惡意 evil [vicious; ill] intentions; ill will; malice; [拉丁語] mala fide 對某人心懷惡意 bear malice to [towards; against] sb.; 惡意攻擊 malicious attack; 惡意誹謗 spread vicious gossip; 惡意行為 malicious act; 惡意中傷 malicious calumniation; viciously slander; calumniate; 并無惡意 bear no ill will; 惡意歪曲地報道這條新聞 report the news mala fide; 我對你毫無惡意。 i bear you no malice. 他做此事是出于惡意。 he did it of [out of; through] malice
Ie superman commitment , never any plug - in bundle , never malicious acts Ie超人承諾,永不捆綁任何插件,永無惡意行為。
This answer is then translated into whether the program contains malicious behaviour 這個答案然后被轉化成程序是否含有惡意行為。
However , this will be clearly unable to account for the vandalism prevailing among some slums or ghettoes 然而這種假設無法解釋貧民窟中普遍的惡意行為。
Some jurisdictions have established this tort to provide a rimedy for malicious deeds 有些司法管轄區規定了此種侵權行為,目的是對惡意行為受害人提供救濟。
Figure 1 gives a diagrammatic representation of the ste in analysing a binary statically for the presence of malicious behaviour 圖1給出靜態分析二進制代碼檢查惡意行為的圖示。
Figure 1 gives a diagrammatic representation of the steps in analysing a binary statically for the presence of malicious behaviour 圖1給出靜態分析二進制代碼檢查惡意行為的圖示。
This is the malicious activity that the virus performs . not all viruses have payloads , but there are some that perform destructive actions 這是病毒發作時的惡意行為。不是所有的病毒都有有效載荷,但有一些執行破壞行為。
Significantly , a / v software is unable to protect against unknown viruses and malware intrusions because it searches for known malicious code rather than detecting and blocking potentially malicious behavior 顯著的音頻/視頻軟件,是無法以防范未知病毒和惡意軟件入侵,因為它搜尋已知的惡意代碼,而不是檢測和阻止潛在的惡意行為。
Although this kind of behaviors could not be simply regarded as “ malicious behavior ” , it does influence the total performance of the p2p systems and may eventually cause the collapse of the whole p2p system 雖然這種現象不能簡單的歸結為“惡意行為” ,但是這種行為的結果卻會對p2p系統整體運轉產生不利影響,甚至最終導致網絡群體的崩潰瓦解。
It is not only discerns and responds to computer and network hostile behavior of resource but also measure external invasion behavior and supervise inside mandate activity of user at the same time , before network resource is endangered and intercepted 它對計算機和網絡資源上的惡意行為進行識別和響應。它不僅檢測來自外部的入侵行為,同時也監督內部用戶的未授權活動,并在網絡資源受到危害之前通過對防御體系自動配置進行攔截和響應。