网站首页  词典首页

请输入您要查询的英语单词:

 

单词 Trojan
例句
1, These investment arrangements could be Trojan horses for anti-competitive monopolies.
2, And, likewise, a Trojan horse.
3, Doug prefers expensive Trojan silver fish, segmented to twist and swivel realistically.
4, But Diomedes raged on, working havoc in the Trojan ranks until he came face to face with Hector.
5, Meantime the Trojan camp, fortified only by earthworks and deprived of its leader and its best warriors, was hard-pressed.
6, The great Trojan champion had never before shown himself so brilliant and so brave.
7, The commitment to devolution was the Trojan horse within Labour's gates.
8, I wonder whether he is a Trojan Horse.
9, Virus/Trojan/worm/logic bomb: 11,001, 10.2 percent.
10, Identify the trojan horse file on your hard disk.
11, Trojan horse attacking strategy on quantum cryptography is investigated.
12, Compere: Does the trojan run rampant what degree?
13, Reboot your machine and delete the trojan horse.
14, The ingeniously engineered Trojan horse was also his idea.
15, And this brought on the long Trojan War.
16, A Trojan horse is simply a computer program.
17, Aphrodite was the goddess who triggered the Trojan War.
18, Older supporters have accused the new leadership of being a Trojan horse that will try to destroy the party from the inside.
19, A bug in the browser lets servers download a Trojan horse.
20, The vase painting shows Ajax and Achilles getting ready for their equivalent of k2 paddling during a lull in the Trojan War.
21, Paris awarded it to Aphrodite,(http:///trojan.html) beginning a chain of events that led to the Trojan War9.
22, Even the love of Troilus and Cressida is debased by the Trojan atmosphere, and misplaced values.
23, The thing is supposed to be a defense against Trojan horses, worms, viruses and weak passwords.
24, That was the Judgment of Paris, famed everywhere as the real reason why the Trojan War was fought.
25, His brother Menelaus was the husband of Helen, for whose sake the Trojan War was fought.
26, If Kinnock chooses to fight to retain his leadership, he will have to confront the Trojan horse.
27, Security experts think the hackers might have found a way in by emailing a Trojan to the company's network.
28, Target company A company which is about to be, or is being, acquired. Trojan horse Same as White squire.
29, And Troilus immediately confesses that this was his real motive behind his defence of the present Trojan stance.
30, Thinking to save money, I laid the claim that we already possessed a Trojan Horse fragment of our own.
1, These investment arrangements could be Trojan horses for anti-competitive monopolies.
31, Trojan horse kill switch may already have been used.
32, This week, two new Trojan horse attack quietly.
33, The DPP portrays the pact as a Trojan horse.
34, It found and captured TROJAN, the pilferer .
35, When the Trojan War broke out, Thetis was anxious.
36, Another kind of virus is called Trojan horse.
37, Internet security issues include DDOS attacks, domain name hijacking, Trojan program, control of zombie host, webpage defacement and network spoofing.
38, Last week, I was a film name the Trojan war.
39, After computer user visits these pages, may affect vermian download implement with many trojan virus.
40, Some Trojan or Lycian archer has wounded him with an arrow to our dismay, and to his own great glory.
41, Hackers often use Trojan - horse programs to break into computer systems.
42, According to legend, the Trojan War had its genesis in a dispute between three Greek goddesses.
43, The other point of such a triangle is known as a Trojan point, or a Lagrangian point after the mathematician who discovered them.
44, The traditional software that reduce toxin is nonfeasance almost to the trojan, because this needs new method bowstring vaulting horse.
45, All these are fully shown from the heroes in the Trojan War.
46, BC - Trojan War: Troy was sacked and burned, according to the calculations of Eratosthenes.
47, Trojan horse may be widely redistributed as part of a computer virus . The term comes Iliad.
48, You will take control of one of 18 families of heroes on either the Achaean or the Trojan side and build up your dynasty through the course of the Trojan War and its aftermath.
49, The traditional way of Trojan horse auto-start is summarized,() whose advantages and disadvantages are analyzed.
50, An island of Turkey in the northeast Aegean Sea south of the Dardanelles. According to tradition, it was the site of a Greek naval station during the Trojan War.
51, This epic tale leads to the story of Helen of Troy, the Trojan Horse and Achilles.
