Приклади вживання Malicious programs Англійська мовою та їх переклад на Українською
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
Notable mobile malicious programs.
But more and more often serious risks arise as a result of the actions of intruders(hackers),extortionists and various malicious programs(malware).
For example,direct file system parsing helps find and remove malicious programs and drivers that rootkits try to sneak in.
The Bredolab botnet is mostly used for sending spam, carrying out DDoS attacks,data theft and spreading other malicious programs.
Viruses As malicious programs that are buried within an existing program, viruses replicate themselves and spread from machine to machine.
Люди також перекладають
Stolen passwords are used to further spread malicious programs.
These malicious programs have been localized(showing that they were commercially successful on the black market) and are now actively used in China.
They silently perform their functions and automatically install other malicious programs on your device.
This link points to the program or script'%1'. Malicious programs can harm your computer. Are you sure that you want to run this program? .
They also create a reportfile that lists the names of infected files and the malicious programs found on the computer.
The user is not allowed to introduce and distribute malicious programs and viruses that are capable of disrupting the operation of our service, harm the database or the telecommunications system;
But to be able to fight the enemy, one must know his face-which are malicious programs and how they work.
To protect against malicious programs and emerging threats, we offer flexible solutions based on a high-performance network security platform for enterprise networks that will not reduce performance.
Check the BIOS of the personal computer of being infected"BIOS-whales"- malicious programs infecting a PC BIOS.
This way of running mission critical software, in some cases,can significantly increase the degree of protection against malicious programs.
For example, the analysis of the file system directly to help find andremove malicious programs and drivers that tried to infiltrate rootkits.
Before going out to a global network set themselves,or ask a friend to install anti-virus program to protect against malicious programs.
Files check system in real time for the detection of viruses and other malicious programs that try to penetrate the computer;
Before you try to solve the problem, it is recommended to test the system with the help of anti-virus and, if possible,remove all malicious programs.
Files check system in realtime for the detection of viruses and other malicious programs that try to penetrate the computer;
This created ideal conditions for DdoS attacks and mass spam mailings, and, in turn,created a golden opportunity to earn money by distributing malicious programs.
It is a very popular and effective program that is able to effectively detect and prevent malicious programs from entering your computer.
Your computer is a good source, especially if it is always connected to the internet andhas no proper security software to protect it from these malicious programs.
With this kind of software,you will be able to protect yourself from identity thieves and malicious programs circulating the internet.
These rules are both systemic and user-generated, allowing you to cut off unwantedcyber-intrusion into the user's network by third parties and malicious programs.
Guard – is a system of checking files in real time,designed to detect viruses and other malicious programs that try to enter your computer.
This will prevent contamination of thewell-known worms, but this method of protection does not exclude infection new malicious programs during installation.
USB Disk Security-An innovative software that provides you with 100% protection against malicious programs and viruses spread via removable media.
It is prohibited to download, store, publish,distribute and provide access to or otherwise use viruses and any other malicious programs while using the Website;
Watchdog- a separate tracking module inreal-time destination for viyavlyavlennya viruses and other malicious programs that try to penetrate the system.