Примеры использования Victim's computer на Английском языке и их переводы на Русский язык
{-}
-
Colloquial
-
Official
Off the victim's computer.
So what did you find on the victim's computer?
Nothing on the victim's computer or the first cell phone I looked at.
The card matches the sticker on our victim's computer.
Chief, the victim's computer.
That's the password that I put on the victim's computer.
So you searched the victim's computer without a warrant?
Com from which the malicious updates are downloaded into the victim's computer.
Viruses are downloaded into a victim's computer without being observed.
Good luck solving this puzzle while I have the password to the victim's computer.
I have been searching the victim's computer for Mercedes references, and look at this.
Attacks on data and equipment: They may try to damage the victim's computer by sending viruses.
I'm going through the victim's computer, looking at her e-mails and her Friend Agenda page.
Despite this the Trojan downloads to the victim's computer other malware.
After installation on the victim's computer Trojan downloads from the Internet other malicious programs.
An attacker could potentially use this crash to run arbitrary code on a victim's computer.
Malware encrypts files on the victim's computer using WinRAR.
The victim's computer has software to track her blog visitors, so I selected the repeaters and identified their I.P. addresses.
When a malicious program is placed onto a victim's computer that will allow the hacker free reign to all of their files.
So, if you are in possession of that evidence, I order you to hand it over this instant,including the password that you attached to the victim's computer.
After installation completion so called browser updates the victim's computer has been infected by one of releases of Sirefef and Shylock malwares.
They are continuously hunting for new vulnerabilitiesthat allow deceive and overcome antivirus software and embed the malware into the victim's computer.
What modern day identity theft boils down to is placing a malicious program onto a victim's computer that will allow the hacker free reign to all of their files.
In such cases, the browser would crash when attempting to access a previously destroyed object andthis crash could be used by an attacker to run arbitrary code on a victim's computer.
Also manual FileCoder installation by the attacker with use the access to the victim's computer has been fixed via the service of remote connection to the Windows desktop.
Placed on the victim's computer, these Trojans track the activity of web browsers and as soon as user accesses the resources of the search engines instead of the legitimate search results the links to a variety of fraudulent sites are performed. Trojan.
Experts of Symantec detect new malicious version of PuTTY SSH-client giving the possibility to get access to victim's computer and steal information.
This link downloads an. exe file that proceeds to encrypt access to the victim's computer unless- or so they claim- the victim agrees to pay a predetermined amount in bitcoins.
Experts note that the updated version of ZeroAccess is about that the virus continues to develop actively, andthe main task of its developers is to extend the presence on the victim's computer and the complexity of the process of its deletion.
Ransomware gangs work in union to create a‘fix' ormalware that freezes victim's computer making it impossible for victim to access any part of his computer. .