Примеры использования Malicious features на Английском языке и их переводы на Русский язык
{-}
-
Official
-
Colloquial
Malicious features go beyond spying.
It may even have malicious features and you can't tell.
I have already told you about two kinds of malicious features.
Malicious features are unacceptable no matter how they are implemented.
The developers often put in, as I said, malicious features.
And that's why we find that malicious features are rare in free software, and common in proprietary software.
Many apps from the market contain malicious features.
And when software's proprietary,it is likely to have malicious features in it to spy, to restrict, and there's even back doors that accept remote commands to do things.
Of course, not all developers of nonfree software are putting malicious features.
If a Libre program had malicious features like those, some users skilled at programming would remove them, then provide the corrected version to all the other users.
It's nonfree software, andthat's why it has malicious features such as surveillance.
We also can not and will not guarantee that the site doesnot contain any computer viruses or anything else that has malicious features.
Riskware does not have any malicious features but can be used as an auxiliary component by malicious software, since such programs can contain holes and errors.
Sometimes they just don't work exactly as you want, butoften times they even contain malicious features.
Anyway, malicious features are present in the most widely used nonfree programs, but they are rare in free software, because with free software the users have control.
That encryption is an example of DRM(Digital Restrictions Management), the malicious features designed to restrict users.
The owner often takes advantage of this unjust power by inserting malicious features such as spyware, back doors, and Digital Restrictions Management(DRM)(referred to as“Digital Rights Management” in their propaganda).
Software, on the other hand, does things far more complicated than that, andproprietary software commonly has malicious features comparable to that needle.
And if I tried to disobey,the software in e-readers has malicious features called Digital Restrictions Management(DRM, for short) to restrict reading, so it simply won't work.
Malicious features, such as spying on the users, restricting the users, back doors, and imposed upgrades are common in proprietary software, and some open source supporters want to implement them in open source programs.
Now, the developer who has control of the program often feels tempted to introduce malicious features to further exploit or abuse those users.
Amazon eliminates these freedoms,partially by means of digital handcuffs(malicious features in the software designed to restrict users so they can't do these things) and partially through having said that users can't own a book, because Amazon makes them sign a contract saying they won't give away, lend or sell the book.
The developer is saying,"just trust me" and blind faith is the only way you can do it. And you have to be really blind,given that it's not unusual for proprietary programs to have malicious features, features that are put in not to serve the user, but rather to impose on, harm or restrict the user.
User Content submitted by you does not contain any harmful software code, file, program or programming routine, orother infectious or malicious features or code or features that may compromise the security or integrity of Polar's computer systems, networks, website(s) or servers.
Divided, because they're forbidden to share it, and helpless, because they don't have the source code so they can't change it. They can't even study it to verify what it's really doing to them, andmany proprietary programs have malicious features which spy on the user, restrict the user, even back doors to attack the user.
They can't even study it to verify what it's really doing to them, andmany proprietary programs have malicious features which spy on the user, restrict the user, even back doors to attack the user.
There wasn't much scope for putting in malicious feature into people's disk controllers.
The other kind of malicious feature is the backdoor.
So this is another kind of malicious feature.
Surveillance is one kind of malicious feature that you find in some nonfree programs;