Примери за използване на Malicious activities на Английски и техните преводи на Български
{-}
-
Colloquial
-
Official
-
Medicine
-
Ecclesiastic
-
Ecclesiastic
-
Computer
Thus you will avoid malicious activities and information leaks.
You are responsible to protect Your own material from malicious activities.
It blocks hundreds of malicious activities without you even noticing.
These programs are generally small andare used to perform malicious activities, which include.
Prevention of malicious activities, finding and removing of technical problems or problems related to the functionality;
As we mentioned before, once this rogue infiltrates your system,it starts numerous malicious activities.
This particular shield alerts the user when such malicious activities are attempted in the Windows Host Files.
To ensure the security of our sites,by trying to prevent unauthorized or malicious activities.
User is prohibited from performing any malicious activities and hacking attempts of Casino.
Successful intellectual property andbrands often make companies the target for fraudulent or malicious activities.
These logs are necessary to detect technical issues and malicious activities and for more of the goals described above.
To ensure the security of our sites and apps,by trying to prevent unauthorised or malicious activities.
The botnets are frequently used for conducting a range of malicious activities, distributing viruses and spam, and attacking various new devices.
Successful intellectual properties andbrands often make companies the target for fraudulent or malicious activities too.
This includes using data to protect the security and safety of our products and customers,detecting malware and malicious activities, troubleshooting performance and compatibility issues to help customers get the most out of their experiences, and notifying customers of updates to our products.
Ensuring the safe and normal functioning of the websites and applications,preventing malicious activities;
This way we prevent using this vulnerability for performing malicious activities in our customers' hosting accounts.
Monitor phishing and brand infringements to protect your brand andintellectual properties against fraudulent or malicious activities.
This browser hijacker enters your computer without your permission andthen performs tons of malicious activities on your machine especially for interrupting your browsing sessions.
You may also have other interesting data like personal member information that can be useful in identity theft and other malicious activities.
Artem Abgarian, a top expert from Semalt, assures that the rootkits are not always dangerous butmay hide all the malicious activities, so you should get rid of them as soon as possible.
We did not only work hard on the DDoS defense system, but also put a lot of effort into the SH Protect system that detects andprevents hundreds malicious activities every day.
Intrusion detection system(IDS) is a device(or application)that monitors network and/or system activities for malicious activities or policy violations and produces reports to a Management Station.
Maintaining and protecting the security of our products, services and websites, preventing and detecting security threats, fraud orother criminal or malicious activities;
We automatically scan messages and may manually filter messages to check for spam, viruses,phishing attacks, other malicious activities, or illegal or prohibited contents.
Maintaining and protecting the security of our courses, events and services and of our website, preventing and detecting security threats, fraud orother criminal or malicious activities;
Data for access to e-mail boxes should stored diligently andresponsibly as through unauthorized access to e-mail box can make a number of malicious activities, including compromising the email owner in any way.
We developed and integrated SH Protect- active security system for all manageable services as we also created a few hundred signatures(rules) that recognize andprevent thousands of malicious activities.
Updated on cases of interference from third countries in EU Member States, butdid not report on the number of fake accounts removed due to malicious activities targeting specifically the European Union.
It invites the EU institutions, together with the Member States, to work on measures to enhance the resilience and improve the security culture of the EU against cyber and hybrid threats from outside the EU, and to better protect the EU's information and communication networks, andits decision-making processes, from malicious activities of all kinds.