Examples of using User's computer in English and their translations into Croatian
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
Client-Side Logs are stored locally on the user's computer.
If it infiltrates the user's computer, it causes a lot of damage.
And we would have to build a protocol between the user's computer and ours.
Com appears in user's computer even without direct installation.
And these elements are executed on the user's computer(not on the server).
People also translate
Once it enters the user's computer, it immediately starts producing countless commercial advertisements.
Com is browser hijacker that frequently enters the user's computer unnoticed.
Once the adware slithers into user's computer, it immediately floods it with advertisements.
(hereinafter“Google”), uses cookies,which are saved on the user's computer.
Browser hijackers often enter user's computer bundled with freeware.
Automatically collects andstores information in log files on the user's computer.
This toolbar usually enters the user's computer bundled with freeware.
Cookies are small text files that the Internet browser stores on the user's computer.
These kind of applications usually reach user's computer together with free of charge software.
These security vulnerabilities could allow malicious, untrusted code to compromise a user's computer.
These programs usually enter the user's computer using the method called‘bundling'.
Temporary storage of IP address by the system is necessary to enable delivery of the website to the user's computer.
This adware is known to infiltrate the user's computer during the installation of freeware.
The temporary storage of the IP address by thesystem is necessary in order to deliver the website to the user's computer.
The adware usually enters the user's computer together with freeware from untrustworthy websites.
The web service stores information and settings of the website on the user's computer in the form of text files ie.
It always enters user's computer without permission and immediately changes home page and default search engine.
Persistent cookies remain stored on the user's computer for a definite period.
This hijacker enters user's computer bundled with such applications like Cleaner, RocketTab, Speed Up, etc.
Cookies are a small set of data sent from the Agency's website server to a user's computer, and serves as an anonymous identifier.
The intruder enters user's computer in a clandestine manner and immediately changes home page and default search engine in Internet Explorer, Google Chrome, and Mozilla Firefox.
So-called‘Persistent Cookies' are stored on the user's computer or device in-between browser sessions.
Uses its own cookies on its website, while allowing selected third parties to install their own cookies on the user's computer.
Permanent cookies remain on the user's computer/device for a pre-defined period of time.
Cookies are text files that are stored in the Internet browser orby the Internet browser on the user's computer system.