请输入您要查询的单词:

 

单词 trojan
例句 trojan
He was pretty sure someone must have seen the tag line Frankie had added under the home of the trojans sign. Time Bomb 2018-03-13T00:00:00Z
Haferkamp said Friday the two allegedly used trojan viruses to hack into the artists' computers for several months before being discovered. German hackers allegedly steal pop music 2010-12-03T13:31:00Z
It’s a trojan horse film — it is about what is our legacy? and how do we spend our time and our family life? “A Taste of Sky”: A post-food documentary about one man's vision and new purpose for fine dining 2019-05-04T04:00:00Z
The Kings didn't initially use Diane as a trojan horse character – as in, a white character played by a famous actor leading us into a story featuring Black people and Black perspectives. "The Good Fight" differentiates between who has the luxury of tuning out our political troubles 2022-10-22T04:00:00Z
There was a warning in one meeting of UK government ministers, where Mr Drakeford's request was discussed, that regular meetings with Wales, Scotland and Northern Ireland could be a "potential federalist trojan horse". Boris Johnson did not want meetings with Drakeford and Sturgeon 2023-10-11T04:00:00Z
Yet our own asteroid belt is influenced by planets, including as the slew of asteroids that orbit in Jupiter's shadow, which are known as trojans. The James Webb Telescope eyes a new asteroid belt — in another star's solar system 2023-05-10T04:00:00Z
Such behavior is a type of trojan horse and camouflages their war on democracy. What Marjorie Taylor Greene's "safe space" for conservatives would look like 2023-03-08T05:00:00Z
We try and field like trojans and that's exactly what we did. 'Performance of their lives' - but Scots need more 2022-10-17T04:00:00Z
“Put simply, Prop 30 is a trojan horse that puts corporate welfare above the fiscal welfare of our entire state.” California governor opposes new tax in statewide TV ad 2022-09-12T04:00:00Z
Open-source libraries can sometimes be used as a trojan horse into bigger projects As SolarWinds showed, this type of attack isn’t limited to open-source projects. Google’s open-source bug bounty aims to clamp down on supply chain attacks 2022-08-30T04:00:00Z
"I don't wish for the integration of New Caledonia into the region to be used as a trojan horse for interests which are not in the interests of New Caledonia," he said. New Caledonia says it won't be 'trojan horse' for big powers in the Pacific 2022-07-15T04:00:00Z
Human rights groups accuse the Munich-based company of supplying Turkey, Egypt and Myanmar with trojan software known as FinSpy that could be used to eavesdrop on dissidents. German authorities seize spyware firm FinFischer’s accounts 2022-03-28T04:00:00Z
“Its orbit was quite uncertain at the time so I did a more careful analysis, simulating 100 clones with similar orbits. Every clone demonstrated trojan behavior as well.” Earth Has a New Asteroid Companion, but Not for Long 2022-02-02T05:00:00Z
Microplastics, and the chemicals that ride them into our bodies like a trojan horse, are being investigated as possible causes of immune system dysfunction, reproductive complications, neurodevelopmental delays in children, and other disorders. The ocean is returning our plastic waste. That’s a real problem 2021-12-17T05:00:00Z
Bill Rodriguez, co-founder of Operation Safety Now, called the proposed amendment a “trojan horse” and warned that the campaign’s end goal is to abolish police. New push to disband Minneapolis police after Floyd’s death 2021-08-08T04:00:00Z
Emotet, an increasingly common trojan often used against banks, was also deployed by the attackers and found on computers in Louisiana. Exclusive: National Guard called in to thwart cyberattack in Louisiana weeks before election 2020-10-23T04:00:00Z
Hutchins was arrested because of his teenage work on code that would end up being used in banking trojan software. Go read this profile on the man who ‘saved the internet’ from WannaCry 2020-05-14T04:00:00Z
In popularity, ransomware was followed by the categories of crypters, software that makes malware harder to detect, and trojans, a type of malware that looks legitimate but infects and takes control of a computer. Ransomware is a 'best seller' on underground hacker forums 2019-07-27T04:00:00Z
Another said it was a “trojan horse” to kill off the big wireless players. Amazon seen spreading its tentacles to 5G with T-Mobile interest 2019-05-31T04:00:00Z
One such battalion is that of NASCAR, who unveiled their very own trojan horse on Tuesday, slipping it right into enemy territory without anyone noticing. Your dad is gonna love Kevin Harvick's millennial-themed NASCAR All-Star livery - Golf Digest 2019-05-07T04:00:00Z
They suspect it of acting as a “trojan horse” for the government of the Russian president, Vladimir Putin, by backing the Kremlin’s foreign policy and helping it meddle in domestic Czech politics. Czech communists confront bitter legacy of Prague Spring 2018-08-12T04:00:00Z
