backdoor adj.后門的,二門的;私下的,秘密的( backdoo...
adj. 后門的,二門的;私下的,秘密的( backdoor methods 秘密[非法]途徑,陰謀)。 “backdoor authority“ 中文翻譯: 后門授權“backdoor cut“ 中文翻譯: 變向切入籃下; 從兩邊底線往籃下的戰術; 后門戰術,一般指大個球員高位持球時小個空手從底線切入的戰術“backdoor data“ 中文翻譯: 后門數據“backdoor dealing“ 中文翻譯: 走后門“backdoor file“ 中文翻譯: 秘密文件, 非法途徑文件“backdoor financing“ 中文翻譯: 后門籌款; 后門取得預資金; 私下籌資, 后門提供資金“backdoor listing“ 中文翻譯: 后門交易; 借殼上市“backdoor operation“ 中文翻譯: 后門業務,后門交易“backdoor output“ 中文翻譯: 秘密輸出, 非法途徑輸出“backdoor paly“ 中文翻譯: 籃球基本戰術之一。當一個隊員在罰球弧周圍接到球時,另一個動員立刻從弱側切入籃下,接隊友的傳球投籃得分。“backdoor play“ 中文翻譯: 籃球基本戰術之一。當一個隊員在罰球弧 ..; 籃球基本戰術之一,當球員在任一位置持球,另一個隊友以步法擺脫對手防守,空手切入籃下,接隊友的傳球得分。典型的如一個隊員在罰球弧周圍接到球時,另一個動員立刻從弱側溜底線切入籃下,接隊友的傳球上籃得分。; 籃球基本戰術之一,當球員在任一位置持球,另一個隊友以步法擺脫對手防守,然后空手切入籃下,接隊友的傳球而攻擊。; 籃球基本戰術之一當一個隊員在罰球弧“backdoor selling“ 中文翻譯: 后門銷售“backdoor spending“ 中文翻譯: 政府的不合法開支“fake backdoor“ 中文翻譯: 做背切假動作“backdoor deals are unhealthy practice“ 中文翻譯: 走后門是一種不正之風“cgi-backdoor exe“ 中文翻譯: 要放到“font=verdana]backdoor cut“ 中文翻譯: 從兩邊底線往籃下的戰術“knocking at your backdoor“ 中文翻譯: 敲你的后門“make a backdoor deal“ 中文翻譯: 開后門“underhanded backdoor dealing“ 中文翻譯: 走后門“backdischarge“ 中文翻譯: 反向放電“backdigger“ 中文翻譯: 倒鏟; 反鏟挖掘機; 反向鏟“backdiffusion“ 中文翻譯: 反擴散 反彌散 反向擴散 反行擴散 反行彌漫 背面擴散“backdeep basin“ 中文翻譯: 后淵盆地“backdeep“ 中文翻譯: 次生優地槽; 島弧后海淵; 后淵
The frontpage backdoor became somewhat famous due to a hidden encryption key that read , “ netscape engineers are weenies ! Frontpage后門變得有點出名,由于隱藏的加密密鑰是“ netscape工程師是蠢貨! ” |
|
backdown |
|
Shell choosing it is the first and the most important step to chose an appropriate shell for a backdoor listing . to some extent , this first step decides whether a backdoor listing is going to succeed 買殼上市是一個復雜的系統工程,其所涉及到的理論及實務操作方面的內容十分繁雜,本文就其中的若干重要問題展開探討。 |
|
A review of nhs recruitment methods will look at whether the health service is too easy a backdoor into britain , as some have claimed following the arrest of the “ docs of war ” 正如一些人在逮捕這些引發戰爭醫生之后所主張的,應該檢查國家衛生服務系統的招聘過程是否為恐怖主義分子進入英國提供了方便之門。 |
|
His book , backdoor to eugenics , aimed to stimulate public debate by showing how genetic - screening policies tended to reinforce the power structures already within society 為了引發大眾辯論這個議題,他寫了一本《走優生學后門》的書,在書中指出,基因篩選的政策,將傾向于強化社會既有的權力結構。 |
|
Approaches typical approaches to accomplish backdoor listings in china include agreement takeover , secondary market acquisition , authorization - letter acquisition , award by the court , indirect acquisition , etc . 35元,而這些上市公司的平均每股凈資產為l 88元,平均溢價率為25 。 |
|
5 . payment cash , assets exchange , assumption of debt , creditor payment and hybrid payment are the five feasible means of payment in backdoor listings 五、價款支付方式國內買殼上市的價款支付方式主要有現金支付、資產置換支付、債權支付、混合支付、承擔債務的零成本收購等5種方式。 |
|
