of rootkit
Rootkit 可以照常加载操作系统,完全不会表现出任何异常,保持彻底的隐形,并且在操作系统中根本无法察觉。The rootkit could load the normal operating system with no indication anything was wrong, staying completely invisible and undetectable on a system. 该rootkit 不扩散或自行安装,并连接到一个特定版本的Linux。 The rootkit doesn't spread or install itself, and is tied to a specific version of Linux.Rootkit 是一种极端恶意的恶意软件形式,它将自己埋藏在Windows中以隐藏恶意软件删除程序。A rootkit is an extremely malicious form of malware which bury itself within Windows to hide from malware removal programs.什么样的测量?rootkit 将监视”键击,鼠标移动,以及通过系统摄像机的视觉提示。 The rootkit would monitor"keystrokes, mouse movements, and visual cues through the system camera.其它安全威胁,如rootkit ,木马和僵尸网络客户端也需要Unix系统的root用户权限才能工作。 Other security threats, such as rootkits , trojan horses, and botnet clients, also require root access on a Unix system to work.
Rootkit 技术隐藏了复制保护,但也留下了可能隐藏其他软件的漏洞。The rootkit technology hid the copy protection from view, but also left open a hole that could hide other software. Rootkit 是一套能够永久、持续并无法察觉地驻留在计算机上的程序和代码。A rootkit is a set of programs and code that allows a permanent or consistent, undetectable presence on a computer. Rootkit 或病毒可能导致操作系统变得不稳定甚至更改主引导记录(MBR)。A rootkit or a virus can cause the operating system to become unstable or even make changes to the master boot record(MBR). 由于用户模式的rootkit 可以被发现和清除,rootkit设计者们变换了一种思路,并开发出内核模式的rootkit:. Since rootkits running in user-mode can be found and removed, rootkit designers changed their thinking and developed kernel-mode rootkits. .Abbasi和Hasemi解释称,他们的PLCRootkit 并不像其它类似的威胁一样,将目标锁定在PLC逻辑代码上,因此加大了其检测困难度。 Abbasi and Hashemi explained their PLC rootkit doesn't target the PLC logic code like other similar threats making hard its detection. 帕里斯的phprootkit 是许多攻击者一直寻求的持久性工具,允许其在不被检测的情况下隐藏在最底层。 Paris' PHP rootkit is the persistence tool that many attackers have always wanted, allowing them to remain at the lowest server level without getting detected. 避免感染rootkit 这种毒瘤的基本规则总体上也适用于避免任何恶意软件,但是对付它还有一些特别的考虑. The rules to avoid rootkit infection are for the most part the same as avoiding any malware infection however there are some special considerations. Rootkit 的其它特性通常用于远程访问和窃听--例如,用于嗅探网络上的报文。Other features in a rootkit are usually for remote access and eavesdropping- for instance, for sniffing packets from the network. Rootkit 允许Tipton指导哪些数字将在2010年12月29日赢得HotLotto。The rootkit allowed Tipton to direct which numbers would win the Hot Lotto on Dec. 29, 2010.攻击者有时会在rootkit 的帮助下访问敏感信息并窃取信用卡详细信息。 Sometimes the attackers access your sensitive information and steal the credit card details with the help of rootkits . RootKit 对广告软件至关重要,因为它可以确保Zacinlo无限时长地存活在主机上,只要它需要。A RootKit is critical to the adware because it can ensure that Zacinla survives on the host for as long as it needs to. Rootkit 的问题在于它们甚至可以隐藏自己的防病毒软件。The problem with rootkits is that they can hide themselves even from antivirus software. Rootkit 所采用的大部分技术和技巧都用于在计算机上隐藏代码和数据。Most of the technology and tricks employed by a rootkit are designed to hide code and data on a system. Rootkit 是一个功能强大的软件,可以在最基本的级别上接管计算机。A rootkit is a powerful piece of software that takes over control of a computer at the most fundamental level.Rootkit 是一个程序或程序套件,隐藏的恶意软件在系统中存在。A rootkit is a software or a program kit that hides the presence of malware in the system.
Display more examples
Results: 157 ,
Time: 0.0226