您要查找的是不是:
- Documents do not require full trust if they are on the end user computer. 如果文档位于最终用户计算机上,则无需完全信任。
- Personal firewall can control the link between user computer and Internet according to user settings. 个人防火墙可以根据用户的要求隔断或连通用户的计算机与Internet间的连接,用户可以通过设定规则来决定计算机与Internet间的数据传输。
- Classics poison bully turn over virus engineer analysis, the major virus that it introduces user computer is the net swims pilfer date trojan. 经毒霸反病毒工程师分析,它所引入用户电脑的大部分病毒都是网游盗号木马。
- "Exploring the Carryover Effects in End User Computer Training," International Conference on Business and Information, July 2006. "影响资讯安全关键因素之研究-资源基础观点"与王志平;2007知识社群与资讯安全研讨会;2007年5月.
- But if the hacker uses trojan program from information of the purloin in user computer, the bank has superintendency obligation, but won't assume responsibility. 但如果黑客利用木马程序从用户电脑里盗取信息,银行有监管义务,但不会承担责任。”
- Virus can appoint a website to download the baleful program such as all sorts of trojans, virus from the hacker, bring menace to user computer security. 病毒会从黑客指定网站下载各种木马、病毒等恶意程序,给用户计算机安全带来威胁。
- Webpage script trojan will " BMW downloads implement " introduce user computer, these script trojans include hole of safety of much money system use code. 网页脚本木马将“宝马下载器”引入用户电脑,这些脚本木马包含多款系统安全漏洞的利用代码。
- Every day several thousands rob the number wooden horse the crack which opens through this virus, the invasion user computer, brings the destruction inestimably to the user. 每天有数万盗号木马通过该病毒打开的漏洞,侵入用户电脑,给用户带来无法估计的破坏。
- When virus is making shop on the net to user computer in monitoring, can jump the current page of the user turn to the hacker to pay of special setting phonily page. 病毒在监控到用户电脑在进行网上购物时,会把用户的当前页面跳转到黑客特别设置的虚假付款页面。
- No matter software business is intended,still be innocently, its are made come out or be stay innocently " postern passageway " let hole of user computer portal leave. 不管软件商是有意还是无意,其所制造出来的或是无意留下的“后门通道”让用户电脑门户洞开。
- In the meantime, it is searched and destroy at present the relatively popular firewall product on market, make a hacker OK inbreak easily user computer. 同时,它搜索并破坏目前市面上较为流行的防火墙产品,让黑客可以很轻易地入侵用户电脑。
- If say to use security of compulsive installation, antagonism,the means such as software goes back on his word not to go in user computer, it is the one big characteristic of scampish software. 假如说利用强制安装.;对抗安全软件等方式赖在用户电脑中不走;是流氓软件的一大特点。
- Before resembling two weeks " Fan Kecheng is tasted jump turn adversary website " incident, use baleful plug-in unit namely, undertake to user computer the domain name is hijacked. 就像前两周的“凡客诚品跳转对手网站”事件,就是利用恶意插件,对用户计算机进行域名劫持。
- This data is anonymous and is not linked to personal data on the users computer or any HP databases. 这些数据是匿名的,而且不会链接到用户计算机上的个人数据或任何HP数据库。
- Provides step for installing the runtime that enables Visual Studio Tools for Office solutions to run on end user computers. 提供安装运行库的步骤,该运行库使Visual Studio Tools for Office解决方案可以在最终用户的计算机上运行。
- This installation option works on development computers during project creation and on end user computers when an end user runs an Office solution. 在开发计算机上,此安装选项在项目创建过程中工作,在最终用户计算机上,则在最终用户运行Office解决方案时工作。
- Hard copy is computer output on paper, printing or graphics. 硬拷贝是出现在纸上、印刷上或图表上的电脑输出。
- The computer has a normal qwerty keyboard. 这台计算机有标准的英文键盘。
- Industry is a heavy user of electric power. 工业需耗费大量的电力。
- They kept badgering him to get a home computer. 他们一直纠缠着要他买一台电脑。