恶意代码
malicious damage───蓄意损害所造成的损失
malicious gossip───恶毒的流言蜚语;恶意的流言蜚语
malicious intent───恶意(犯罪小说名,MaliciousIntent);恶意
malicious rumour───恶意的谣言
malicious mischief───故意损害他人财产
malicious wounding───恶意伤人
malicious───adj.恶意的;恶毒的;蓄意的;怀恨的
maliciously───adv.有敌意地,恶意地
maliciousness───n.恶意
For example, a hacker could use malicious code to take control of PCs using the software.───例如,黑客可以利用恶意代码控制使用该软件的电脑。
The same is true on a dynamically generated page if a link has malicious code in it.───对于链接内含有恶意代码的动态生成页面,情况也是一样的。
They may contain malicious code with damaging potential.───它们可能包含具有破坏性的恶意代码。
Do not use a domain controller to browse the Web or to perform any other activities that may introduce malicious code.───不要使用域控制器浏览网站或执行任何可能引入恶意代码的其他活动。
Thus, there is urgent need for a malicious code analysis and detection means to carry out a detailed analysis of malicious code.───于是,迫切需要一种恶意代码的分析检测手段对恶意代码进行详尽的分析。
There is usually no defense against malicious code if it is granted these permissions.───如果向恶意代码授予这些权限,通常就没有防范它的措施了。
The truth is, hackers will always be able to locate vulnerabilities and issue new malicious code to exploit them.───事实是,黑客们永远都能够找出新的系统漏洞,并且编写新的恶意代码对其进行攻击。
Be careful to ensure that you do not provide any information that could be exploited by malicious code.───请务必确保您没有提供任何会被恶意代码利用的信息。
Application Integrity Control can prevent the possible substitution of the components of your applications for malicious code.───程序完整性保护可以预防您的程序组件被恶意代码替代。
"Malicious code through multiple means (e.g., phishing, virus, logic bomb) continues to be the most widely used attack approach," the report states.
As a type of confronting Internet worm technology, anti - worm has been focused by malicious code researchers.
The paper expounds an unknown malicious code detection based on minimum distance classifier, which has the capacity to distinguish malicious code and reliable programs.
Most especially, don't even try to suppress the status or URL bars of a new window; that's just asking for malicious code to phish your users.
Payload: Downloads potentially malicious code on to the compromised computer.
Note: Enabling this option for non-privileged users may result in their posting malicious code to your blog.
A risk exists that uncertified, poorly written or malicious code could impact the overall stability of the installation.
The snippet may then a call to a method in the reference that executes malicious code.
Microsoft, Google and Time Warner's AOL say they use a series of technical and manual procedures to scan for malicious code in their systems.
- malicious code