「Worm」の共起表現一覧(1語右で並び替え)3ページ目

Worm

<前へ 1 2 3

1語右で並び替え

該当件数:531件

  • Leptotyphlops drewesi, or the Drewes's worm snake, is a species of snake in the Leptotyphlo
  • Eastern worm snake, Carphophis amoenus amoenus (Say, 1825)
  • Leptotyphlops macrops, or the Large-eyed worm snake, is a species of snake in the Leptotyphlo
  • Leptotyphlops emini, or Emin Pasha's worm snake, is a species of snake in the Leptotyphlo
  • Like the Common Worm Snake, these snakes are often mistaken for eart
  • Common names: Loveridge's worm snake.
  • Worm snakes are fossorial, and spend the vast majori
  • Western worm snakes are found in the United States in southe
  • with his sister Sally Cat, and friend Lowly the Worm) solve mysteries by examining evidence.
  • There have been variants of the worm, some that use alternative search engines after
  • A number of sympagic worm species are commonly called ice worms.
  • M. thalassinum is a host for the parasitic worm Spinochordodes tellinii.
  • Released on June 12, 2006, the worm spread through the Yahoo!
  • Discovered on May 21, 2007, the worm spreads itself by dropping malicious script fil
  • The e-mail through which the worm spreads always includes a text portion and one
  • workers had seen the devastation caused by the worm, such as fish being injured or disappearing and
  • eptember 2010, analysis of the Stuxnet computer worm suggested that it was designed to sabotage a nu
  • From the mid-1980s, Worm taught at the Institute for Journalism and Comm
  • during an autopsy, he discovered the trematode worm that is the cause of urinary schistosomiasis, i
  • F is a computer worm that is spread by p2p file sharing networks.
  • C. maginatum is a yellow worm that can grow up to 6.4 millimetres (0.25 in) i
  • Toxbot is a computer worm that was primarily active in 2005.
  • W32.Gammima.AG is a computer worm that was detected on computers in space aboard
  • orthumbrian Symphony and his opera, The Lambton Worm, that utilise material from the North-East of E
  • virens are still frequently used) is an annelid worm that burrows in wet sand and mud.
  • Dabber is a computer worm that spreads through a vulnerability found in t
  • Any worm that lives in a marine environment is considere
  • most notable animals kept there was a male slow worm that lived there from 1892 to 1946 (for 54 year
  • pisode that was replaces later evolved into The Worm That Turned on The Two Ronnies.
  • Gaobot.EE is a worm that sends large numbers of unsolicited e-mails
  • Here you have, is a computer worm that successfully attacked many Windows compute
  • VEYOU, also known as Love Letter, is a computer worm that successfully attacked tens of millions of
  • The potato root nematode is a microscopic worm that thrives on the roots, thus causing the pot
  • Klez is a computer worm that propagates via e-mail.
  • the W32.HLLW.Gaobot.EE, is a malicious computer worm that tends to come from the P2P network Ares, i
  • KAK (Kagou Anti Krosoft) is a JavaScript worm that uses a bug in Outlook Express to spread it
  • In MIIB, Jeff the Worm(The big worm that lives in the subway system) e
  • nets after discovering rxbot, a common computer worm that could spread his net of infected computers
  • Sasser is a computer worm that affects computers running vulnerable versi
  • (Kaspersky)) is a backdoor computer worm that is spread through MSN Messenger and Window
  • Mumu is a computer worm that was isolated in June 2003.
  • Swima is a genus of polychaete worm that lives in the deep ocean.
  • s Paget discovers in human muscle the parasitic worm that causes trichinosis.
  • iscovered by MessageLabs in 2002, is a computer worm that spreads itself by sending email to the add
  • The Capitella capitata is a polychaete worm that grows up to 10 cm in length.
  • of Jonah, in which there is a description of a worm that, nightly, infested a kikayon (Ricinus) pla
  • the wild release of the Sexy Space text message worm, the world's first botnet capable SMS worm, whi
  • one simply pulls off the protruding head of the worm, the worm will break and leak high levels of fo
  • Lumbriculus illex is a fresh-water worm, the most recently described member of the genu
  • An example of a marine worm, the Parborlasia corrugatus lives at depths of
  • The Samy worm, the largest known XSS worm, infected over 1 mi
  • arus lacustris is infected with a thorny-headed worm, the parasite causes serotonin to be massively
  • The worm then attempts to spread to other phones in the
  • The name whipworm refers to the shape of the worm; they look like whips with wider "handles" at t
  • ivores may be pests depending on which kinds of worm they eat.
  • : The object is to navigate a virtual snake (or worm) through an enclosed space, while consuming dot
  • inicola (NAVISA) was the first company to add a worm to its Gusano Rojo mezcal.
  • If used by itself it causes the worm to be passed out in the feces.
  • Eventually he leads the worm to the surface and defeats it.
  • ons from the successful campaign against Guinea worm to combat other diseases in Africa, including p
  • rizoic acid into the duodenum, which causes the worm to detach and be passed whole.
  • told him - The butterfly can change from a mere worm to the most beautiful creature of all.
  • Fossilized worm tracks.
