malware是什么意思   malware怎么读

英式:[]    美式:[]

malware单词基本解析:

n.恶意软件; 恶意软件。malware是malicious software的合成形式; 流氓软件
n. 恶意软件
n.恶意软件;恶意软件。malware是malicious software的合成形式;流氓软件;

malware变化用词:



malware英英释义:

MalwareBeast, a Windows-based backdoor Trojan horse.]]

以上来源于:Wikipedia

malware中文词源:

malware 恶意软件 mal-,坏的,不良的,-ware,软件,缩写自software.

malware用法和例句:

malware


Study on Application and Practice of Combo Malware

Combo Malware应用研究与实践


Indeed, she says, by the standards of cyberwarfare, agent.btz is pretty basic;it is a variant of a well-known bit of malware called the SillyFDC worm, which has been around for at least three years.

Kimberly Zenz指出,按照网络战争的标准,“agent.btz”其实相当简单,它是大名鼎鼎的蠕虫病毒“SillyFDC”的变种,该病毒至少在网络世界里传播了三年”。


Research on the Categorization of Malware and Its Application in Coordinated Network Attacks

Malware范畴化研究及其在协同式网络攻击中的应用


The scan speed of NOD32 on malware collections with enabled adv. heuristic is horrible, like 100 times slower than AntiVir.

nod32在开启高启发之后在进行大量病毒扫描的时候速度十分的糟糕,甚至于100倍慢于antivir。


The OnGuard feature, designed for continual protection against malware infections and associated activities on your computer.

OnGuard功能,用于持续保护您的计算机抵挡恶意软件侵袭及其他相关活动的干扰。


The VIPRE engine goes above and beyond traditional signature-based anti-virus engines by targeting blended threats and other malware using advanced heuristics and other behavioral-based technologies.

VIPRE引擎 ,针对混合威胁及其他应用高级启发式的恶意软件和其他基于行为技术,在超越传统基于信号反病毒引擎上起作用。


Threat Fire protects you by intelligently blocking behavior consistent with that of malware such as viruses, worms, trojans, spyware, adware, rootkits, keyloggers, and buffer overflows.

“威火”通过智能拦截行为来阻止病毒侵害你的电脑,它与程序病毒如计算机蠕虫,特洛伊有兼容性。


A signature-based intrusion detection system is designed to detect intrusions through the comparison of current network data against known, documented malware patterns.

一个基于特征的入侵检测系统通过对网络上的数据与已经文档化的恶意软件模板进行比较来检测入侵。


Malware , a portmanteau from the words malicious and software, is software designed to infiltrate or damage a computer system without the owner's informed consent.

一个混成词从词恶意和软体来的,软体设计去渗入或损坏电脑系统,没有使用者的同意。


Some pirated copies were also infected with malware or simply did not work.

一些盗版版本也会被恶意软件感染或不能工作。


Following these Web site visits and casual downloads, malware, a more destructive form of spyware, is downloaded onto the user’s computer or server.

下列各项这些网站拜访和偶然的下载, 恶意软体, 一更多破坏力形式间谍软体, 是下载在使用者的计算机或伺候器之上。


A Trojan Downloader may download adware, spyware or other malware from multiple servers or sources on the internet.

下载一个木马Downloader的间谍,间谍程式或其他恶意程序从多种来源或服务器在互联网上。


If, as promised, mobile phones soon begin to serve as payment devices, mobile malware that nabs your identity and taps directly into your credit line could follow.

不久后,若移动电话如预期地成为付款工具,会盗用身份及信用额度的手机恶意软件就可能随后出现。


Do not run your system as a local administrator. By running your system as a limited user, you can avoid possible malware being able to write to your system files.

不要以本地管理员帐号来运行系统。通过用受限用户运行系统,你能避开可写入你的系统文件的可能存在的恶意软件。


As in previous versions of NIS, the latest firewall is armor-plated against attack by malware.

与前一版本的NIS相同,这个最新版本的防火墙对于恶意软件的防护可谓是铜墙铁壁。


The history of PC malware is humbling, but it offers lessons that will help us to anticipate some of the ways in which mobile virus writers will strike next and to take steps to thwart them.