52, That website just is an edge tool that make money, a tool that is fully loaded with a trojan to kill a person stopped!
53, Castor and Pollox who were transformed by Zeus into the constellation Gemini in the Trojan War.
54, This paper analyzed the manual and automatic location principle of character code of Trojan, and introduced two ways to locate character code of Trojan with restrictor.
55, Can say, defend quadruply set out completely from the point of view that protects player interest, arrive from Zhang name code resist trojan virus, to the player overall safety assures.
56, Should see CCTV " 3 · 15 " fabricant of trojan of evening party exposure uses trojan virus purloin after the case of information of the bank on many user net, she closed her network bank immediately.
57, That's like a Trojan picking a Bruin. Or (almost) a Dodger picking a Giant.
58, The follow-on contract calls for the contractor to provide bandwidth and systems engineering, operations and maintenance support for the Army's Trojan satellite communications.
59, Sir , we are Greeks returning from the Trojan War, answered Odysseus.
60, An ancient port of east-central Greece in Boeotia. According to tradition, it was the embarkation point for the Greek fleet during the Trojan War.
61, For nine years the Trojan war raged with varying fortunes for both sides.
62, Thus, from the wedding of Peleus and Thetis and the golden Apple of Discord thrown by Eris, we have the beginnings of the Trojan War.
63, This method can detect more Trojan horse's intrusions than general security detection software.
64, Based on that, I designed and actualized corresponding trojan horse.
65, This, of course, is the story of Agamemnon, murdered by Clytemnestra on his return from the Trojan War.
66, Helen of Troy, the daughter of King Tyndareus of Sparta, would become the cause of the epic Trojan War that lasted more than ten years.
67, Here, we should figure out the system restores virus of whether OK eradicative trojan.
68, Odyssey relates the misfortunes of Odysseus after the Trojan War.
69, Express Restore, Yesterday Once More, if the virus Trojan horse or system collapse, rapid return to health.
70, Is it a virus, a worm, a Trojan, or a backdoor?
71, The son of Thyestes and lover of Clytemnestra. He helped Clytemnestra kill her husband Agamemnon upon Agamemnon's return from the Trojan War.
72, For example, a trojan horse or a virus is considered malware.
73, The wife of Agamemnon who, with the assistance of her lover Aegisthus, murdered him on his return from the Trojan War and was later murdered by her son Orestes.
74, They both concern the great defining moment of Greek culture, the Trojan War.
75, The term Backdoor describes a specific group of Trojan Horses.
76, "Disk drive " be in the earliest pilfer date person when circle advertises, offer free edition for trojan fabricant , if buy the home to feel pretty good, draw out money to buy VIP edition.
77, The hacker uses the server flaw of website of the horse that be hanged to inbreak , after the user visits these pages, can contract many trojan virus.
78, The sculpture shows the Trojan priest Laocoon and his sons being crashed crushed to death by sea snakes.
79, Scampish software and postern trojan, privately installs a lot of scampish software for the user.
80, Give you easy access while away from the Trojan horse virus software and vicious war.
81, The Odyssey describes the return of the Greek hero Odysseus from the Trojan War.
82, Methods Analyze the hiding mechanism of new Trojan proceeding from the principle of SPI technique and excogitate a method to check and clean this type of Trojan accordingly.
83, Earlier this year federal officials discovered more than half-a-million fake Trojan condoms that were being sold via a counterfeit smuggling ring.
84, The Trojan hero of Virgil's epic poem, the Aeneid, and son of Anchises and Aphrodite. He escaped the sack of Troy and wandered for seven years before settling in Italy.
85, Perhaps the most famous legend about Aphrodite concerns the cause of the Trojan War.
86, They were defeated because of the Trojan horses in their country.
87, Both factions accused each other of using the organization as a Trojan horse to advance their causes.
88, But if the hacker uses trojan program from information of the purloin in user computer, the bank has superintendency obligation, but won't assume responsibility.
89, Trojan prince, the eldest son of Priam and Hecuba, killed by Achilles in Homer's Iliad.
