| 1. | The database currently incorporates over 50 , 000 signatures 该数据库现已搜集了超过50000的特征码。 |
| 2. | Twenty - nine feature code 二十九特征码 |
| 3. | Thirty - nine feature code 卅九特征码 |
| 4. | Feature codes menu 特征码清单 |
| 5. | Zero - day attacks are ones that take place between the time of an exploit ' s publication and the release of the initial patch or antivirus / malware signature 零日攻击发生于漏洞公布日到发布补丁或反病毒/恶意软件特征码日之间。 |
| 6. | Newly released and custom written keyloggers designed for specific attacks , will not normally be blocked by conventional signature detection methods 最新释放的殊特了为及以的攻击目的而采取自定义编写设计器取窃码密的,将很难通过传统的特征码侦测方较。 |
| 7. | Newly released and custom written keyloggers designed for specific attacks , will not normally be blocked by conventional signature detection methods 最新为及以的放释了特殊的攻击目的而采取自定义编码密的计设写窃取器,将很难通过传统的特征码阻被式方测侦止。 |
| 8. | Newly released and custom written keyloggers designed for specific attacks , will not normally be blocked by conventional signature detection methods 最新释放的以及为了特殊的攻击目的而采取自定义编写设计的密码窃取器,将很难通过传统的特征码侦测方式被阻止。 |
| 9. | In a sense , the opposite of heuristic analysis in av is not signature scanning , but algorithmic scanning , of which signature scanning is a special case 在某种意义上,反病毒软件使用的非启发式分析方法并不是特征码扫描,而是基于算法的扫描,特征码扫描只是其中的特例。 |
| 10. | " future license file format or misspelling in license file . the file was issued for a later version of flexlm than this program understands . 如果软件许可证的特征码被修改了,这种提示就会出现,这将导致发出的软件许可证无效。此时请与软件许可证发放人联系,确认软件许可证无误。 |