  • that the 'Grouse disease', due to the parasitic worm Trichostrongylus tenuis is a mistaken diagnosis
  • Where the original worm tried to infect other computers at random, Code
  • The worm tubs were replaced in 1956, and increasing dema
  • Newnes glow worm tunnel
  • on the railway has survived as the Newnes glow worm tunnel, which has become something of a tourist
  • In 1985, Worm uncovered the Noricum scandal.
  • cture (thanks to an attack by the toredo marine worm) under the weight of modern locomotives led to
  • Home PCs are generally not vulnerable to this worm unless they have MSDE installed.
  • Nicholas Wade, "In Tiny Worm, Unlocking Secrets of the Brain", New York Time
  • The crow pursues the worm until he is suddenly attacked by a hungry cat.
  • n the first day of every month, at 5:00 pm, the worm uses shutdown.exe
  • The discovery of a worm using Quicktime files to spread across MySpace
  • "New Oracle Voyager Worm Variant".
  • A malicious act, such as a worm, virus, hacker or theft of physical media.
  • been used for centuries as an insect and in the worm warding type of embalming.
  • During his entire teaching career, Worm was not only concerned with solid journalist tr
  • According to its creator, the Morris worm was not written to cause damage, but to gauge t
  • The worm was based on proof of concept code demonstrated
  • The worm was named the .ida
  • The Code Red worm was a computer worm observed on the Internet on
  • er, but also Netsky.AC, a variant of the Netsky worm, was his creation.
  • The worm was released on September 18, 2001.
  • The Sadmind worm was a self-propagating piece of malware.
  • s release, Google blocked the search string the worm was using to find vulnerable hosts.
  • The Code Red worm was first discovered and researched by eEye Dig
  • Ole Worm was something of a perpetual student: after att
  • The aim of this worm was to send a Christmas greeting from "Father C
  • The Sobig Worm was a computer worm that infected millions of I
  • The Father Christmas worm was a computer worm that used the DECnet to att
  • However, the worm was released from MIT to disguise the fact that
  • The worm was designed to exploit a security hole in the
  • this worm was discovered in late 2003 and runs on Windows
  • If still in the system, the worm was programmed to self-remove on January 1, 200
  • Lumbriculus kareliensis, an Annelid worm, was described by Popchenko in 1976 from materi
  • buffer overflows - this is how the Blaster worm was able to propagate
  • The worm was made possible by a software security vulner
  • The worm was first discovered by an insect trapper on bo
  • threads, multi start threads, worms as used in worm wheel reduction boxes, leadscrew with single or
  • eld is well known for the legend of the Lambton Worm which is said to have terrorised the village.
  • result in destruction and disintegration of the worm which may make it impossible to confirm that th
  • Its design may have derived from the gun worm which was a device used by musketmen to remove
  • s I-Worm.ZippedFiles, is a destructive computer worm which attacks machines running Microsoft Window
  • The narcotizing effect immobilizes the worm, which prevents migration when treatment is acc
  • Often an epitoke is the posterior part of the worm, which separates from the anterior part (called
  • Hellboy then tracks down and battles the giant worm while underground.
  • tment of nematode infestations, including round worm, whip worm, thread worm, and hook worm.
  • the 17th century by the Danish antiquarian Ole Worm who documented the inscriptions and reported th
  • the Danish physician and natural historian, Ole Worm, who married Fincke's daughter Dorothea.
  • Greenfield has described himself as a book worm who did not have many friends.
  • Buddenbrokia plumatellae is a parasitic worm whose taxonomic placement long puzzled biologis
  • The first attachment is always the worm, whose internals vary.
  • A worm whose ruleset begins with 0 continues in a stra
  • The worm will also locate *.MP3 and *.MP2 files, and whe
  • d Clifford, killer of Rutland as, "The smallest worm will turn being trodden on, And doves will peck
  • The worm will then search all drives which are connected
  • Even a worm will turn is an expression, used to convey the
  • Haemonchus contortus, also known as red stomach worm, wire worm or Barber's pole worm, is very commo
  • Ampharete is a genus of polychaete annelid worm with a single, chevron-shaped row of teeth.
  • dels used for the trapdoor spider and the giant worm with tentacles are the same ones that were used
  • swamplands, they encounter a large, pale white worm with huge jaws.
  • Bird almost hits the worm with club, but stops at he last moment, because
  • A full system scan should find and remove this worm without much difficulty.
  • Additionally, the Morris worm worked by exploiting known vulnerabilities in U
  • However, Carle's editor advised that a green worm would not make a very likable protagonist.
  • Once in the system, the worm would patch the vulnerability it used to gain a
  • Later variants of the worm would use a false From address, picking an e-ma
  • en suggested that the symbol once represented a worm wrapped around a rod; parasitic worms such as t
  • BadBunny (McAfee), is a multi-platform computer worm written in several scripting languages and dist
<前へ 1 2 3