Examples of using Malicious programs in English and their translations into Chinese
{-}
-
Political
-
Ecclesiastic
-
Programming
Technically, not all malicious programs are viruses.
Using the unique Origins Tracing™ technology, the app can detect new, unknown malicious programs.
Worms are malicious programs that spread through network resources.
The AV-TEST Institute registers over 390,000 new malicious programs every day.
It protects you from malicious programs on your computer and helps to prevent any such contamination.
The AV-Test Institute registers more than 250,000 new malicious programs every day.
Of these four malicious programs, only two are known at this time: Flame and SPE(a. k. a. miniFlame).
Only the most sophisticated anti-malware techniques can detect andremove malicious programs from your computer.
Viruses, worms, and Trojans are malicious programs that can cause damage to your computer and information on your computer.
It's a safe and secure recovery tool,which is free from all kinds of harmful elements like viruses or malicious programs.
In addition, many of them have hidden malicious programs, fraudulent ads or development scripts.
To protect data and the integrity of the operating system and hardware,use software designed to guard against attacks and to remove malicious programs.
Criminals are only too happy to take advantage:The number of malicious programs attacking the IoT has more than doubled this year.
A sandbox, in short, is a safe environment, isolated from the outside world,within which you can run malicious programs and monitor their activity.
This change helps to limit the speed at which malicious programs, such as viruses and worms, spread to uninfected computers.
China requires enterprises to provide secure technological product,and China law prohibits malicious programs, such as back doors in products.
Viruses, worms and Trojan Horses are all malicious programs that can cause damage to your computer, but there are differences among the three.
As an IT security company,Kaspersky Lab is determined to detect and neutralize all forms of malicious programs, regardless of their origin or purpose.
These programs can be used to modify other malicious programs- to try to prevent an antivirus solution detecting the malicious software.
Individual users should also be on their guard; the number of malicious programs for mobile devices is increasing at an alarming rate.
In 2012, Kaspersky Lab discovered three new major malicious programs that were used in cyber warfare operations: Flame, Gauss and miniFlame.
Usually, launchers use nontraditional techniques to launch other malicious programs in order to ensure stealth or greater access to a system.
Over the three months in question, over 14,900 new malicious programs targeting this platform were added to Kaspersky Lab's database.
It can listen for network traffic,download and run other malicious programs, as well as disable some system applications such as the firewall.
Today, most malware is a combination of traditional malicious programs, often including parts of Trojans and worms and occasionally a virus.
The result of both these factors is a share of Android-based malicious programs among all mobile malware currently being higher than 46%, and growing rapidly.
It uses privilege confinement to prevent attackers from using malicious programs on the protected server and even using trusted applications in unintended ways.