Exemplos de uso de Hackers use em Inglês e suas traduções para o Português
{-}
-
Colloquial
-
Official
-
Medicine
-
Financial
-
Ecclesiastic
-
Ecclesiastic
-
Computer
-
Official/political
Hackers use open networks to stay anonymous.
This is the very reason hackers use this type of scam.
The hackers use these Trojans to attack PC users and lock their files.
Malicious macro are one of the popular options that hackers use in the last few months.
Many times hackers use URL shortener services such as bit.
As pessoas também se traduzem
Automator Mac Virus is a dangerous threat that can appear on your Mac via a variety of infection techniques hackers use to slither it.
Hackers use the camera to remote monitoring of a lover's home life.33 28:15.
There are several other methods today's hackers use for spreading malware such as spam emails and social networks.
The hackers use the exact same distribution paths to reach the machines of the victims.
Spyware Spyware is a type of malware that hackers use to see your personal information, banking details, or more.
Hackers use spam as a way to lure you to malicious sites or into financial scams.
Man-in-the-middle attacks, Wi-Fi sniffing, DNS spoofing and malware are the main weapons hackers use to steal the information you expose while using public networks.
The hackers use various social engineering tactics to conduct these types of“phishing” attacks.
As an added benefit, a backdoor hides sessions in database connection logs every time hackers use a“magic password”, which helps attackers go unnoticed.
In this process the hackers use various methods to hack the systems and important communications.
It is also called pen testing and it is the skills of testing computer machines, network, web application oronsite perimeter to catch vulnerabilities that hackers use loopholes in the system for spying.
Hackers use sniffers to steal data, spy on network activity, and collect information on users.
It should also be noted that Koobface, which was used at one time to target Facebook and other social network users, is still active andcould be an outlet that hackers use to push malicious adware.
Hackers use this technique to lock you out of your devices and demand a ransom in return for access.
As the name suggests, hackers use this method to send out spam messages to all of their victims' contacts.
Hackers use these parasites to record keystrokes sometimes compromising login credentials for an online banking account or web-based email account.
A keylogger is a tool that hackers use to monitor and record the keystrokes you make on your keyboard.
Because hackers use phishing and malvertising campaigns to distribute their exploit kits, you also need to practice safe browsing habits.
In many cases the hackers use social engineering tricks to try and convince the targets into infecting themselves.
Hackers use them not just to access the files on your computer but also to change the functionality of your operating system by adding their own code.
In the first form, hackers use any number of different methods to install viruses or other malware onto your computer.
Hackers use botnets mainly because the power of a“zombie army” hundreds of thousands strong allows them to carry out much larger attacks than they otherwise could.
In many cases the hackers use various social engineering tricks to lure the targets into executing the malware.
Hackers use lists of common passwords to access accounts(not only on Skype but across all websites), so it's critical that you use a strong, unique password.
Because many hackers use internet as the main stream to damage the confidential files stored on users computers.