W32 . badtrans . 13312 @ mm is a mapi worm that replies to all unread mails in the microsoft outlook email message folders , and drops a backdoor trojan W32 . badtrans . 13312 @ mm是一種mapi蠕蟲,它會回覆所有在microsoftoutlook訊息資料夾內的未閱讀郵件和附加上后門特洛伊木馬程式( trojan ) 。 |
|
Because of this , the fewer capabilities / network services and communications connection ports that you install or open , the less likely it will be that a hacker will find a backdoor into your system 因此,若你所安裝或開放的功能、網路服務與通訊連接埠越少,駭客就越不得其門而入。 |
|
Backdoor trojans , which can enable an attacker to control an infected computer and steal confidential information , are a significant and tangible threat to windows users 后門特洛伊木馬程式可讓攻擊者控制受感染的電腦并竊取機密資訊,因此會對windows使用者造成嚴重實質上的威脅。 |
|
It is also recommended to check infected systems and networks for possible hacker intrusion that could have been performed through the backdoor component of the worm 如果受感染的是一個網絡環境,那么要清除病毒,就要先把網絡暫時關掉,然后逐一為受感染的系統消毒。 |
|
User ' s personal data can be spiedwith the backdoor ' s help , but are mainly used to install furthercomputer viruses or worms on the relevant system 在后門程序的幫助下,用戶的個人信息可以被竊取,但后門程序主要被用來安裝后續的病毒或者蠕蟲在相關的系統上。 |
|
On non - russian nt - based systems , the worm drops a backdoor trojan file msstask . exe which is controlled by a cgi script from a website with address 209 . 151 . 250 . 170 在非俄語的nt操作系統上,蠕蟲會遺下一個木馬程式檔案msstask . exe ,這個程式是由209 |
|
Backdoor is a software program that gives an attacker unauthorized access to a machine and the means for remotely controlling the machine without the user ' s knowledge 后門是一種軟件程序,讓攻擊者非法進入機器和手段遙無控制機用戶的知識 |
|
7 . development trends resulting from the development of domestic macro - economy and related regulations & laws , some new trends of backdoor listings emerge in china 七、買殼上市的新動向受我國加入wto 、國有股減持等重大事件的影響, |
|
A backdoor compromises system integrity by making changes to the system that allow it to by used by the attacker for malicious purposes unknown to the user 一個完整的系統后門妥協改變,允許它的系統使用了攻擊對于惡意用途不明的用戶 |
|
Backdoor compromises system integrity by making changes to the system that allow it to by used by the attacker for malicious purposes unknown to the user 一個完整的系統后門妥協改變,允許它的系統使用了攻擊對于惡意用途不明的用戶 |
|
Bots , a sub - category of backdoor trojans which communicate through the internet relay chat network , represent a majority of the removals 其中透過多人線上交談系統irc網路通訊的后門特洛伊木馬程式子類別bot占所移除的大多數。 |
|
The content of the file is a url , it acts as a backdoor to download some program and run it on the infected machine 這個文字檔的內容是一個url ,它像一個后門程式般下載程式并于受感染的電腦上上執行。 |
|
This worm is also a backdoor . it opens tcp port 1080 and random udp ports to allow remote communication via these ports 該病毒還具有后門功能,會打開tcp的1080端口和udp的任意端口,以實現遠程通訊。 |