What is the translation of " 的恶意代码 " in English?

Examples of using 的恶意代码 in Chinese and their translations into English

{-}
  • Political category close
  • Ecclesiastic category close
  • Programming category close
清单14-在一定时间周期后激活的恶意代码.
Listing 14. Activation of malicious code after a certain time period.
同一台计算机上的恶意代码执行可将此作为拒绝服务攻击的基础。
Malicious code executing on the same computer could use this as the basis of a denial-of-service attack.
但事实是,当你更改密码时,我的恶意代码每次都会保存一个新密码!!
But the fact is that when you change the password, my malicious code every time saved a new one!
攻击者可以使用这样的漏洞将他的恶意代码嵌入到易受攻击的网站中。
An attacker could use such a flaw to embed his malicious code in the vulnerable Web site.
然而,通过将我们的恶意代码注入到一个经过微软签名的WSH脚本中,我们可以绕过这样的限制。
However, by“injecting” our malicious code into a Microsoft signed WSH script, we can bypass such a restriction.
RFI和LFI攻击会通过包含对远程承载的恶意代码的URL引用,利用脆弱的PHPWeb应用程序参数,以启用远程执行。
RFI and LFI attacks take advantage of vulnerable PHP Web application parameters byincluding a URL reference to remotely hosted malicious code, enabling remote execution.
但事实是,当你更改密码时,我的恶意代码每次都会保存一个新密码!!
You will be right,but the fact is that when you change the password, my malicious code every time saved a new one!
Lurk木马非常独特,它的恶意代码不会存储在受害者的计算机中,而是在随机访问存储器(RAM)中。
The Lurk Trojan is distinctive in that its malicious code is not stored on the victims' computer but in the random access memory(RAM).
因此在他下次登录时,类似的恶意代码将被放入他的电脑中。
Therefore, the next time he logs in, the similar malicious code will be deposited onto his computer.
目前,大多数针对移动设备的恶意代码都包含特洛伊木马,它们伪装成合法应用程序,窃取移动设备上的数据和其他宝贵信息。
Currently most malicious code for mobile devices consists of Trojans that pose as legitimate applications with the ability to steal data and other valuable information.
攻击过程中使用的恶意代码基于WindowsPowerShell脚本,后门木马通过DNS域名服务与C&C基础设施实现通信。
The malicious code used in the attack is based on Windows PowerShell scripts, the RAT communicates with the C&C infrastructure through Domain Name Service.
在DDoS攻击中,攻击者使用在多台计算机上安装的恶意代码,标识并且攻击目标设备。
In a DDoS attack, the attacker uses malicious code installed on multiple computers to identify and attack the target device.
安全功能使您能够查看和处理PDF文档,而不必担心机器上正在执行的恶意代码
The security features allow you to view andwork with PDF documents without having to worry about the malicious code being executed on your machine.
来自美国网络安全公司ICEBRG的安全研究人员发现了四款Chrome扩展,其中包含可通过官方Chrome网上应用店获得的恶意代码
Researchers from US-based IT security company,ICEBRG have uncovered four Chrome extensions containing malicious code that were available through the official Chrome Web Store.
安全功能使您能够查看和处理PDF文档,而不必担心机器上正在执行的恶意代码
The security functions enable you to view andwork with PDF documents without having to worry about malicious code being executed on your machine.
更新入侵防御系统(IPS),以识别潜在的恶意代码到达您的设备.
Update intrusion prevention systems(IPS) to identify potentially malicious code from reaching your device.
还有许多其他公司使用不同版本的恶意代码,并通过文本或电话传递。
There are numerous othercompanies that have used differing versions of malicious code, delivered via text or call.
这些扩展程序注入的恶意代码会在特定条件下激活,并将用户重定向到特定的页面。
The malicious code of extensions was activated only under certain conditions and redirected users to certain sites.
对恶意软件功能的分析显示,32%的恶意代码实现了RAT功能,12%有dropper功能和10%有DDoS功能。
The analysis of malware functionalities revealed that 32% of malicious code implemented RAT features, 12% dropper capabilities and 10% DDoS abilities.
恶意软件作者常利用这些技术,让自己的恶意代码在必需的Windows进程中执行。
Malware authors often leverage these techniques to get their malware code to run through a necessary and required Windows process.
一个合格的病毒扫描程式在扫描该檔案时,應該会有如同扫描到真正的恶意代码一样完全一致的反应。
A compliant virus scanner, when detecting the file,will respond in exactly the same manner as if it found genuinely harmful code.
迈克菲表示,恶意软件的总产量持续飙升,并且还有1000万条新的恶意代码被编目。
McAfee said total malware production continued to soar and10 million new pieces of malicious code were catalogued.
相反于蠕虫,该病毒需要一个程序做为宿主,在那里寄存它的恶意代码
In contrast to a worm, a virus always requires a program as host,where the virus deposits his virulent code.
在未来,我们希望发掘潜在的选择,以防止通过此网站的访问者拥有的设备中使用的恶意代码
In the future,we hope to explore potential options for preventing the use of malicious code on devices owned by visitors of this site.
反病毒程序就可以扫描文件的恶意代码或显示警报。
The antivirus program can then scan the file for malicious code or display an alert.
我们的Kmart商店支付数据系统感染了当前反病毒系统和应用程序控制无法检测到的恶意代码
Our Kmart store paymentdata systems were infected with a form of malicious code that was undetectable by current anti-virus systems and application controls.
韩国广播通讯委员会官员李晟远(LeeSeong-won,音译)周三告诉记者,袭击所用的恶意代码一旦被激活,就会干扰计算机启动。
Lee Seong-won, an official at the communications commission,told reporters on Wednesday that the malicious code, once activated, disrupted the booting of computers.
政府部门和私营网络安全公司周六也表示,他们预计黑客会修改在周五攻击中使用过的恶意代码,恢复自我复制的能力。
Governments andprivate security firms on Saturday that they expect hackers to tweak the malicious code used in Friday's attack, restoring the ability to self-replicate.
周六时,政府与私营安全公司表示,它们认为黑客将会对周五发起攻击的恶意代码进行修改,恢复代码的自我复制能力。
Governments andprivate security firms on Saturday that they expect hackers to tweak the malicious code used in Friday's attack, restoring the ability to self-replicate.
Results: 29, Time: 0.0179

Word-for-word translation

Top dictionary queries

Chinese - English