Eksempler på brug af Strings that can på Engelsk og deres oversættelser til Dansk
{-}
-
Colloquial
-
Official
-
Medicine
-
Financial
-
Ecclesiastic
-
Official/political
-
Computer
Multiplexing to multiply the number of strings that can be issued.
They can reveal strings that can expose the victim's identity.
Personal Information- It is attributed to the owner of the machine itself by targeting strings that can reveal their identity.
It will look out for specific strings that can be grouped into two main types.
It seeks to gather strings that can reveal sensitive information about the victim and the infected machine.
The built-in engine will automatically look for strings that can be of use to the operators.
It is programmed to extract strings that can be classified into these two types: Anonymous Metrics- They are used by the criminals to judge how effective the attack campaign is.
Similar threats like this one can extract strings that can be grouped into two main types.
The engine will search for strings that can expose their identities by looking for data such as their name, address, phone number, interests, location and any stored account credentials.
Optimization Data- The module can harvest strings that can be used to optimize the attacks.
It scans the memory and hard drive contents of the infected hosts by looking for specific strings that can reveal the victim's identity.
It is programmed to extract strings that can be classified into these two types.
A typical infection would begin by calling the data harvesting module which is programmed into harvesting strings that can be grouped into two main categories.
It is programmed to harvest strings that can reveal the victim's identity and their hardware.
Such examples include information about the installed hardware components or strings that can reveal the user's identity.
It is customized to extract strings that can reveal sensitive data both about the users and their machine.
Personal Victim Information- The Scarab-bin virus engine can extract strings that can expose the victim's identity.
This is done in an automated way by looking for strings that can reveal the user's identity, examples include the following: name, address, telephone number, location, interests, passwords and account credentials.
Private Data- The harvested information is composed of strings that can directly identify the victims.
It is programmed into harvesting strings that can be grouped into two main groups.
Private User Data- The associated data harvesting plugin can also be programmed into looking our for strings that can expose the victim users identity.
Private User Data- The hacker operators can instruct the malicious engine into looking for strings that can reveal information that can directly reveal the victim's identity- their name, address, phone number, interests, location and stored account credentials.
Multiplexing is the process that allows to multiply the number of strings that can be sent by carrier frequency.
This is done in an automated way by looking for strings that can reveal the user's identity, examples include the following.
The malware infections can be programmed into harvesting strings that can be grouped into several categories.
It can be programmed into harvesting strings that can be classified into two main categories.
It is programmed to look for specific strings that can be extracted from the infected system.
Identity Data- This is a collection of strings that can directly identify and expose the victims.
Private Data- The engine will search for strings that can directly expose the identity of the victims.
The relevant tool is programmed to search for strings that can directly expose the users identity.