Starting from the harmfulness of the Trojan horse virus to the library’s network, this paper introduces the features and the spread of the Trojan horse virus, and expounds the detection and precaution of the Trojan horse virus that often makes trouble to the users of the library in the course of using the library’s network.
从木马病毒对图书馆网络的危害性出发,介绍了木马病毒特点及传播途径,并对图书馆用户在实际使用过程中经常受到困扰的计算机木马病毒的检测、防范等问题进行了阐述。
To ensure the availability and security of the information and raise the computer users’awareness of Trojan virus prevention, intensive research on preventing the computer viruses, especially Trojan viruses, is imminent.
为了确保信息的安全与畅通,提高计算机用户的木马病毒防范意识,因此,研究计算机病毒,尤其是木马病毒的防范措施已迫在眉睫。
With the development of computer and network technology , computer viruses has been developed rapidly from the initial dos virus up to now, as well as the worm virus, Trojan virus, network security has become a growing concern, and the Trojan virus is the greatest threat to the network security.
随着计算机和网络技术的不断发展,计算机病毒也在不断地快速发展,从最初的dos病毒到现在的蠕虫病毒以及木马病毒,网络安全成为人们越来越关注的问题,而木马病毒正成为网络安全的最大威胁。
How to check and eliminate the computer virus of Trojan. psw. misc;
密西木马病毒的手工检测及杀除方法
Talking about the Trojan-Horse and the Defensive Measures in the Internet Age
当今网络时代木马病毒及其防范措施
Initial experiment shows this method is able to detection IceRiver trojan horse and Broadcasting girl trojan hores.
初步实验结果表明,该方法可以有效发现冰河木马病毒和广外女生木马病毒。
TROJAN HORSE DEFENSE IN NEW ZEALAND AND CHINA;
中国和新西兰刑法关于电脑犯罪规定的比较研究——从入侵法律内部的木马病毒谈起
Automatically removes viruses, worms, and Trojan horses.
自动杀除病毒、虫和特洛伊木马。
Is it a virus, a worm, a trojan?
“它是病毒,蠕虫还是特洛伊木马?”
Viruses multiplythemselves unlike logic bombs and Trojans.
病毒不像逻辑炸弹和木马,他们还复制(殖)身。
Discussion on the Treatment of NS DownLoader Virus in E-Reading Room
浅谈超越机器狗的NS木马下载器病毒的处理
Is it a virus, a worm, a Trojan, or a backdoor?
判断任何任意的程序是一个病毒、蠕虫、木马,还是后门?
A Trojan virus, like a Trojan horse, is a program that appears safe-- but smuggles in a worm or virus.
特洛伊病毒,就跟特洛伊木马一样,看上去安全——其实暗藏“杀机”。
Attackers often use tracking cookies in conjunction with Web bugs.
攻击者使用它来传输病毒,蠕虫和特洛伊木马到用户的工作站。
This paper has discussed the operation principle of the Trojan Horse virus that caused the harm greatly to computer security.
讨论对计算机安全危害极大的“木马”病毒的工作原理。
The Research of Safeguard to the Injury of the D.O.S. Virus and Trojans Horse Code to the Network Security;
Dos病毒和木马攻击对网络安全的危害及应对措施的研究
Simple, light* and practical, it can scan and disinfect more than 58,000 viruses and Trojans directly over the Internet.
简单,轻便*实用,它可以扫描和消毒超过58,000病毒及特洛伊木马直接上网。
Molecular Characterization of Turnip Mosaic Virus, Potato Virus Y and Tobacco Vein-banding Mosaic Virus in China;
三种马铃薯Y病毒属病毒的分子特性
western equine encephalomyelitis virus
西方型马脑脊髓炎病毒
an acute bacterial disease of horses characterized by inflammation of the mucous membranes.
马的一种急性病毒性疾
Thanks to viruses, worms, Trojans, and a host of other malware and spyware that arrive on your computer daily, you need to be able to control communications from both directions.
由于天天到达您的电脑的病毒,蠕虫,木马,和其它恶意软件和间谍软件,你要能控制双向通信。
CopyRight © 2020-2024 优校网[www.youxiaow.com]版权所有 All Rights Reserved. ICP备案号:浙ICP备2024058711号