2. They are defeated only because of theTrojan horse in their country.
他们战败的原因只是因为他们国内有暗藏的敌人。
来自互联网
3. Outfitted with a keystroke-capture mechanism, theTrojan horse records the user names and passwords.
自带了键盘输入机制的木马病毒就会记录下用户的网银账号和密码。
来自互联网
4. This paper has discussed the operation principle of the Trojan Horse virus that caused the harm greatly to computer security.
讨论对计算机安全危害极大的“木马”病毒的工作原理。
来自互联网
5. Most schoolchildren know the basics of the Trojan horse, but Virgil outlines all of the intriguing details of myth and legend.
上学的孩子都熟知特洛伊木马的故事,但是维吉尔对这个神话故事的复杂细节做了描述。
来自互联网
6. Thus it can be seen that theTrojan horse is the most harmful to mobile banking and can easily steal the money from the bank card at any time!
由此可见木马病毒对手机银行的危害性最大,可以随时轻易的盗取银行卡里的钱财!
来自互联网
7. This paper introduces the Trojanhorse and its damage to computer system, and advances some methods and defensive measures for killing theTrojanhorse.
介绍了木马病毒及其对计算机系统的危害性,提出了几种查杀木马病毒的方法和防御措施。
来自互联网
8. TheTrojanhorse exploits a flaw in the Adobe software to allow it to install additional malware components and further compromise the vulnerable computer.
该木马利用Adobe软件中的漏洞向用户电脑安装额外的恶意软件组件从而进行进一步感染。
来自互联网
9. They claim that our insistence on something larger, something firmer and more honest in our public life is just a TrojanHorse for higher taxes and the abandonment of traditional values.
10. The most widespread approach is to use what Len Seymour, a researcher at Oxford University, describes as "Trojanhorse" vectors.
用得最广的途径是被一位牛津大学研究员LenSeymour称为“特洛伊木马”的载体。
来自互联网
11. The BreakingPoint system delivered a strike level 5 test that included exploits, network worms, denial-of-service attack, reconnaissance attacks, Trojanhorse and backdoor intrusions.
12. Even after the end of white rule, some of South Africa's neighbours regard it as something of a Trojan horse for the West.
即便是后白人统治时期,南非的一些邻国仍把其看做是西方在非洲安插的内线。
来自互联网
13. Apple users see Google's operating system as a Trojanhorse for the search giant to simply sell more ads, not make people's lives easier or more rewarding.
14. “Maybe it’s a Trojan horse that smuggles the right policy into place, ” mused Paul Krugman, grimly, at Princeton.
“也许它是带来正确政策的特洛伊木马”普林斯顿的PaulKrugma谨慎而冷静地说。
来自互联网
15. One piece of malware, the Vundo Trojanhorse, has been especially active the past three months.
其中的一个,VundoTrojan horse在过去的3个月里异常活跃。
来自互联网
16. When he downloaded the free game it turned out to be a Trojan horse.
当他下载了那个免费游戏后,结果是一个特洛伊木马程序。
来自互联网
17. According to one report the so-called TrojanHorse programme (attached to a seemingly innocuous electronic file) was siphoning off 160 gigabytes of information when it was stopped.