个人电脑恶意软体的历史虽然为时不长,但仍是很好的借镜,可协助我们预测手机病毒骇客接下来的方向,并采取预防措施。


The Technology Analysis Report of Malware Prevalence Survey in China

中国计算机病毒疫情调查技术分析报告


For an in-depth look at how widespread mobile malware really is in the modern world, read our white paper, "Mobile Malware Evolution".

为深入研究如何在广泛的移动恶意代码真的是在现代世界中,阅读我们的白皮书"的手机病毒演变"。


The competition between the browsers, along with a newfound variety, has created both security advantages and new threats as attackers and malware writers adjust to the new landscape.

之间的竞争的浏览器,随着一新发现的品种,创造了既安全优势和新的威胁,攻击和恶意软件作家适应新的景观。


In fact, commercial AV catches a far wider range of malware than most of these specialist services.

事实上,商业反病毒软件所侦测的恶意软件的范围远远超过那些针对特定威胁的产品。


The innocence of humans [gullibility?] That allows criminals to trick them into installing malware on their machines, responding to phishing attacks, etc.

人的纯真[易受骗?]易受罪犯哄骗而在机器上安装恶意软件,响应网络钓鱼攻击,等等。


Anti Trojan Elite provide a real-time malware firewall for user, once a trojan or keylogger would been loaded,

以避免你的银行帐户及网路密码被木马程序拦截,进而暴露自己所有隐私及机密。


But it is not a very limited version, it is a full tool to clean your computer from Malware.

但它不是一个非常有限的版本,它是一个全面的工具,清理您的计算机的恶意软件。


But real malware is still detected on a very high quality level.

但是,真正的恶意软件在很高的程度上仍然会被发现。


Malware that is implemented as a kernel-mode device driver, including rootkits, runs at the same privilege level as the kernel and so is the most difficult to identify and remove.

作为内核模式设备驱动程序执行的恶意软件(包括rootkit)与内核在相同的权限级别运行,因此最难识别和删除。


For example, a trojan horse or a virus is considered malware.

例如,一个木马或病毒被认为是恶意软件。


For example, one of the earliest methods used to get malware installedon computers was to offer free screensavers.

例如,最早使用的一种让恶意软件安装到电脑中的方法是提供免费屏幕保护程序。


This year’s list ranked the 74 most heavily-trafficked top-level domains based on the frequency of potentially dangerous Web sites (containing malware or suspicious links) in each domain.

依据每个域名下存在潜在危险的网站多少(含恶意代码或可疑的链接),今年列出了74个流量最大的顶级域名。


With Online Scanner, non-ESET users can get a “second opinion” on the health status of their computers and determine if their existing malware solution is really performing up to snuff.

依靠在线扫描,非ESET产品的用户能够以另一种视角来审视电脑的健康状况,并确定其已有的恶意软件解决方案是否真的正常运作。


* Fixed an issue where the phishing and malware database did not update on first launch.

修复了在第一个版本的网络钓鱼和恶意软件的数据库没有更新就发布的问题,。


Repair affected files , whenever possible (sometimes files may be irremediably damaged by the malware’s actions).

修复受影响的文件 ,只要有可能(有时文件可能无可挽回地破坏的恶意软件的行为) 。


 Like all security controls, these two approaches to detecting malware are layered defenses, supporting each other, identifying threats the other misses.

像所有安全控制一样,这两种检测恶意软件的方法是层叠防御,互相支持,鉴别对方漏掉的威胁。


Spyware Doctor allows you to remove malware infections from your system that have been detected in a scan, or quarantine them into a contained area.

允许您从系统中移除在扫描中侦测到的传染性恶意软件,或者将它们集中在某路径进行隔离。


Brand new AV Signature Format - The signature format will improve for speed &efficiency, Due to so many malware getting sent to Comodo and so many signatures getting released.

全新的AV签名格式-签名格式将提高速度和效率,因为这么多的恶意软件越来越送往魔岛和如此众多的签名获得释放。


Other antivirus products that rely on signature databases and file scanning do not even work in theory to protect against new, mutated, or targeted malware.

其他反病毒产品的依赖于签名数据库和档案扫描甚至不工作的理论,以防止新的,变异,或有针对性的恶意软件。


Memory Consumption will be reduced, Removing malware will be better, and less False Positives.

内存的消耗将减少,消除恶意软件会更好,并减少误报。


Kernel malware circumvents this abstraction of privileges by running in kernel mode with direct access to all system services.

