英语人>网络例句>恶意软件 相关的搜索结果
网络例句

恶意软件

与 恶意软件 相关的网络例句 [注:此内容来源于网络,仅供参考]

Of course, if the threat is that a rogue employee of the software company might produce a malicious patch, fuzzing becomes important again.

当然,如果威胁一个软件的流氓雇员公司可能会产生恶意修补程序,起毛变得重要的了。

I fired up my Windows installation to see what was going on and ultimately found out that someone had managed to hack my index.php file and injected malicious code into it, resulting in the warnings from anti-virus software and the resulting negative search impact.

我激活我的窗口安装装置,想探个究竟,最终发现有黑客设法入侵我的index.php文件,在里面安插了恶意符号,导致了防毒软件提出警告标示,并在搜索上造成了不良的影响。

Find unauthorised software , unknown processes, browser hijacks.

查找未授权的软件、未知的进程以及浏览器的恶意插件。

With the implementation of CPF, fine-grain and automatic privilege control can be transparently exercised to traditional applications, threats of malicious intrusion to a system can be reduced greatly, and support to the principle of least privilege can therefore be achieved effectively.

通过CPF的实现,系统能进行细粒度的、自动的特权控制,且对应用软件完全透明,恶意入侵的危害性被大大降低,系统能有效地支持最小特权原则。

第17/17页 首页 < ... 9 10 11 12 13 14 15 16 17
推荐网络例句

Since historical times,England ,where the early inhabitants were Celts, has been conquered three times .

从有历史以来,英国,在此地早期居住的是凯尔特人,已经被征服了三次。

Bluetooth OBEX File Transfer Enables the sending and receiving of files on your phone via Bluetooth.

蓝牙OBEX文件移动允许经过蓝牙传送和接受文件。。。。

The almost sure central limit theorem is a pop topic of the probability research in recent years,because it has many actual applications in the random analogue.

中文摘要:几乎处处中心极限定理是近几十年概率论研究的一个热门话题。它之所以引起人们的注意是由于它在随机模拟方面的实际应用参见Fisher