90, The Trojan sends spoofed ARP packets to gateways and other computers on the same subnet.
91, The wife of Sparta king Menelaus who was abducted by Paris and provoked the Trojan War.
92, Now, trojan people will spread out here again new round athletics, it is with an eccentric person in not big field one wrestle life and death.
93, King Priam gave him a house like those of his brothers, the Trojan princes.
94, This Trojan includes a keylogger and allows attackers to access your computer, stealing passwords and personal data. It is a registered security risk and should be removed immediately.
95, On hearing this, Thetis, the mother of Achilles, went to Zeus's palace and asked him to make the Greeks repent14) of their injustice to Achilles by granting success to the Trojan army.
96, When he downloaded the free game it turned out to be a trojan horse.
97, E-commerce became an attack against the network bank hot spots, the attack also more apparent, Trojan virus staring online trading links from virtual value theft to direct financial crime.
98, The king of Mycenae and leader of the Greeks in the Trojan War, who was the son of Atreus and the father of Orestes, Electra, and Iphigenia; His wife Clytemnestra killed him upon his return from Troy.
99, Of 80 % pilfer case it is an user medium trojan virus.
100, The hero of the Trojan War, the son of Peleus and Thetis and slayer of Hector who was killed by Apollo at last.
101, Was Colombo the emissary of Pope Paul, his Trojan horse within the Commission?
102, There is a vaulting horse in this week particularly notable, it is " QQ pass trojan ".
103, A timely gift – a Trojan horse – will serve the same purpose.
104, Harm done by Trojan horse and computer virus becomes more and more severe in terminal computer system.
105, A typical system configuration would include four aircraft, one ground control system and one Trojan Spirit II data distribution terminal.
106, In addition, the advertisement with pensile this year home page of website of many mainstreams portal also by embedded trojan virus, once the user visits these websites to be met toxic.
107, The trojan acquires data and commands from a remote computer or the Internet.
108, The ng of Sparta thethe Trojan ar and the husband of Helen and brother of Agamemnon.
109, They are defeated only because of the Trojan horse in their country.
110, The Trojan War Helen of Troy, the daughter of King Tyndareus of Sparta(sentence dictionary), would become the cause of the epic Trojan War that lasted more than ten years.
111, A totally new project for Trojan horse auto-start is put foward by loading Trojan horse programs into OS service.
112, And each other of trojan of a lot of pairs of processes is surveillance now, mutual and renascent .
113, Operating systems can be brought to a halt by a Trojan Horse.
114, Pilfer date trojan still is current the mainstream of computer virus, and the competition between trojan fabricant is more and more intense also.
115, After the user visits these pages, may affect vermian download implement with many trojan virus.
116, Delete stubborn file directory force unlock, auxiliary crushing kill to remove viruses, Trojan files.
117, The first bike in France, there is no transmission, relying on the people riding on the top two pedal moved forward, known as the Trojan horse.
118, Trojan Horse Programs are a type of malicious computer programs.
119, A Trojan prince, the eldest son of Priam , killed by Achilles.
120, One of the Greek heroes of the Trojan War and the son of the Ares.
121, The fe of Sparta ng Menelaus ho as abducted by Pars and proved the Trojan ar.
122, Trojan Technologies Inc. of Ontario, North America's dominant maker of ultraviolet disinfection equipment for treating sewage, is a key supplier to Aquarius and other companies.
123, There is no evidence of a Trojan horse on your system.
124, Remote administration types are an example of another kind of nonviral malicious software, the Trojan horse, or more simply Trojan.
125, The sculpture shows the Trojan priest Laocoon and his sons being crushed to death by sea snakes.
126, Another moon, Telesto, orbits in front of Tethys, creating a grouping unique to the Saturnian system known as trojan moons.
127, Because the trojan can give fabricant to create huge economic increase, one has been formed from the chain of trojan economy industry that makes transmission.
128, Greek mythology a mythical Trojan who has killed by Achilles during the Trojan War.
随便看

 

英语例句大全共收录104207条中英例句词条,基本覆盖所有常用英文单词的例句、长难句及中文翻译,是不可多得的英语学习材料。

 

Copyright © 2000-2024 Suppus.net All Rights Reserved
更新时间:2024/10/5 4:00:35