Trojan horse

英 [ˌtrəʊdʒən ˈhɔːs] 美 [ˌtroʊdʒən ˈhɔːrs]

n.  特洛伊木马; (来自外部的)颠覆分子(或活动); (特洛伊)木马程序(一种欺骗程序,看起来有用,实际却旨在毁坏数据等)

计算机



牛津词典

noun

  1. 特洛伊木马;(来自外部的)颠覆分子(或活动)
    a person or thing that is used to trick an enemy in order to achieve a secret purpose
    1. (特洛伊)木马程序(一种欺骗程序,看起来有用,实际却旨在毁坏数据等)
      a computer program that seems to be helpful but that is, in fact, designed to destroy data, etc.

      柯林斯词典

      1. N-COUNT (用于掩盖真实目的或意图的)特洛伊木马,幌子
        If you describe a person or thing as a Trojan horse, you mean that they are being used to hide someone's true purpose or intentions.
        1. Was Colombo the emissary of Pope Paul, his Trojan horse within the Commission?...
          科隆博是教皇保罗的特使吗?是他在委员会内部设下的卧底吗?
        2. Both factions accused each other of using the organization as a Trojan horse to advance their causes.
          两派都相互指责对方利用该组织作幌子以发展各自的事业。
      2. N-COUNT 木马病毒
        A Trojan horse is a computer virus which is inserted into a program or system and is designed to take effect after a particular period of time or a certain number of operations.
        1. Operating systems can be brought to a halt by a Trojan Horse.
          操作系统可能会因为木马病毒的攻击而中止。

      双语例句

      1. Was Colombo the emissary of Pope Paul, his Trojan horse within the Commission?
        科隆博是教皇保罗的特使吗?是他在委员会内部设下的卧底吗?
      2. Both factions accused each other of using the organization as a Trojan horse to advance their causes.
        两派都相互指责对方利用该组织作幌子以发展各自的事业。
      3. Operating systems can be brought to a halt by a Trojan Horse.
        操作系统可能会因为木马病毒的攻击而中止。
      4. Nest was a Trojan horse into the home.
        Nest就是入侵家居领域的特洛伊木马。
      5. Restart the computer and then to the registry will "Trojan horse" key to delete the file.
        重新启动计算机,然后再到注册表中将所有“木马”文件的键值删除。
      6. Of course, there may be a time when you were malicious access to your computer intrusion, and placed a Trojan horse.
        当然,还有一种可能是当你上网时被人恶意侵入了你的计算机,并放置了木马程序。
      7. Research on Concealment Technology of Kernel-based Trojan Horse Under Windows
        Windows下内核级木马隐藏技术研究
      8. You mean send a virus or a Trojan horse?
        你是说发送个病毒或是特洛伊木马进去?
      9. Trojan horse attacking strategy on quantum cryptography is investigated.
        研究了特洛伊木马对量子密码算法的攻击。
      10. Research is being described as the academic Trojan horse whose personnel have all but captured the city of the intellect.
        研究工作被描绘成学术领域的特洛伊木马计,其工作人员几乎已经占领了智力城。
      11. This paper introduces the port scan and Trojan horse detection model pieces in it.
        这里主要介绍其中的端口扫描和木马检测两个模块。
      12. What is a Trojan horse?
        特洛依木马病毒是什么?
      13. This article discusses the work principles and attack technology and defending policies on Trojan Horse.
        本文介绍了木马的攻击原理、常用攻击技术以及防范策略。
      14. At last, the famous Greek hero Odysseus came up with the "Trojan horse" trick, made a huge wooden horse, and put it out of Troy.
        最后,希腊著名的英雄奥德修斯想出了一个木马计,用木头做了一匹巨马,放在特洛伊城外。
      15. It is a backdoor Trojan horse and gives remote access to your computer.
        该木马允许攻击者远程控制您的电脑。
      16. If an effective solution to share files infected with the virus, Trojan horse issue, we must be able to effectively suppress the virus, Trojan horse or the enterprise network, all sorts of crimes.
        若能够有效的解决共享文件的病毒木马感染问题,必定可以有效的抑制病毒或者木马在企业网络中为非作歹。
      17. This paper has discussed the operation principle of the Trojan horse virus that caused the harm greatly to computer security.
        讨论对计算机安全危害极大的木马病毒的工作原理。
      18. Nothing will slow your system down like a virus, a Trojan horse, or other types of malware.
        没有任何东西比病毒,特洛伊木马或者其他恶意软件更能减慢你系统速度的了。
      19. Design of Trojan Horse Detecting System-Based on Thread Management and Port Intercepting
        基于线程管理-端口截听的木马检测系统的设计
      20. There is no evidence of a Trojan horse on your system.
        在您的系统中没有发现木马。
      21. The Research of the Injection and Defense of Web page Trojan Horse Based on Email
        基于邮件的网页木马植入与防范方法研究
      22. Design and Implementation of Remote Control System Based on Trojan Horse Technology
        基于木马技术的远程控制系统设计与实现
      23. Research on Trojan Horse Detection Based-on Heuristic Analysis
        基于启发式分析的木马检测技术研究
      24. This paper introduces the Trojan horse and its damage to computer system, and advances some methods and defensive measures for killing the Trojan horse.
        介绍了木马病毒及其对计算机系统的危害性,提出了几种查杀木马病毒的方法和防御措施。
      25. You can create a hash rule for a virus or a Trojan horse to prevent the malicious software from running.
        可以创建针对病毒或特洛伊木马程序的哈希规则,以防止恶意软件运行。
      26. THE Trojan horse of legend held in its belly the men and means to help sack ancient Troy.
        传说中的特洛伊木马腹中隐匿武士,以帮助侵略古老的特洛伊城。
      27. Key Technology of Linux Trojan Horse
        Linux特洛伊木马关键技术研究
      28. A totally new project for Trojan horse auto-start is put foward by loading Trojan horse programs into OS service.
        分析其优缺点,提出利用操作系统服务加载木马程序的全新木马自启动方案。
      29. Detection of Trojan Horse Based on Rootkit Technology
        面向Rootkit技术的木马检测方法研究
      30. Kingsoft Antispy is a free internet security assistant, especially in removing Trojan horse and other malicious softwares.
        金山清理专家是一款完全免费的上网安全辅助软件,针对流行木马、恶意软件插件尤为有效。