It was widely criticised, with a UN expert calling it a “trojan horse” and the Swiss ambassador to the UN saying it “weakens fundamental human rights principles.” The US withdrawal from the UNHRC is a gift to Xi Jinping and China | Frances Eve 2018-06-21T04:00:00Z
The trojans will be coming off a bye, and the Huskies will be glad to be home. Analysis: Ranking the Pac-12 schedules, and why Washington got screwed (again) 2018-05-09T04:00:00Z
At the Damore event, he said that “diversity is a trojan horse for a political agenda”. How to troll the left: understanding the rightwing outrage machine 2018-03-18T04:00:00Z
A: The nasty thing about the Win321kovter trojan virus is that variants of it are able to reinstall themselves when the computer is booted. Annoyed by Cortana assistant? Here’s how to get rid of it 2017-10-13T04:00:00Z
What is known is that it relates to the Kronos banking trojan, a type of malware disguised as legitimate software, which was designed to harvest banking credentials to let its user steal money with ease. Marcus Hutchins: cybersecurity experts rally around arrested WannaCry 'hero' 2017-08-11T04:00:00Z
But although he implies pompously that he is involved with the market for malicious code, he never says explicitly that he sells any, nor are there any logs linking him to the banking trojan, Kronos. Black hat or white hat? Questions swirl around hero researcher's sudden arrest 2017-08-05T04:00:00Z
According to CNN and The Guardian, Hutchins was arrested for his role in “creating and distributing the Kronos banking trojan,” a malware program that harvested online banking credentials and credit card data. WannaCry researcher arrested by FBI for his role in Kronos malware campaign 2017-08-03T04:00:00Z
Many organisations worldwide affected right now by a new variant of the Petya ransom trojan. 'Petya' ransomware attack strikes companies across Europe 2017-06-27T04:00:00Z
Browsers are risky because there are trojans designed to collect banking information. Is it safer to use an app or a browser for banking? 2017-06-22T04:00:00Z
This leaves us with a terrifying new prospect: government spies essentially deploying viruses and trojans against their own citizens. With the latest WikiLeaks revelations about the CIA – is privacy really dead? 2017-03-09T05:00:00Z
Known as a banking trojan, that kind of malware has proven very popular among online criminals, and Kronos was far from the first or the largest. Black hat or white hat? Questions swirl around hero researcher's sudden arrest 2017-08-05T04:00:00Z
The taped-over camera and microphone jack are usually a signal that someone is concerned, perhaps only vaguely, about hackers’ gaining access to his or her devices by using remote-access trojans — a process called “ratting.” Mark Zuckerberg Covers His Laptop Camera. You Should Consider It, Too. 2016-06-22T04:00:00Z
Users are either persuaded to download software that will install malware - this could be banking trojans that will offer direct access to all your financial information or malware that joins your computer to a botnet. Tech support scams target victims via their ISP - BBC News 2016-06-21T04:00:00Z
The FBI sent an advisory to private industry in June 2015 about a number of remote access tools capable of stealing personally identifiable information, including a trojan file named BLT found on Google appspot domains. House blocks Google-hosted apps, Yahoo Mail over security fears 2016-05-11T04:00:00Z
It seems that Amazon's voice-controlled assistant / trojan horse into your home Echo gains a new ability nearly every week, and this week is no exception. Wake up to Missy Elliott yelling at you through the Amazon Echo 2016-01-29T05:00:00Z
The program first emerged in the wake of the larger Zeus banking trojan, which authorities believe was as responsible for as much as $70 million in losses. Black hat or white hat? Questions swirl around hero researcher's sudden arrest 2017-08-05T04:00:00Z
The report also said that trojans account for some 70 percent of all malware. Mark Zuckerberg Covers His Laptop Camera. You Should Consider It, Too. 2016-06-22T04:00:00Z
He thinks Syria will eventually be wonderful but, in the meantime, letting in refugees will be a “trojan horse.” At Iowa forum, Trump says we must 'bring jobs back' and 'build a wall' – as it happened 2015-11-19T05:00:00Z
Do you think of it as a trojan horse of sorts? Meet the man behind CarPlay and Android Auto at GM 2015-10-31T04:00:00Z
Another attack involves a trojan that tries to steal login names and passwords for online bank accounts. UK Match.com site hit by malicious adverts - BBC News 2015-09-03T04:00:00Z
The following month, the co-defendant offered to sell the trojan on a internet forum for $3,000. Black hat or white hat? Questions swirl around hero researcher's sudden arrest 2017-08-05T04:00:00Z
