英語 での Infected computer の使用例とその 日本語 への翻訳
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
-
Programming
How to unlock the infected computer.
Flame searches the infected computer and the network for image files taken with digital cameras.
Opening back doors on an infected computer.
Disconnect the infected computer immediately from your network.
The first stage will start a domino effect in the infected computer.
It is imperative to take the infected computer off the network as soon as possible.
Trojans are classified according to the type of action they perform on an infected computer.
It is imperative to take the infected computer off the network as soon as possible.
Once installed a trojan can delete, corrupt,and use data from the infected computer.
The implant then collects data from the infected computer and returns it to the NSA for analysis.
The code also installs a back door thatcan give hackers remote control over the infected computer.
F can download arbitrary files to an infected computer and execute them.
G is a mass-mailingworm that sends itself to email addresses harvested from each infected computer.
It is the best solution to retrieve files from infected computer with minimum effort on Windows.
Then it puts code into theoperating system that enables a hacker to access the infected computer.
The implant then collects data from the infected computer and returns it to the NSA for analysis.
Infected computer programs can include as well, data files, or the"boot" sector of the hard drive.
Flame can turn on the microphone of the infected computer to record discussions spoken near the machine.
Malicious programs in this family areused by cybercriminals to install additional software on the infected computer.
That implant then collects data from the infected computer and delivers it to the NSA for analysis.
Close Process Killer application anddownload the latest version of GridinSoft Trojan Killer to your infected computer, install and run it.
Insert an external storage device to the infected computer(eg. another USB) as data backup destination.
Download the latest version of GridinSoft Trojan Killer to your infected computer, install it and run it.
The new virus adds a file to the infected computer that tells it where to look for certain Internet addresses.
This type of malicious programis designed to conduct a DoS attack from an infected computer on a pre-defined address.
The worm scans the infected computer for files, such as address books, or temporary webpages, that have email addresses.
BitCoinMiner Trojan activities on the way of turning infected computer into the robot for mining digital currency.