特洛伊

tè luò yī
  • Troy
特洛伊特洛伊
特洛伊[tè luò yī]
  1. 特洛伊的喋喋不休让我暂时收起了阴郁思绪。

    Troy 's chatter kept me from thinking dark thoughts .

  2. 以他的年龄来说特洛伊非常聪明,早就想到了骗过她的妙计。

    Troy was very clever for his age and had already figured out ways to outsmart her .

  3. Linux特洛伊木马关键技术研究

    Key Technology of Linux Trojan Horse

  4. 最后,讨论了基于APIHOOK技术的特洛伊木马的检测技术。

    Finally , the current detection technology of Trojan horse based API HOOK it presented .

  5. 之后,他就开始收到各种有关病毒和特洛伊木马的警告,最后连Windows系统都无法启动了。

    He starting getting warnings about viruses and trojans and soon he couldn 't get Windows to boot up at all .

  6. Nest就是入侵家居领域的特洛伊木马。

    Nest was a Trojan horse into the home .

  7. 基于DLL技术的特洛伊木马植入新方案

    New Scheme for the Injection of Trojan Horse Based on DLL

  8. 基于DLL的特洛伊木马隐藏技术研究

    Research on the concealing technology of Trojan horse based on DLL

  9. 一个典型的“捕食者”系统包括四架无人机,一个地面控制系统和一个“特洛伊精神II”数据分送系统。

    A typical system configuration would include four aircraft , one ground control system and one Trojan Spirit II data distribution terminal .

  10. 基于DLL的特洛伊木马实时检测机制研究与实现

    Research and Implementation on Real-Time Detection Mechanism of Troy Dynamic Link Library

  11. 这种特洛伊病毒在hosts文件里劫持“vk.com”和“vkontakte.ru”这两个域名(两个都是俄罗斯的社交网站),把它们重定向到92.38.209.252,但它们的实现方法却很独特。

    ( both social networking sites in Russia ) and redirects them to92.38.209.252 , but achieves this in an unusual way .

  12. 基于APIHOOK技术的特洛伊木马攻防研究同时高起点地分析了IPv6环境下的Phishing攻击及其防御。

    Attack and Defence on API HOOK Technology of Trojan Horse Furthermore it analyses the phishing attack and defence based on the IPv6 .

  13. 《圣荷西信使报》(SanJoseMercuryNews)的消费科技专栏作家特洛伊•沃尔夫顿今早在Twitter上称,这篇新闻稿简直就是“一堆奥维尔主义式的欺人之谈。”

    In a tweet this morning , Troy Wolverton , personal technology columnist for the San Jose Mercury News , described the release as " an amazing collection of Orwellian doublespeak . "

  14. 研究了如何将Windows环境下的动态链接库(DLL)技术与远程线程插入技术结合起来实现特洛伊木马植入的新方案。

    A new scheme is studied to realize the injection of Trojan horse by combining the technology of DLL ( dynamic linking library ) and that of remote thread injection on the Windows platform .

  15. 考虑监测或过滤出站DNS连接,以便更好地维护您的枉络,对抗某些钓鱼攻击和一种新的伪装成DHCP服务器的特洛伊木马。

    Consider monitoring or filtering outbound DNS connections to better protect your network against certain phishing attacks and a new breed of trojans that masquerades as DHCP servers .

  16. RootKit是特洛伊木马后门工具,通过修改操作系统软件,使攻击者获得持续的系统访问权并隐藏在计算机中。

    RootKits are Trojan horse backdoor tools that modify operating system software so that an attacker can keep access to and hide on a machine .

  17. 内核级木马是一种与内核Rootkit技术相结合的特洛伊木马。内核Rootkit通过修改内核重要的数据结构,来实现对整个木马的隐藏。

    Kernel Trojan horse is the one which combines with kernel Rootkit technique which conceals whole Trojan through modifying the impartment system kernel data structure .

  18. 近期出现的内核模式驱动级病毒是集特洛伊木马病毒、下载器病毒、后门病毒、Rootkit技术为一体的复合型病毒。

    The recent Kernel-mode driver virus is Trojan horse virus , downloader virus , backdoor virus . Rootkit technology as a whole complex of the virus .

  19. 有时,手机在生产过程中就已经被植入了恶意软件,就像2014年StarN9500智能手机被发现预装了“特洛伊木马”一样。该款Android手机在中国制造,在亚马逊(Amazon)和eBay等平台出售。

    Sometimes phones are compromised during production , as happened in 2014 when a factory-installed " Trojan horse " was found on the Star N9500 Android smartphone , made in China and sold by companies such as Amazon and eBay .

  20. 根据希腊神话,牺牲高贵的伊菲革涅亚(iphigenia),是为了让希腊战舰获得前往特洛伊的顺风。

    According to Greek mythology , the noble Iphigenia was sacrificed so that the warships could have a fair wind to Troy .

  21. 在木马程序中最难以被用户检测到的就是更加深入操作系统内核的木马,内核层级木马是一种与内核Rootkit技术相结合的特洛伊木马。

    Most difficult Trojans detected by the user is the Trojan horse which penetrates more deeply into the operating system kernel , the kernel level of Trojan is a Trojan horse combined with Kernel Rootkit technology .

  22. Quttera无法和不应该被用来检测病毒,特洛伊木马病毒传播作为共同的计算机程序或可执行文件。

    Quttera is unable and should not be used to detect Viruses and Trojans spreads as common computer programs or executable files .

  23. 他说这个被称为Duqu的新病毒是一种特洛伊木马病毒,专门收集并反馈客户系统的信息。

    He said the new malware , dubbed Duqu , was a Trojan Horse designed to collect and relay back information about the host system .

  24. 很长一段时间以来,许多人都认为特洛伊只是个神话故事,直到19世纪70年代海因里希·施利曼(HeinrichSchliemann)第一次发掘出了它,他发现这个遗址中实际上有很多城市,多年以来层叠式地建在了一起。

    Troy was long considered by many to be the stuff of myth until it was first excavated in the 1870s by Heinrich Schliemann , who discovered that there were actually numerous cities on the site , which over the years had been built on top of one another .

  25. 马特和他的搭档特洛伊·霍夫曼警官一起去的

    Matt went in with his partner , officer Troy Hoffman .

  26. 他在诗作中说特洛伊人努力保护自己的城市。

    He said Trojans worked very hard to protect their city .

  27. 特洛伊和他的人明显在幕后。

    And Troy and his basketball robots are obviously behind it .

  28. 伊利莎白天生具有特洛伊城的海伦的丽质。

    Elizabeth was endowed with the beauty of Helen of Troy .

  29. 特洛伊人的任何武器都无法伤害阿奇里斯。

    None of the Trojan weapons was able to hurt Achilles .

  30. 他比特洛伊人还不愿意为我们作战。

    He is less likely to fight for us than trojans .