| 1. | This would allow the malicious assembly to also skip verification 这使恶意程序集也可以跳过验证。 |
| 2. | This field indicates the tcp / ip ports that the threat might attempt to use 这指出恶意程序有可能使用的tcp / ip端口。 |
| 3. | This measures the skill level needed to remove the threat from a given computer 这说明了需要从一台电脑中移走恶意程序的技术级别。 |
| 4. | This is a measure of how well current antivirus technology can keep this threat from spreading 这测量了当前的反病毒技术能多好的阻止这恶意程序的传播。 |
| 5. | When you compile the code , consider whether there is some way a malicious program could modify it 当您编译代码时,请考虑恶意程序是否能以某种形式修改它。 |
| 6. | Usually associated with young teens who collect and use simple malicious programs obtained from the internet 通常,电脑黑客是那些收集和使用因特网上简单恶意程序的十几岁的年轻人。 |
| 7. | The e - mail filter is one of the key technologies used to weaken or eliminate these troubles 邮件过滤是削弱或消除垃圾邮件、病毒、恶意程序或敏感内容等对系统安全造成威胁的关键技术之? 。 |
| 8. | Objects in such a way that a malicious program could create thousands of meaningless subkeys or key value pairs 对象时不要采用一种可能会导致恶意程序创建成千上万的无意义的子项或键/值对的方式。 |
| 9. | A computer program that can harm a computer by displaying messages , deleting files , or even destroying the computer ' s operating system 通过显示信息、删除文件或破坏计算机操作系统来损害计算机的恶意程序。 |
| 10. | The measures are high ( the threat is well - contained ) , medium ( the threat is partially contained ) , and low ( the threat is not currently containable ) 该测量有高(该恶意程序被很好的包含) ,中(该恶意程序部分被包含) ,和低(该恶意程序没有被包含) 。 |