| 1. | Wireless malicious code attacks : are they for real 无线恶意代码攻击:它们是真的吗? |
| 2. | The bottom line is , malicious code is out there 不管我们承认与否,现在已发现有恶意代码。 |
| 3. | A potential vulnerability if exposed to malicious code :如果公开给恶意代码,有可能成为攻击点 |
| 4. | Lists descriptions for the various exploits they know about 对他们所知道的各种恶意代码做了描述。 |
| 5. | What happens if i download bad code and it breaks my machine 如果我下载了恶意代码,会发生什么呢? |
| 6. | However , remember that malicious code can call your code 然而,请记住,恶意代码可以调用您的代码。 |
| 7. | Essential - level familiarity of malcode tools and defense tactics 对恶意代码工具和防御策略有基本的了解 |
| 8. | We repeat it again : there is no malicious code inside m33 我们在这里重申, m33的自制系统是没有恶意代码的。 |
| 9. | Malicious code might be able exploit this to avoid permission checks 恶意代码可能会利用这一点避开权限检查。 |
| 10. | Some of the malicious codes attacks listed on the web site include 在这个网站上,列出了一些恶意代码的攻击: |