恶意代码

  • 网络Malicious Code;malware
恶意代码恶意代码
  1. Web应用程序客户端恶意代码技术研究与进展

    Study and Trends on Client-side Malicious Code of Web Application

  2. Web网页恶意代码的分析与防治

    The Analysis , Prevention and Cure of the Web Page Malicious Code

  3. Internet网页恶意代码浅析

    Elementary analysis on vicious code in internet page

  4. 应用专家系统开发Windows恶意代码检测系统的研究

    Development of Windows Malware Detection System Based on Expert System

  5. 最后,分析判断Web页面上是否存在恶意代码和链接。

    In the final analysis , judgement on the Web page record whether there are malicious code and links .

  6. 蠕虫作为恶意代码家族中重要的组成部分,对Internet网络安全产生了严重危害。

    Worm has been one of the greatest threats to Internet security as an important component of malicious codes .

  7. Linux下基于交叉视图的隐蔽恶意代码检测

    A Cross-View Based Stealthy Malicious Code Detection in Linux

  8. 基于API调用序列的恶意代码动态分析方法研究

    Malicious Code Dynamic Analysis base on the Windows API Sequences

  9. 随着P2P技术被广泛地应用在文件共享系统中,有越来越多的蠕虫和病毒等恶意代码通过这些P2P系统快速传播。

    Peer-to-Peer ( P2P ) has been widely adopted in file-sharing system recently .

  10. P2P文件共享系统中的恶意代码防治策略

    A Malware Defence Strategy for P2P File-Sharing System

  11. Linux操作系统下的安全问题有许多方面,恶意代码的感染与防范是其中一个重要组成部分。

    Linux Operating System 's security have some side , vicious code infect was important composing part .

  12. P2P蠕虫是利用P2P机制进行传播的恶意代码。

    The P2P-based worm is a kind of malicious code that takes advantage of P2P system to propagate .

  13. 而且,这个恶意代码还可能控制该mashup页面。

    Also , the malicious code can gain control of the mashup page .

  14. 这就把构建服务器置于提交给源树的bug和恶意代码的风险之下。

    This puts your build server at some risk from bugs and malicious code committed to source trees .

  15. 恶意代码有各种各样的形式,例如木马、恶意URL、病毒和钓鱼网站等等。

    There are various forms of malicious code , such as Trojan horses , malicious URLs , viruses and phishing websites .

  16. 介绍了Internet网页恶意代码的危害,分析了恶意代码工作基本原理,并针对恶意代码的感染机理提出了具体的防范措施及建议。

    Introduces the harm of vicious code in internet page , analyzes the basic operation principle of vicious code . Aiming at its infection mechanism , puts forward the protection measures and suggestions .

  17. Office加载程序的VisualStudio工具使用的默认设置不允许任何程序集运行,以保护用户免受病毒或其他恶意代码的侵害。

    The default settings used by the Visual Studio Tools for Office loader do not permit any assembly to run , which protects users from viruses and other malicious code .

  18. NX(NoeXecute)是一种通过将数据页标记为不可执行来防止恶意代码执行的硬件机制。

    " No eXecute " is a hardware functionality used to block malware code execution by marking data pages .

  19. 微软(Microsoft)、谷歌(Google)和时代华纳(TimeWarner)旗下美国在线(AOL)表示,他们使用了一系列技术和人工程序,在自己的系统里搜索恶意代码。

    Microsoft , Google and Time Warner 's AOL say they use a series of technical and manual procedures to scan for malicious code in their systems .

  20. 提出了多目标实时分析技术,使该系统能够对恶意代码运行时生成的进程、远程线程和Windows服务进行实时分析。

    Technique of multi-subjects analysis in real time is presented , leading this system to support real-time analysis of the processes , remote threads and Windows service spawned by malicious code in runtime .

  21. 如果数据包含恶意代码,mashup页面上的敏感数据就有可能落入恶意用户手中。

    If the data contains malicious code , sensitive data on the mashup page can fall into the wrong hands .

  22. 在rss阅读器中聚合新闻源,并将用户对新闻条目所作的评论包含进去,这种做法也增加了引入恶意代码的概率。

    Aggregating news feeds in RSS readers and including comments made by users on news items also increases the chances of malicious code being introduced .

  23. 由于PDF文档的高实用性和普遍适应性,因而更加加速了恶意代码的快速传播,使其成为恶意代码常用有效载体。

    Because of high availability and general adaptability of the PDF document , it accelerates the propagation speed of the malicious code and becomes its effective carrier .

  24. 内核态Rootkit是恶意代码中隐藏性最好,最难以检测的一类恶意代码。

    Kernel Mode Rootkit is one class of the best hidden and the most difficult detected malicious .

  25. 控制DLL加载、本地磁盘文件访问等容易被病毒恶意代码利用的关键环节。

    Some key such as DLL loaded , a local disk file access are likely to be made use of viral malicious code have been controlled .

  26. 与此同时,基于Android系统的恶意代码尤其是内核态Rootkit工具开始浮现,该系统的安全性逐渐成为业内外关注的焦点。

    At the same time , the malicious code based on the Android system , especially the kernel Rootkit tool has begun to emerge .

  27. 清楚地了解mashup应用程序中的安全漏洞,并寻找新的方法来避免包含未经授权的数据和恶意代码。

    Be aware of the vulnerabilities in mashup applications , and look for emerging answers to help protect you from unauthorized data and malicious code .

  28. 另一个好使用的手册将包装,绕过反病毒软件和作出任意恶意代码来成为AV最好的朋友。

    Another good use for manual packing would be to bypass Anti Virus software and make arbitrary malicious code to become AV 's best friend .

  29. 解决了Android应用程序的逆向分析、恶意代码的语义理解,相关敏感数据的数据流追踪,用户提交行为的判别等关键问题。

    It solves the problems of the reverse analysis of Android applications , semantic understanding of malicious code , data flow tracking of sensitive data , and determination of user submits behavior .

  30. 如您所见,黑客将恶意代码作为其userid输入,修改了查询语句的逻辑。

    As you can see , the hacker changes the query 's logic by entering the malicious code as his userid .