Приклади вживання Infected files Англійська мовою та їх переклад на Українською
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
Infected files?
Removes infected files.
The main purpose of the quarantine is to safely store infected files.
Put infected files in quarantine.
Restoring the Infected Files.
No cleaning- Infected files will not be cleaned automatically.
How to remove infected files.
They are the first to meet with new viruses, working with infected files.
Restoring the Infected Files.
Zeerk will notbe held responsible for any damages caused by infected files.
Every virus comes from infected files, doesn't it?
Strict cleaning- The program will clean or delete all infected files.
If Sophos finds any infected files, it will place them in its Quarantine.
It can not repair any infected files.
In order to remove the virus, infected files can be deleted or the computer can be formatted or restored.
After that you are able to eliminate the infected files manually.
To remove the virus, the infected files need to be deleted and if required the computer has to be restored or formatted.
Compromised or infected files.
Often(but not always)when downloading a dangerous file, an antivirus alerts you and blocks infected files.
It does not cure infected files.
The virus writer placed the infected files on BBS boards and caused both an outbreak and a panic in the mass media.
The software allows you to scan the system and place the infected files in quarantine.
In certain cases infected files can be modified to such an extent that cleaning is not possible and the files must be replaced with a clean copy.
PRODUCTNAME%gt; is capable of cleaning all infected files except for explorer.
Selecting No action is not recommended, as this will leave infected files uncleaned.
The application perfectly detects and disinfects infected files and folders from viruses without the need to remove them.
The beginning of the epidemic was pin-pointed toTaiwan where an unknown hacker sent infected files to a local electronic list-serve.
With numerous devices and therefore numerous users,the risk for corrupted or infected files, apps, or information leaking into the company's main data stream dramatically increases.
Scan more frequently if you deal with potentially infected files on a regular basis.