Examples of using Target computer in English and their translations into Chinese
{-}
-
Political
-
Ecclesiastic
-
Programming
The name of the target computer.
Requires a target computer OS and production network to run;
Copy the\bin folder to the target computer.
KD is capable of debugging a target computer which is running on an x86, Itanium, or x64 platform.
Sending a ping of this size could crash the target computer.
It does not require malware on the target computer, nor does it require the user to confirm any transactions.
We can see the SOFTWARE that is installed on the target computer:.
It leaves virtually no footprint on the target computer, so it is ideal for Internet Cafe.
Z-Cron must be installed on both the source and the target computer.
It leaves virtually no footprint on the target computer, so it is ideal for Internet Cafe.
It will also reset System Restore points,and download files to the target computer.
Running a UNIX command as the current user fails if the target computer is at the login window, because there is no current user.
The worm uses a speciallycrafted RPC request to execute code on the target computer.
The EXE program wasdesigned to create a small PowerShell script on the target computer to decode and execute an encoded version of DMShell++.
If we go down,we are able to see the SERVICES that are installed on the target computer.
It is configured using the'Builder' and deployed to a target computer via some undefined vector.
You can check these log files forspecific details about all changes the installer makes to the target computer.
It will show us the Desktop,and it will allow us to gain full access to the target computer, just like Remote Desktop.
To install Microsoft. NET Framework 3.0, one of the followingoperating systems must be installed on the target computer:.
Most countries also create newoffences to cover criminal activities that specifically target computer and communication systems and the data they hold.
The example sends a single message containing the string,“Hello.”,to the target computer.
That's why so many onlineattacks are based around simply flooding a target computer with traffic.
A copy of one of the supported Visual Studio®2005 products must be installed on the target computer.
For kernel-mode debugging,WinDbg requires two machines(the host computer and the target computer).
He turned the targeting computer off.
It turns his targeting computer off.
A cyberattack is any type of offensive maneuver that targets computer information systems, infrastructures, computer networks, or personal computer devices.
Nobody would appear immune to malicious and offensive acts targeting computer networks, infrastructures and personal computer devices.
He turns off his targeting computers, closes his eyes, and prepares himself for his final task.