内核恶意软件以内核模式运行,直接访问系统服务来绕过这种特权抽取。


, e-mail, Web browsing, or Internet access) to contain a malware incident.

决策者基于恶意软件活动作出决策。


Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim’s data and demands payment for the decryption key.

勒索软件是一类用于拐骗数据的恶意程序,它是一种攻击者对受害者的数据进行加密然后再要求(受害者)支付解密密钥费的攻击。


The sheer volume of malware and the fact that criminal activity on the Internet knows no national borders make it almost impossible to effectively deal with malware threats.

单是大堆的恶意软件和罪犯活动于无国界的互联网上的实际情况,使有效处理恶意软件威胁变得几乎不可能。


Kaspersky said that the files the malware encoded cannot be decrypted because it uses a very strong, 1024-bit key.

卡巴斯基表示,被该种恶意软体锁码的档案无法解密,因为它使用一种非常强大的1024位元密钥。


Decide who has the authority to make this decision based on the malware activity.

及早控制可停止恶意软件传播和预防对网络内部和外部的更大危险。


MHR (Malware Hash Registry) - Nothing found!

反应堆(恶意哈希注册) -没有发现!


Anti Trojan Elite(ATE) is a malware remover, it can detect and clean malware in disk or memory.

反黑精英是一个享誉欧洲的专业木马移除软体,他可以侦测和消除在硬碟或记忆体的木马。


Discover a virus or malware in existence on this Web site files, please notify us immediately.

发现有病毒或恶意软件在本网站文件上存在,请立即通知我们。


metamorphic malware

变形恶意代码


If malware never achieves any success at all, nobody will ever bother writing any.

只要恶意软件没有取得丝毫成功,就没有人会去写了。


According to Mike Mullins, an effective malware response plan includes these six steps.

在MikeMullins看来,一个有效的恶意软件响应计划包括这六个步骤。


Search the Internet for information about the process, and if it is indeed malware, try to find a permanent removal tool.

在互联网上扫描与进程有关的信息,如果它确实是恶意软件,试图找到一个永久性删除工具。


While people work hard on their computers - so too do the Internet viruses or malicious software known as malware.

在人们努力研发电脑科技的同时,互联网病毒、又称恶意软件,也在不断发展。


In the home, malware cannot affect the system or install a service or driver without the user going through the UAC Consent or Credential prompt.

在家庭使用中,如果用户没有对“UAC许可”或“凭据”提示进行确认,恶意软件便无法影响系统,也无法安装服务或驱动程序。


In some cases, they're creating their own sites, but in most cases they're hacking into legitimate sites and embedding malware into them.

在某些情况下,他们创建自己的网站,但是在大多数情况下,他们合法网站的黑客攻击,并植入恶意纳入其中。


The online database contains only bad descriptions of the selected process or port. You should definitely check these items and investigate if they are really Malware.

在线数据库只包含所选择进程或端口的不好的描述。你应该选择这些条目并且验证他们是否真的是恶意软件。


A Methodology to Detect Malware Based on Registry Hive Files

基于注册表Hive文件的恶意程序隐藏检测方法


It seems like everyone has their favorite malware scanner, probably because it's worked for them in the past.

好像每个人都有自己最喜爱的恶意软件扫描程序,可能是因为日久生情罢。


If the target malware is new to the scanner, the accuracy of the analyzer output is not dependent on a simple binary decision.

如果一个目标对于扫描器是新的威胁,正确的分析并不是依靠一个简单的二元判定。


If any of these system services are intercepted and modified it means that there is a possibility that the safety of your system is at risk and that spyware, viruses or malware are active.

如果上述任何系统服务都被拦截,并把它改装手段,是有可能性,即安全你的系统处于危险之中,并说,间谍软体,病毒和恶意代码都是活跃。


To help protect your computer against malware, make sure you are using up-to-date antivirus and antispyware software.

如果你的电脑经常出现“蓝屏”,你首先就应考虑是注册表出现了问题,应及时对其检测、修复,避免更大的损失。


If the AV in CIS detects a malware for example for blacklisting, D+ will not bother alerting for it.

如果在独联体的AV侦测到的恶意软件的黑名单例如, d +可将不会打扰报警的。


If you believe that you identified new malware that is exploiting this vulnerability, or other malware, please let us know by submitting that file to our portal.

