Приклади вживання Other malicious Англійська мовою та їх переклад на Українською
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
Upload viruses or other malicious code.
Free treatment and cleaning of the Subscriber's resources from viruses or other malicious code;
Hacker Utilities and other malicious programs.
With Internet use every day,companies become potential prey threats and other malicious code.
Any viruses, trojans and other malicious programs that could be transferred by third parties.
Люди також перекладають
You will not upload viruses or other malicious code.
Do not download viruses or other malicious code or otherwise violate the security of the Service.
(4) You will not upload viruses or other malicious code.
You will not upload viruses or other malicious code or otherwise compromise the security of the Service.
Protection from viruses,"worms","Trojan horses" and other malicious software.
You agree not to upload viruses or other malicious code or otherwise compromise the security of the Services.
Do not place any files that contain or may contain viruses or other malicious programs;
Oinfiltrations such as potential samples of viruses and other malicious programs and suspicious;
The programs from this family download other malicious programs and adware, or updates for them, from the Internet and launch them on a victim computer.
Stealing users' personal data using computer viruses and other malicious programs.
Terrorists, transnational criminal organizations, cyber hackers and other malicious non-state actors have transformed global affairs with increased capabilities of mass disruption.
Contain harmful objects such as computer viruses, trojans, worms,logic bombs or other malicious software or data;
Me hijacker,it is most likely that your computer is also infected with other malicious and unwanted programs that may cause some serious damage.
The Bredolab botnet is mostly used for sending spam, carrying out DDoS attacks,data theft and spreading other malicious programs.
Files check system in real time for the detection of viruses and other malicious programs that try to penetrate the computer;
We automatically scan and may manually filter messages to check for spam, viruses,phishing attacks and other malicious activity or illegal or prohibited content.
Files check system in real time for the detection of viruses and other malicious programs that try to penetrate the computer;
For this reason,malicious users include them in bundles of malicious program in order to send out spam or other malicious content from the victim computer.
They silently perform their functions and automatically install other malicious programs on your device.
Guard – is a system of checking files in real time,designed to detect viruses and other malicious programs that try to enter your computer.
Watchdog- a separate trackingmodule in real-time destination for viyavlyavlennya viruses and other malicious programs that try to penetrate the system.
It is prohibited to download, store, publish,distribute and provide access to or otherwise use viruses and any other malicious programs while using the Website;