恶意 evil [vicious; ill] intentions; ill will; malice; [拉丁语] mala fide 对某人心怀恶意 bear malice to [towards; against] sb.; 恶意攻击 malicious attack; 恶意诽谤 spread vicious gossip; 恶意行为 malicious act; 恶意中伤 malicious calumniation; viciously slander; calumniate; 并无恶意 bear no ill will; 恶意歪曲地报道这条新闻 report the news mala fide; 我对你毫无恶意。 i bear you no malice. 他做此事是出于恶意。 he did it of [out of; through] malice
Ie superman commitment , never any plug - in bundle , never malicious acts Ie超人承诺,永不捆绑任何插件,永无恶意行为。
This answer is then translated into whether the program contains malicious behaviour 这个答案然后被转化成程序是否含有恶意行为。
However , this will be clearly unable to account for the vandalism prevailing among some slums or ghettoes 然而这种假设无法解释贫民窟中普遍的恶意行为。
Some jurisdictions have established this tort to provide a rimedy for malicious deeds 有些司法管辖区规定了此种侵权行为,目的是对恶意行为受害人提供救济。
Figure 1 gives a diagrammatic representation of the ste in analysing a binary statically for the presence of malicious behaviour 图1给出静态分析二进制代码检查恶意行为的图示。
Figure 1 gives a diagrammatic representation of the steps in analysing a binary statically for the presence of malicious behaviour 图1给出静态分析二进制代码检查恶意行为的图示。
This is the malicious activity that the virus performs . not all viruses have payloads , but there are some that perform destructive actions 这是病毒发作时的恶意行为。不是所有的病毒都有有效载荷,但有一些执行破坏行为。
Significantly , a / v software is unable to protect against unknown viruses and malware intrusions because it searches for known malicious code rather than detecting and blocking potentially malicious behavior 显着的音频/视频软件,是无法以防范未知病毒和恶意软件入侵,因为它搜寻已知的恶意代码,而不是检测和阻止潜在的恶意行为。
Although this kind of behaviors could not be simply regarded as “ malicious behavior ” , it does influence the total performance of the p2p systems and may eventually cause the collapse of the whole p2p system 虽然这种现象不能简单的归结为“恶意行为” ,但是这种行为的结果却会对p2p系统整体运转产生不利影响,甚至最终导致网络群体的崩溃瓦解。
It is not only discerns and responds to computer and network hostile behavior of resource but also measure external invasion behavior and supervise inside mandate activity of user at the same time , before network resource is endangered and intercepted 它对计算机和网络资源上的恶意行为进行识别和响应。它不仅检测来自外部的入侵行为,同时也监督内部用户的未授权活动,并在网络资源受到危害之前通过对防御体系自动配置进行拦截和响应。