如果您认为您确定了新的恶意软件,是利用此漏洞,或其他恶意软件,请让我们知道了该文件提交到我们的门户。


The names and locations of malware to be downloaded are either coded into the Trojan or downloaded from a specified website or other Internet location.

姓名和地点的恶意软件被下载都是编码入木马或下载从指定的网站或其他互联网的位置。


'There was a lack of scrupulous checking somewhere along that line, and an attacker seized upon this and used it as a route to inject some very nasty malware onto our site.

威尔斯说,这个过程中缺乏谨慎检测,黑客抓住了这一点,并以此为路径将一些非常讨厌的恶意软件嵌入到了我们网站。


It can also define clusters of malware that operate in similar ways, and generate a kind of family tree showing how superficially different programs have similar modi operandi.

它也能确定采用近似方法操作的恶意软件的命令串,并产生一种树图现实看上去不同的程序如何具有相近的操作对象。


It prevents malware from hijacking a legitimate program and checks whether such DDE-level interactivity is allowed to be performed on network-enabled applications.

它可以阻止恶意软件劫持的合法程序,检查是否DDE的级别互动可以进行网络的应用程序。


It found quite a few of the inactive malware installers on the system and said it quarantined them.

它在系统中发现了一些未激活的恶意软件安装包并表示已经将它们隔离。


Security experts have also warned that virus writers could use desktop search tools to make their malware more efficient.Dan Ilett and Graeme Wearden of ZDNet UK reported from London.

安全专家也同时警告说,病毒制作者可以利用桌面搜索工具,令他们的恶意软件更具有危害性。


They would present mobile malware creators with an irresistibly large and unwary target.

对恶意软体的程式设计者来说,这群没有戒心的庞大用户,将是极为诱人的目标。


Takeaway: Sometimes all the preventive care in the world won't protect your systems from the inevitable malware infection.

导读:有时尽力预防并不能保护系统免受不可避免的恶意软件的影响。


Malware detection when browsing the web.Increase of rootkit detection.

尤其是第二项,难道以前从来不在浏览的时候扫描网络病毒?


Users who have already been tricked into downloading malware by such messages can instantly tell if a message has been sent by a cyber criminal.

已经被类似信息欺骗,下载了恶意软件的用户可以马上分辨出这个信息是否来自网络犯罪分子。


Bottom Line: PC Tools Antivirus lets far too much malware through to realistically protect any PC.

底线:让电脑防毒工具,切实保护通过任何一台PC太多的恶意软件。


Bottom Line: Comodo Internet Security is not a good choice, due to its lackluster malware detection.

底线:魔岛互联网安全不是一个好的选择,因为它平淡无奇恶意软件检测。


While information systems are serving as the key infrastructure all over the world, malicious software (or malware) becomes a new type“social vermin”.

当信息系统发展成为世界各国的关键基础设施后,恶意程序也随之成为了社会的一种新型的“公害”。


When used in conjunction with an Intrusion Detection System, valuable information about the behavior of the malware, packet captures and the malware binary itself may be obtained.

当它与入侵检测系统联用时,关于恶意软件的行为、数据包捕获和恶意二进制文件本身这些有价值的信息就可以被获得。


When a user visits an infected site, an invisible connection is established to a remote server, which can then attempt to install malware on the user's computer.

当用户访问被感染的网站,一个看不见的建立连接到一台远程服务器,然后试图安装恶意软件在用户的计算机上。


As for-profit virus writing increases, the likelihood of severe mobile malware attacks escalates as well.

当越来越多病毒是为了诈财而出现时,严重的手机恶意软体攻击事件就越可能发生。


malware collection

恶意代码捕获


Malware ("malicious software") consists of software with clearly malicious, hostile, or harmful functionality or behavior and that is used to compromise and endanger individual PCs as well as entire networks.

恶意程序("恶意软件")包含明确、恶意软件、敌对、功能性或有害行为,或者采用折衷,危及个人电脑以及整个网络。


The Fontal.A malware does not spread in mobile networks.

恶意软件不会在手机网络里传播。


malware propagation

恶意软件传播

用作名词(n.)

Malware is short for malicious software.
恶意软件是短期的恶意软件。

For example, a trojan horse or a virus is considered malware.
例如,一个木马或病毒被认为是恶意软件。