词汇 | rootkit |
释义 | BETA Examples of rootkitrootkit isn’t in the Cambridge Dictionary yet. You can help! This mitigates a common tactic used by rootkits to hide themselves from user-mode applications. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Yet other programs of a rootkit may be used to survey the network or to overhear more passwords that are travelling over it. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. There are inherent limitations to the reliability of any program that attempts to detect compromises (such as rootkits and computer viruses). From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Newer rootkits may specifically attempt to detect and compromise copies of the chkrootkit programs or take other measures to evade detection by them. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. It's common that a rootkit creates a hidden, encrypted filesystem in which it can hide other malware or original copies of files it has infected. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Rootkits can, in theory, subvert "any" operating system activities. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. The rootkit hides in firmware, because firmware is not usually inspected for code integrity. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Rootkits can change how the operating system functions and in some cases can tamper with the anti-virus program and render it ineffective. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Rootkits may also give the means to change the very operating system of the computer it is installed on. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Traces of the malware are hidden by rootkits, which prevent the person from being aware that data is being stolen. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. It detected 100% of rootkits, 93% of keyloggers and 89% of scareware. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. A rootkit allows an attacker to subvert a compromised system. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. The term rootkit has negative connotations through its association with malware. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Rootkit detection is difficult because a rootkit may be able to subvert the software that is intended to find it. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. As with computer viruses, the detection and elimination of rootkits is an ongoing struggle between both sides of this conflict. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Some of these functions require the deepest level of rootkit, a second non-removable spy computer built around the main computer. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. However, this is not the case with a kernel type rootkit. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. All services to the public are free, including malware and rootkit cleanup of infected computers and removal instructions on rogue anti-spyware programs. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. It employs a user-mode rootkit technique to hide and steal its victims information. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. |
反思网英语在线翻译词典收录了377474条英语词汇在线翻译词条,基本涵盖了全部常用英语词汇的中英文双语翻译及用法,是英语学习的有利工具。