| 1. | There is no evidence of a trojan horse on your system 在您的系统中没有发现木马 |
| 2. | Reboot your machine and delete the trojan horse 重新启动你的电脑,删除木马文件。 |
| 3. | The techniques are the same as used by trojan horses 其采用的技术与木马技术一样。 |
| 4. | Identify the trojan horse file on your hard disk 确定你磁盘中的木马文件。 |
| 5. | Analysis and design of embedded trojan horse virus 嵌入式木马分析及设计 |
| 6. | Internet banking frauds involving trojan horse programmes 涉及特洛伊木马程式的网上银行骗案 |
| 7. | The detection and deletion of the dll trojan horse 木马的发现与清除 |
| 8. | Trojan horse attack mechanism analysis and preventive measures 基于木马攻击机制的防范措施剖析 |
| 9. | Now strong right , 81 trojan horse 现在加强右路81特洛伊木马战术 |
| 10. | Research on trojan horse detection based - on heuristic analysis 基于启发式分析的木马检测技术研究 |