1. This is the Greek legend of the Trojan Horse.
这就是希腊传说中的木马计。

来自互联网

2. They are defeated only because of the Trojan horse in their country.
他们战败的原因只是因为他们国内有暗藏的敌人。

来自互联网

3. Outfitted with a keystroke-capture mechanism, the Trojan horse records the user names and passwords.
自带了键盘输入机制的木马病毒就会记录下用户的网银账号和密码。

来自互联网

4. This paper has discussed the operation principle of the Trojan Horse virus that caused the harm greatly to computer security.
讨论对计算机安全危害极大的“木马”病毒的工作原理。

来自互联网

5. Most schoolchildren know the basics of the Trojan horse, but Virgil outlines all of the intriguing details of myth and legend.
上学的孩子都熟知特洛伊木马的故事,但是维吉尔对这个神话故事的复杂细节做了描述。

来自互联网

6. Thus it can be seen that the Trojan horse is the most harmful to mobile banking and can easily steal the money from the bank card at any time!
由此可见木马病毒对手机银行的危害性最大,可以随时轻易的盗取银行卡里的钱财!

来自互联网

7. This paper introduces the Trojan horse and its damage to computer system, and advances some methods and defensive measures for killing the Trojan horse.
介绍了木马病毒及其对计算机系统的危害性,提出了几种查杀木马病毒的方法和防御措施。

来自互联网

8. The Trojan horse exploits a flaw in the Adobe software to allow it to install additional malware components and further compromise the vulnerable computer.
该木马利用Adobe软件中的漏洞向用户电脑安装额外的恶意软件组件从而进行进一步感染。

来自互联网

9. They claim that our insistence on something larger, something firmer and more honest in our public life is just a Trojan Horse for higher taxes and the abandonment of traditional values.
我们对民众生活中更庞大、更坚固和更正直的事物之坚持,就如同一只特洛伊木马,只会导致更高的税收,以及传统价值的流失。

来自互联网

10. The most widespread approach is to use what Len Seymour, a researcher at Oxford University, describes as "Trojan horse" vectors.
用得最广的途径是被一位牛津大学研究员LenSeymour称为“特洛伊木马”的载体。

来自互联网

11. The BreakingPoint system delivered a strike level 5 test that included exploits, network worms, denial-of-service attack, reconnaissance attacks, Trojan horse and backdoor intrusions.
BreakingPoint的系统提供了一个5级强度的攻击测试,包括了侦测、网络蠕虫、拒绝服务攻击、踩点攻击、特洛伊木马和后门入侵。

来自互联网

12. Even after the end of white rule, some of South Africa's neighbours regard it as something of a Trojan horse for the West.
即便是后白人统治时期,南非的一些邻国仍把其看做是西方在非洲安插的内线。

来自互联网

13. Apple users see Google's operating system as a Trojan horse for the search giant to simply sell more ads, not make people's lives easier or more rewarding.
苹果用户视Google的操作系统为特洛伊木马,因为这家搜索巨头的所为只是一味卖出更多的广告,而不是令人们的生活更方便或更有益。

来自互联网

14. “Maybe it’s a Trojan horse that smuggles the right policy into place, ” mused Paul Krugman, grimly, at Princeton.
“也许它是带来正确政策的特洛伊木马”普林斯顿的PaulKrugma谨慎而冷静地说。

来自互联网

15. One piece of malware, the Vundo Trojan horse, has been especially active the past three months.
其中的一个,VundoTrojan horse在过去的3个月里异常活跃。

来自互联网

16. When he downloaded the free game it turned out to be a Trojan horse.
当他下载了那个免费游戏后,结果是一个特洛伊木马程序。

来自互联网

17. According to one report the so-called Trojan Horse programme (attached to a seemingly innocuous electronic file) was siphoning off 160 gigabytes of information when it was stopped.
一份报告指出,在被阻止之前,所谓的“特洛伊木马”程序(附着在一份看似平淡无奇的电子文档中)正在窃取160gb的情报。

来自互联网

18. If this is a worm or Trojan horse the length represents the size of the file.
如果这是一个蠕虫或特洛依木马则长度表示为该文件的长度。

来自互联网

19. This thesis is lucubrated on the part of Trojan horse hiding.
本文在研究生数学建模隐藏部分做了研究。

来自互联网

20. At last, the famous Greek hero Odysseus came up with the "Trojan horse" trick, made a huge wooden horse, and put it out of Troy.
最后,希腊著名的英雄奥德修斯想出了一个木马计,用木头做了一匹巨马,放在特洛伊城外。

来自互联网

21. A timely gift - a Trojan horse - will serve the same purpose.
一件适时的礼物,就像是特洛伊木马一样有效。

来自互联网

22. There are many ways to install Trojan horse, the most common way toe-mail.
木马植入的方式多种多样,以邮件方式最为常见。

来自互联网

23. This article discusses the work principles and attack technology and defending policies on Trojan Horse.
本文介绍了木马的攻击原理、常用攻击技术以及防范策略。

来自互联网

24. This thesis is lucubrated on the part of Trojan horse hiding.
本文在木马隐藏部分做了研究。

来自互联网

25. Finally, the current detection technology of Trojan horse based API HOOK it presented.
最后,讨论了基于API HOOK技术的特洛伊木马的检测技术。

来自互联网

26. Finally, the current detection technology of Trojan horse based API HOOK it presented.
最后,讨论了基于API HOOK技术的特洛伊木马的检测技术。

来自互联网