Примеры использования Other malicious programs на Английском языке и их переводы на Русский язык
{-}
-
Official
-
Colloquial
Also, cookies cannot be carriers of viruses and other malicious programs.
As a rule, viruses and other malicious programs are located on popular internet websites, disguised as useful software or freeware.
After installation on the victim's computer Trojan downloads from the Internet other malicious programs.
Encrypting programs(FileCryptor, PolyCryptor classes) encrypt other malicious programs to prevent them from being detected during an anti-virus scan.
File Anti-Virus intercepts every attempt to access a file andscans the file for viruses and other malicious programs.
In up-to-date Internet we can face with not only viruses and other malicious programs but with other types of network fraudulence.
Scans files of all virtual machines installed with Light Agent for the presence of viruses or other malicious programs.
More about protecting against viruses and other malicious programs can be found in the manual Basic Concepts of Information and.
Scan the infected PC for Viruses, Trojans, Spyware, Adware, Worms, Dialers,Keyloggers and other malicious programs.
Various modifications of this malware are used for hidden installation of other malicious programs, for victims' personal data theft, for aggregation of infected devices into the botnet that spreads spam and participates in DDoS attacks.
By purchasing MailScan for Mail Servers, you will provide full protection against viruses, worms,Trojans and other malicious programs.
Other malicious programs do not impose any threat to the computer on which they are executed, yet they can be used to organize network attacks on remote computers, hack other computers, create other viruses or Trojans.
If the machine is connected to the Internet, the Trojan will attempt to download other malicious programs and run them on the infected computer.
Trojan programs(Trojan, Backdoor, Rootkit and other classes) perform the actions not authorized by the users of computers, for example, they steal passwords, access Internet resources,download and install other malicious programs.
If you download it, you will be protected against all threats from viruses, malware,spyware and other malicious programs and files that constantly threaten your computer.
Comodo Antivirus good finds, blocks, and removes viruses from your computer, rootkits, Trojans, worms,hackers and other malicious programs.
Security Reviver includes a hugedatabase of spyware and malware definitions to scan your computer for all types of malware and other malicious programs that may be hidden in the system and collecting informing without your knowledge or consent.
The free, trial version allows you to perform a full system scan to check your PC for malware and other malicious programs.
According to«Kaspersky Lab»,99.9% of all attacks to mobile platforms in Q3 were targeted to Android OS. Among new threats it is worth to mention Svpeng Trojan that unlike other malicious programs of this type gives the attackers possibility to steal the money from the Bank account only through infection of user's smartphones.
Besides,«Kaspersky Lab» experts for the first time detected in order todistribution of mobile malware the cases of exploration of power of third-party botnets consisting of mobile devices infected by other malicious programs that are managed by other intruders.
These utilities are injected into the system, hiding their presence and the presence of processes, folders andthe registry keys of other malicious programs installed with the rootkit.
The object may contain some other malicious program, adware, or a program with pornographic content.
To exclude objects with certain names according to the Kaspersky Lab Virus Encyclopedia classification of malicious programs and other threats from protecting.
To exclude objects with certain names according to the Kaspersky Lab Virus Encyclopedia classification of malicious programs and other threats from protecting and scanning.
In addition to real-time protection, you are advised to regularly scan the protected virtual machine for viruses and other malware to rule out the spread of malicious programs that have not been detected by the application, for example, due to a low security level setting or for other reasons.
Transmit, make available or otherwise promote or support cheats, hacks,cracks, malicious programs, viruses or any other computer code, files or programs that have the effect of or are intended to modify, impair, disrupt, destroy, interfere with, change or limit the functionality of the Games or any portion thereof, take control of any computer software, hardware or telecommunications equipment or interrupt any user's uninterrupted use and enjoyment of our Games;
Malicious programs often use that file for redetermining addresses of update servers for anti-virus applications to block updates and prevent the detection of malicious programs with the signature method, and for other purposes.
A computer virus in this paragraph is a malicious program or software code,written intentionally attack a computer program or network without users permission or knowledge, which harms or intends to harm, alter or disrupt the operation of hardware and software, including Trojan horses, worms, logic bombs, time bombs, back doors, trap doors, spy software, malicious programs or codes, or any other components within the software of the Bank.
Kaspersky Lab» experts first fixed new approach of mobile Trojans distribution- via mobile botnets created on the base of other malicious program.
The remaining work will make the special malicious programs- exactly they find the other non-secure point within enterprise network and provide the access of cyber-crimes to the interested data.