您要查找的是不是:
- The lecture entitled "malicious code detection technology," a lot of students after the meeting to give us feedback, and very supportive of such activities carried out again. 本次的演讲题目为“恶意代码检测技术”,很多同学都在会后给了我们反馈,并且非常支持这类活动的再次开展。
- A Malicious Code Detection System Based on Localization 一种基于本地化特征的恶意代码检测系统设计
- Design and implementation of malicious code detection system based on AEC 基于AEC的恶意代码检测系统的设计与实现
- Malicious Code Detection 恶意代码检测
- Malicious code may steal this password. 恶意代码可以窃取口令。
- Running Malicious Code By Exploiting Buffer Overflows. 摘要:介绍如何利用缓冲区溢出脆弱性来执行恶意代码的技术。
- Malicious code inside triggers can run under escalated privileges. 触发器内部的恶意代码可以在升级后的权限下运行。
- However, remember that malicious code can call your code. 然而,请记住,恶意代码可以调用您的代码。
- It checks out, and the malicious code appears safe for use. 它进行检测,而恶意程式看起来安全可供使用。
- We repeat it again: THERE IS NO MALICIOUS CODE inside M33. 我们在这里重申,M33的自制系统是没有恶意代码的。
- They also catch malicious code masquerading as user data. 它们也捕捉伪装成用户数据 的恶意代码。
- Likeother types of malicious code, rootkits thrive on stealthiness. 像其他类型的恶意代码,骗局靠stealthiness。
- Payload : Downloads potentially malicious code on to the compromised computer. 有效载荷:下载潜在的恶意代码对电脑受损.
- Malicious code might be able exploit this to avoid permission checks. 恶意代码可能会利用这一点避开权限检查。
- In this case also all malicious code executed will have its full bad effect. 这种情况下,执行了恶意代码会导致很严重的后果。
- The CCD camera system provides a variety of image processing and code detection options (e. G., EAN, UPC). CCD摄像机系统为图像处理和编码识别(如EAN、UPC)提供了许多不同的方法。
- And this has not even touched the capabilities needed to encrypt, decrypt, and morph the malicious code. 这还没提到加密解密和改变恶意代码形态所需要的能力。
- LU Guangquan,XU Hongguo,LI Yibing. Line Segement Detection Based on Chain Code Detection, COMPUTER ENGINEERING. 2006 July,Vol.32,No14:pp1-3,10. 112鲁光泉;许洪国;李一兵.;基于链码检测德直线段检测方法
- It is possible for malicious code to cast back to the base type and call the base class method. 恶意代码有可能会重新强制转换为基类型,并调用基类方法。
- Be careful to ensure that you do not provide any information that could be exploited by malicious code. 请务必确保您没有提供任何会被恶意代码利用的信息。