Many sites that offer people links to pirated content harboured the trojans and infected people who thought they would be getting free songs, movies or games when they clicked on the link. Google asked to police stolen webcam videos on YouTube - BBC News 2015-08-07T04:00:00Z
He thinks Syria will eventually be wonderful but, in the meantime, letting in refugees will be a “trojan horse.” At Iowa forum, Trump says we must 'bring jobs back' and 'build a wall' – as it happened 2015-11-19T05:00:00Z
On twitter, a much more elaborate conspiracy theory involves Nintendo using amiibos as a trojan horse to destroy gamestop from the inside and put an end to this used games nonsense once and for all. The Amiibo Craze Broke Gamestop 2015-04-02T04:00:00Z
Xbox was famously designed to be a “trojan horse” for Windows, by way of finding yet another way to insert the operating systems into people’s lives without their explicit consent. When Microsoft Considered Giving The Xbox Away For Free 2015-04-01T04:00:00Z
Today, all of the best security suites offer strong protection against malware, trojans, and viruses while minimally slowing down your machine. This Is the Best PC Security Software You Can Buy 2015-02-23T05:00:00Z
Many operators were making thousands of dollars a month from their victims, he said, adding that the trojans were being used by cybercriminals all over the world. Google asked to police stolen webcam videos on YouTube - BBC News 2015-08-07T04:00:00Z
He must have actually been a trojan horse to get amnesty for illegal immigrants. Excalibur the Ebola dog may rest in peace. The rest of us have to live with this paranoia 2014-10-09T04:00:00Z
Holmes admits that while Right Said Fred used a novelty single as a trojan horse for a more conventional band launch, one of his later signings was less artistically driven. ‘You become an arse overnight’: the pitfalls of having a hit novelty single 2014-09-11T04:00:00Z
But the way it currently operates, it operates too often … like a neoliberal trojan horse. Most corrupt Olympics ever: Why Sochi’s “above and beyond” what we’ve seen before 2014-02-07T13:30:00Z
This would mean that it continued to provide signatures for well-known malicious programs that will help Windows XP spot when viruses, trojans and other cyber-threats try to compromise a PC. Virus warnings for XP to continue 2014-01-16T10:41:58Z
“I couldn’t understand how the trojan got in and why the antivirus didn’t stop it,” David says. Cryptolocker Thieves Likely Making 'Millions' As Bitcoin Breaks $1,000 2013-11-27T18:39:00Z
Scams included using intercept phone calls, or planting a "trojan" programme on a computer to obtain access to personal information, including emails. Soca defends work on private eyes 2013-07-02T19:57:08Z
The scams included using technical methods: Devices to intercept phone calls, or planting a "trojan" programme on the target's computer to obtain their personal information, including their emails. Private eyes: The next scandal? 2013-07-02T08:45:06Z
Online engagement is presented as a 'trojan horse' or corporate 'malware' designed to 'cripple' activist movements. Can online environmental activism deliver change offline? 2013-06-07T04:30:00Z
But the researchers later found what appeared to be Hindi words and names in the code of the trojans they were studying. It's Not Just China: Indian Hacker Group Spied On Targets In Pakistan, U.S. And Europe 2013-05-21T13:14:01Z
U.S. lawmakers see the private Chinese firm as something of a trojan horse. Huawei: The Chinese Company That Scares Washington 2013-04-04T17:05:39Z
That means that you can trojan up their projects, too. GitHub users warned over security risk 2013-01-25T07:32:19Z
In August a flaw in the software, also reported months earlier by Security Explorations, was exploited by hackers installing malware including the Poison Ivy trojan on target PCs. Forget Oracle's Latest Java Patch. Just Kill The Program In Your Browser For Good 2013-01-13T23:26:51Z
When that attachment is opened, the trojan is unleashed, giving the adversary control of the unlucky computer, Raff said. Gaza’s Internet Boy Wonder 2012-11-21T09:45:00Z
Beginning in late August, for instance, hackers exploited a vulnerability in Java to install nasty programs like the Poison Ivy trojan to PCs. Apple Kills Java In Macs' Browsers After A Slew Of Security Vulnerabilities 2012-10-18T15:43:27Z
Cybercriminals used the flaw to install the Poison Ivy trojan on users' computers. Microsoft releases fix for IE bug 2012-09-21T11:49:22Z
The problem, which affects hundreds of millions of IE browser users, is being used by attackers to install the Poison Ivy trojan. Microsoft warns on new IE bug 2012-09-18T11:54:44Z
When they do see one, it’s usually a trojan and difficult to eradicate with antivirus tools anyway. Imbibing Macs in the Enterprise 2012-09-05T15:16:12Z
