptable material are allowed onto GRTC’s
[...]
network, reducing the risk of infecting the network
[...] with a virus, Trojan, key logger, [...]
spyware or other malicious program.
safenet-inc.com
黑客针对这个漏洞,构造了恶意的PDF文档,一旦网民打开这类文档,电脑将自动运行远程控制 木马。
oapdf.com
To address this vulnerability hackers construct a malicious PDF
[...]
document, once the users to open these documents, the computer will
[...] automatically run the Trojan horse-type remote control.
oapdf.com
发布或传输任何含有,但不限于病毒 木马 、 蠕 虫、广告软件、间谍软件、犯罪软件、在线涂鸦恶搞软件、植入软件、隐匿软件、键盘记录软件、机器人软件、或其他任何有害软件或程序段的任何信息、文件或软件
logitech.com.cn
Post or transmit any information, file, or
[...]
software that contains, but not limited
[...] to, a virus, Trojan horse, worm, adware, [...]
spyware, crimeware, online graffiti tagger,
[...]
dropper, rootkit, keylogger, bot, or any other harmful software program or program element
logitech.com
智能追逃猎手系统(EHL Smart HEC)与公安部CCIC数据保持同步,同时根据各省发布本省的在逃人员数据,每日同步到各地公安局或交警支队信息中心,采用多线程技术和防病毒及 木马 原 理 ,实时过滤捕捉用户键盘录入的身份证敏感信息,经后台发送WEB SERVICE进行即时比对,支持异步操作,有效解决了追逃与日常业务的矛盾。
ehualu.com
WEB:http://www.ehualu.com(EHL Smart HEC) are kept synchronized with CCIC data of  the Ministry of Public Security, in the meantime it is synchronized to all the public security bureaus or information centers of traffic police detachments every day according to data about escapers of every province released by officials of the province. It filters and captures sensitive information of ID cards in real time input in by users with keyboards with multi-distance technologies, anti-virus and anti-Trojans theories, have a comparison immediately after back stages have sent WEB SERVICE, and supports asynchronous operations to effectively solve the contradiction between pursuits and daily operations.
ehualu.com
您还了解,Baldwin 或 CLARCOR
[...] 均不担保或保证通过“服务”可供下载的任何文件不含病毒、蠕虫、特洛 木马 或 表 明遭到污染或具有破坏特性的其他代码。
baldwinfilters.com
You also understand that neither Baldwin nor CLARCOR guarantees or warrants that any files available for downloading through the
[...]
Service will be free of infection or
[...] viruses, worms, Trojan horses or other code that [...]
manifest contaminating or destructive properties.
baldwinfilters.com
您还不能发布、传播或通过本站点传播任何有害的技术性内容(这包括但不仅限于电脑病毒、逻辑炸弹、特洛 木马 、 蠕虫、有害组件、破损数据或者其他恶意软件或有害数据)或进行其他非法性操作(将包括但不仅限于黑客行为)。
kensington.com
You must also not transmit any technically harmful postings or transmissions to or through this Site (and such shall include
[...]
but not be limited to computer viruses,
[...] logic bombs, Trojan horses, worms, harmful components, [...]
corrupted data or other malicious
[...]
software or harmful data) or engage in other practices of misuse (which shall include but not be limited to hacking).
kensington.com
这是一款备受赞誉的邮件病毒扫描软件,结合了传统的病毒防护方式与最新的主动防护技术的优势,针对恶意程序、病毒、间谍软件 木马 病 毒 、蠕虫、键盘记录程序提供可靠有效的防护。
parallels.com
This award-winning software from Kaspersky Labs combines traditional anti-virus defense methods with the latest proactive technologies to
[...]
provide solid and dependable protection against malicious programs,
[...] viruses, spyware, Trojan viruses, worms, [...]
and keyloggers.
parallels.com
还要, 还要!再来一次!然后去玩 旋木马,赫尔辛基大转轮,过山 车,幸运抽奖,疯狂大峡谷...最 后,才去玩山脊冲浪,因为在那里 可以把全身都能溅上水花。
visithelsinki.fi
And then on the cars, then the Ferris wheel, then the roller coaster, then the games, then the wild rapids… We can go on the water coaster last of all, because you always get wet on that one.
visithelsinki.fi
随便看

 

英汉双解词典包含2273206条英汉词条,基本涵盖了全部常用单词的翻译及用法,是英语学习的有利工具。

 

Copyright © 2004-2022 Newdu.com All Rights Reserved
更新时间:2025/3/26 20:22:39