Exemplos de uso de To evade detection em Inglês e suas traduções para o Português
{-}
-
Colloquial
-
Official
-
Medicine
-
Financial
-
Ecclesiastic
-
Ecclesiastic
-
Computer
-
Official/political
It was designed to evade detection.
To evade detection, they traveled the country, buying fabric by day, and sewed by night.
They travel along the fault lines to evade detection.
He attempts to evade detection by killing a member of a hiking expedition and taking his place.
It's the perfect opportunity to evade detection.
The smugglers had tried to evade detection by building a shielded container- a worrisome level of sophistication on their part.
These types of protectors are often exploited by malware authors to evade detection.
They will use resistance routes to evade detection by the governor's soldiers.
These types of protectors are often exploited by malware authors to evade detection.
To evade detection, traffickers move their victims around frequently- sometimes along drug routes, since many perpetrators are also involved in the drug trade.
Today's malware is often heavily obfuscated and tries to evade detection as much as possible.
Considering the method used by the malware,experts assume that the cybercriminals spread Gootkit, which hides in the computer's memory in order to evade detection.
Today's malware is often heavily obfuscated and tries to evade detection as much as possible.
Considering the method used by the malware, experts assume that the cybercriminals spread Gootkit,which hides in the computer's memory in order to evade detection.
They have a heavy influence on almost all other areas of malware andare designed to evade detection and"live" on a system for prolonged periods.
We can see how cybercrime is evolving in Brazil, migrating to new platforms andusing various programming languages in its attempt to evade detection.
According to the indictment,they modified their software in order to evade detection by security software, programming it to delete traces of the malware from the networks.
There are so many tactics that[are] used,” said Ldg. Smn. Watts,speaking of drug traffickers' attempts to evade detection.
These newly designed ESET algorithms strengthen protection against malware that has been designed to evade detection by anti-malware products through the use of obfuscation and/or encryption.
Even more severe is the fact that the virus can move unnoticed by themajority of antivirus software, which is likely that the malware employs advanced obfuscation to evade detection while replicating.
This operation may be caused by malware trying to evade detection, backup software trying to make an exact copy of a disk, or a partition manager trying to reorganize disk volumes.
Our multilayered defense features an in-product sandbox that has the ability to detect malware that attempts to evade detection by using obfuscation.
In addition, the authors of the malware have showed considerable expertise in their efforts to evade detection with tactics including the upgrade of infected servers with new software to throw investigators off course, and creating a new version of their DNS backdoor software in June 2013 in response to the creation of detection tools released just months earlier in April 2013.
Our multilayered defense features an in-product sandbox that has the ability to detect malware that attempts to evade detection by using obfuscation.
Gross had been imprisoned in Cuba for providing illegal cellphone chips of a type used by CIA agents,which are designed to evade detection, in addition to computer equipment, satellite phones, and internet access to Cuba's Jewish community.
As soon as the security specialists add the definitions of the ransomware in the databases of their anti-malware applications,the hackers make minor changes to the code to evade detection.
Works in combination with Exploit Blocker to strengthen protection against malware that has been designed to evade detection by antimalware products through the use of obfuscation or encryption.
Even more severe is the fact that the virus can move unnoticed by the majority of antivirus software,which is likely that the malware employs advanced obfuscation to evade detection while replicating.
Generic is a form of malicious software,which is unique in the fact that it cloaks the presence of files and data to evade detection, while allowing an attacker to take control of the machine without the user's consent or knowledge for that matter.
Newly associated samples from April 2019 indicate attackers have added three distinct steps to their operations, allowing them to bypass certain security controls and suggesting that MuddyWater's tactics, techniques and procedures(TTPs)have evolved to evade detection”,- claimed Cisco Talos researchers.