New hole in Java opens doors to more Mac malware Vulnerability nods to the Flashback trojan, which some say affected hundreds of thousands of Macs earlier this year. President Obama hits Reddit on ‘Ask Me Anything‘ 2012-08-29T20:19:00Z
I was infected with trojans, nasty little worms that implant themselves all over my computer and travel through the internet. How I Got Doubly Stung By the Live Security Platinum Virus 2012-08-08T19:45:48Z
Here's a video of trojan installing a working copy of Rovio's Angry Birds Space as it compromises the phone. Boot up: Facebook's coming crash, iPhone gender balance, drive-by Android malware and more 2012-05-23T07:30:00Z
He said he began hacking two years ago, and that he started with the ZeuS trojan, which was originally designed to steal banking information. I run a small botnet and sell stolen information, ask me anything! 2012-05-19T22:43:16Z
Using popular games as trojans for malware isn’t new, and it’s one of the best avenues identity thieves and other hackers have to finding valuable information about their targets. Scammers Using Popular Game Temple Run to Fill Phones With Malware 2012-02-25T23:05:49Z
Duqu appears to be more narrowly targeted than Stuxnet as researchers estimate the new trojan virus has infected at most dozens of machines so far. India shuts server linked to Duqu computer virus 2011-10-28T21:31:36Z
“This refutes the claim that an effective separation of just wiretapping Internet technology and a full-blown trojan is possible in practice -- or even desired,” the hacker club said. German ’Trojan’ Spyware Violates Constitution, Hacker Group Says 2011-10-10T09:13:34Z
Well, in the past, mobile malware often offered something such as "free" mobile web services as bait, but then, during installation, the trojan would display some kind of decoy error message. Boot up: Facebook's coming crash, iPhone gender balance, drive-by Android malware and more 2012-05-23T07:30:00Z
But what they all agree is that Zeus is the most pernicious "trojan horse" – a destructive program disguised as an application – on the internet. Don't bank on your phone ? it could be hacked by Zeus 'trojan horse' 2011-07-22T22:02:51Z
The SpyEye trojan and its many variants are being produced with a software kit that allows novices to put together their own versions of the malware. Virgin alerts infected customers 2011-06-17T07:27:46Z
The SpyEye trojan and its many variants are being produced with a software kit that allowed novices to put together their own versions of the malware. Virgin tackles infected customers 2011-06-17T07:27:46Z
The malicious code it found included scripting exploits and trojans. Exchange serves up malicious ads 2011-02-28T12:55:04Z
On Monday, we released our Mobile Threat Report for Q1, and in that report we mention there's a growing number of mobile trojans that "deliver on their promises". Boot up: Facebook's coming crash, iPhone gender balance, drive-by Android malware and more 2012-05-23T07:30:00Z
But it contained a trojan, which within seconds installed itself on the phone as a bugging device. Don't bank on your phone ? it could be hacked by Zeus 'trojan horse' 2011-07-22T22:02:51Z
But phone malware remains a rare species, with only a few "trojan" applications surfacing for Google's Android operating system. Minimizing cellphone security risks 2011-02-19T20:47:00Z
Viruses, trojans and spyware are bigger problems than ever. You're the Boss: How a Pas5woRd Can Sink Your Company 2010-10-25T17:57:00Z
"The trojan can place calls to, say, 100 different premium-rate numbers, only one of which is his own number," said Mr Hypponen. 2010-01-15T08:12:00Z
At that point the folks installing the trojan would typically search for answers, either because they were suspicious or because they were troubleshooting. Boot up: Facebook's coming crash, iPhone gender balance, drive-by Android malware and more 2012-05-23T07:30:00Z
The trojan sleeps on the home PC until the user logs into a bank website. Don't bank on your phone ? it could be hacked by Zeus 'trojan horse' 2011-07-22T22:02:51Z
Most of the basic techniques of computer intrusion: password cracking, trapdoors, backdoors, trojan horses—were invented in college environments in the 1960s, in the early days of network computing. The Hacker Crackdown, law and disorder on the electronic frontier
But in reality, the new security device is the Zeus trojan infecting their phone. Don't bank on your phone ? it could be hacked by Zeus 'trojan horse' 2011-07-22T22:02:51Z
There he'd discovered an Chicago youngster named "Shadowhawk," strutting and boasting about rifling AT&T computer files, and bragging of his ambitions to riddle AT&T's Bellcore computers with trojan horse programs. The Hacker Crackdown, law and disorder on the electronic frontier
随便看

 

英语例句辞典收录了117811条英语例句在线翻译词条,基本涵盖了全部常用单词及词组的例句翻译及用法,是英语学习的有利工具。

 

Copyright © 2000-2023 Newdu.com.com All Rights Reserved
更新时间:2025/2/13 18:13:44