Hvad er oversættelsen af " VICTIM COMPUTERS " på dansk?

['viktim kəm'pjuːtəz]
['viktim kəm'pjuːtəz]
offeret computere
victim computer
victimized computer
offer computere
victim computer
victimized computer
offerets computere
victim computer
victimized computer

Eksempler på brug af Victim computers på Engelsk og deres oversættelser til Dansk

{-}
  • Colloquial category close
  • Official category close
  • Medicine category close
  • Financial category close
  • Ecclesiastic category close
  • Official/political category close
  • Computer category close
It triggers the following warning on the victim computers.
Det udløser følgende advarsel på offeret computere.
To be distributed across victim computers, CryptoFinancial may use several techniques.
Fordeles på tværs offer computere, CryptoFinancial kan anvende flere teknikker.
Garrantydecrypt Ransomware will be loaded on the victim computers.
Garrantydecrypt Ransomware vil blive indlæst på offeret computere.
Once they are installed on the victim computers the built-in behavior pattern will start.
Når de er installeret på offeret computere den indbyggede adfærdsmønster starter.
It is programmed to harvest sensitive content from the victim computers.
Det er programmeret til at høste følsomt indhold fra offeret computere.
The victim computers can have the associated Shadow Volume Copies of sensitive files removed.
De offer computere kan have den tilhørende Shadow Volume Kopier af følsomme filer fjernet.
If this is done the extension will be downloaded and installed on the victim computers.
Hvis dette gøres forlængelsen vil blive hentet og installeret på offeret computere.
Once the Rapid 2.0 virus is deployed onto the victim computers it starts a complex multi-stage delivery.
Når den hurtige 2.0 virus er indsat på offeret computere det starter en kompleks etapevis levering.
This happens by executing the following commands as an administrator on victim computers.
Dette sker ved at udføre følgende kommandoer som administrator på offer computere.
The malicious code can also spam the victim computers with endless banners, pop-ups and other related messages.
Den ondsindede kode kan også spam offeret computere med endeløse bannere, pop-ups og andre relaterede meddelelser.
Control server it can be used to load additional components to the victim computers.
Kontrol-server kan det bruges til indlæse yderligere komponenter til offeret computere.
It generates a profile of the victim computers based on the acquired data: hardware components and installed software.
Den genererer en profil af offeret computere baseret på den erhvervede data: hardwarekomponenter og installeret software.
The following data is automatically harvested from the victim computers and send to the operators.
Følgende data automatisk høstet fra offeret computere og sende til operatørerne.
Direct Malware Downloads- Once the users click on the links malware files will be downloaded directly to the victim computers.
Direkte Malware Downloads- Når brugerne klikker på links malware filer vil blive downloadet direkte til offeret computere.
As soon as the V9Search browser hijacker is deployed onto the victim computers it will begin with the browser changes.
Så snart V9Search browser flykaprer er indsat på offeret computere er det vil begynde med browseren ændringer.
These shadow volume copies are essentially mirrored copies of the important files on the victim computers.
Disse skygge volumen kopier væsentlige spejlede kopier af vigtige filer på offerets computere.
Such connections can also be used to institute control of the victim computers in a manner similar to Trojan viruses.
Sådanne forbindelser kan også bruges til at anlægge kontrol af offeret computere på en måde, der svarer til trojanske virus.
The new version of Mole does not differ much by the methods of replicating itself on victim computers.
Den nye version af Mole adskiller sig ikke meget ved metoderne til at gentage sig selv på offer computere.
Once it has installed itself on the victim computers it starts to execute the built-in code according to the hacker configuration.
Når det er installeret sig på offerets computere det begynder at udføre den indbyggede kode i henhold til hacker-konfigurationen.
The virus may also create mutants andextract the following information from victim computers.
Den virus kan også oprette mutanter ogudtrække følgende information fra offer computere.
In order to encrypt the files on victim computers, the XeroWare ransomware virus may initially scan for them, before actual encryption takes place.
For at kryptere filerne på offerets computere, den XeroWare ransomware virus kan i første omgang scanne efter dem, før egentlige kryptering finder sted.
This will allow the hacker operators to spy on the victim computers at any given time.
Dette vil gøre det muligt hacker operatørerne til at udspionere offeret computere på et givet tidspunkt.
Scarabey v2 Ransomware- Analysis and ActivityScarab Ransomware's new version which has been created with more abilities to perform malicious activities on victim computers.
Scarabey v2 Ransomware- Analyse og AktivitetScarab Ransomware s ny version, der er blevet skabt med flere evner til at udføre ondsindede aktiviteter på offer computere.
Exe is dropped andit's main purpose is to run actively in the background of victim computers and it may even remain hidden as a process in Windows Task Manager.
Exe tabes, ogdet er hovedformålet er at køre aktivt i baggrunden af offerets computere, og det kan endda forblive skjult som en proces i Windows Jobliste.
Anonymous Metrics- This data set is usedd to optimize the campaigns by including data about the victim computers.
Anonyme Metrics- Dette datasæt usedd at optimere kampagnerne ved at inkludere data om offeret computere.
The CrossRAT Trojan has been reported by series of researchers to come onto victim computers via a. jar file via series of methods with very low detection rate.
Den CrossRAT Trojan er blevet rapporteret af serier af forskere til at komme ind på offerets computere via en. jar fil via serie af metoder med meget lav opdagelse sats.
Researchers from Symantec report the following hosts to be the download URLs of the malware on the victim computers.
Forskere fra Symantec rapport den følgende værter til at være download URL'er af malware på offeret computere.
It provides the most advanced infiltration options andcan completely take over the victim computers leading to further virus infections.
Det giver de mest avancerede infiltration muligheder ogkan helt overtage offeret computere fører til yderligere virusinfektioner.
The virus may start with the information gathering module which can generate a detailed profile of the victim computers.
Virussen kan starte med informationsindsamling modul, som kan generere en detaljeret profil af offeret computere.
Scarab Ransomware's new version which has been created with more abilities to perform malicious activities on victim computers.
Scarab Ransomware s ny version, der er blevet skabt med flere evner til at udføre ondsindede aktiviteter på offer computere.
Resultater: 79, Tid: 0.0492

Sådan bruges "victim computers" i en sætning

Petya had less luck in finding victim computers that hadn't been kept up to date.
That operation involved redirecting requests made by victim computers and gathering certain information from those computers.
Victim computers receive instructions from a controller directing them to click on ads on specific websites.
Like other viruses, MyDoom searched victim computers for e-mail addresses as part of its replication process.
The malware design is modular and when installed o victim computers it will work with gadgets.
This encrypts victim computers and demands a ransom in return for restoring control to the user.
Care has been taken so that anti-virus software on the victim computers doesn’t detect this malware.
Once it has been placed on the victim computers the main application will start itself automatically.
The file virus can infiltrate victim computers if the criminals are able to identify a vulnerable program.

Ord for ord oversættelse

Top ordbog forespørgsler

Engelsk - Dansk