释义 |
trojans 英'trəʊdʒəns美'troʊdʒəns COCA³²¹⁸⁷BNC⁵⁷³⁸⁵ 基本例句 n.勇士⁶Trojans.n.特洛伊人⁸⁸名词trojan的复数形式⁶.原型trojan的复数 Between 60% and 80% of teens used condoms during their most recent sexual encounter, according to the study, which was financed by Church& Dwight, the maker of Trojans. 青年人的性接触中,百分之六十至百分之八十使用避孕套,根据研究,该研究由《特洛伊》的制片 Church和 Dwight提供资金。 yeeyan The authors of the Nature paper sifted through data on these rocks, looking for the candidates that might be Trojans. 《自然》杂志论文的作者筛选了这些天体的数据,搜寻可能存在的特洛伊小行星。 ufochn The three common ways through which hackers attack are the Trojans, Through monitoring, Message Bomb. 三种黑客的攻击方式分别是:特洛伊木马术、监听术、信息炸弹。 iciba The Trojans should have listened to Cassandra. 特洛伊的人就本应该听取预言家桑德拉的预言。 ecocn “ These Trojans have a very low detection rate,” Chenette says. “这些木马有一个非常低的检出率, ” Chenette说。 cnblogs Consider monitoring or filtering outbound DNS connections to better protect your network against certain phishing attacks and a new breed of trojans that masquerades as DHCP servers. 考虑监测或过滤出站 DNS连接,以便更好地保护您的网络,对抗某些钓鱼攻击和一种新的伪装成 DHCP服务器的特洛伊木马。 blog.sina.com.cn Customers embrace its iconic device, and then, like the hapless Trojans, find they have fallen into the hands of the gift- givers. 消费者信奉的是它的苹果徽标,然而之后却像不幸的特洛伊一样,发现自己落入了送礼人的圈套之中。 ecocn Every day, increasingly sophisticated variants of Trojans and malware emerge, craftily constructed to evade the security measures put in place by banks, online stores and pay platforms. 每一天,都会出现愈渐精细复杂的特洛伊和恶意软件变种,它们狡猾的设计,能够避开银行、网上商店和支付平台所采取的安全措施。 yeeyan Guard your email against spam which may contain worms or trojans. 避免垃圾邮件,垃圾邮件通常包含有蠕虫病毒或者木马病毒。 hjenglish Hackers have become wholesale providers of malware—viruses, worms and Trojans that infect computers—for others to use. 黑客已经成了大量提供能感染他人电脑的恶意软件病毒,蠕虫病毒,木马病毒的“批发商”。 ecocn He called it, with apologies to Homer, the Trojans War. 他怀着冒犯荷马的歉意,把这个事件称为“特洛伊人的战争”。 yeeyan He said Trojans worked very hard to protect their city. 他说,特洛伊人努力保护自己的城市。 hxen He wrote about the Trojans who lived in the city of Troy. 他写到了居住在特洛伊城的特洛伊人。 tingvoa In so doing, viruses, Trojans, key- loggers and spyware are prevented from infecting the computer. 这样,电脑就不会遭受病毒、木马、击键记录器和间谍软件的感染。 ecocn In the meantime, Morro has become Microsoft Security Essentials and represents Microsoft’s free solution to protect PCs from viruses, spyware, trojans and rootkits. 于此同时, Morro被命名为微软安全套件,作为微软的免费解决方案为个人电脑提供对病毒、间谍软件、木马程序和流氓软件的防御。 infoq Lifehacker's tech- savvy readers are the first people on speed-dial when it's time to heal an infected PC, but how much do you really know about viruses, spyware, scareware, trojans, and worms? 当需要恢复一台被感染电脑时,有科技头脑的 Lifehacker读者往往是快速抢答的第一人,但关于病毒、间谍软件、伪安全软件、木马、蠕虫你究竟了解多少? yeeyan Marshalling a vast array of intricate detail, Mr Abulafia takes the reader from the age of the Phoenicians and Trojans to the advent of modern tourism. 通过梳理大量错综复杂的细枝末节,阿布拉菲亚先生在本书中带领读者从腓尼基人和特洛伊人的时代一直走到现代旅游业的出现。 hxen Nonetheless, its detection means it is highly likely there are other, more suitable Trojans out there waiting to be found. 不过,这一发现意味着很可能存在着其他更合适的特洛伊小行星有待发现。 ufochn Now I knew how the Trojans must have felt as they looked down from their walls and saw the Greeks camped before them, the promise of revenge glinting off their polished shields in the moonlight. 要知道,当时特洛伊人从城墙顶上看希腊军队的阵地,光亮的盾牌在夜色中闪烁着仇恨的光芒,他们的感受,我现在能体会到了。 yeeyan One could have Windows installed, riddled with viruses and trojans. The other could be running a very obsolete, security-hole addled Linux installation. 一个分区可以装上让木马、病毒肆虐的 Windows系统,另一个可以装上过时的打满安全补丁的 Linux系统。 yeeyan Trojan Hunter: Protects system from Trojans. Trojan Hunter:保护系统免受木马。 yeeyan With viruses and trojans, surfers are suspicious of demands to install software. 在病毒和木马程序肆虐的网络上,网民们会对安装软件的要求充满猜疑。 ibm |