Examples of using Computer viruses in English and their translations into Czech
{-}
-
Colloquial
-
Official
No, sir, computer viruses.
This has nothing to do with computer viruses.
But computer viruses only affect computers. .
They're more like computer viruses.
Electronic communication may be affected by corruption of the data, delays,unauthorized attachments or computer viruses.
Well, I guess, uh, even bad guys get computer viruses just like the rest of us, huh?
Now I'm gonna have to worry… about operating systems and computer viruses.
Computer viruses, spam mail, phishing and Trojans are real threats in a world of virtual data.
Yeah, we got computer dating, computer viruses.
Now I'm gonna have to worry about operating systems and computer viruses.
Firstly, classical computer viruses(using a host file for their spread) are almost moribund; present codes create their own files.
This guy goes from strong-arm robberies to stealing computer viruses?
We point out that the computer viruses field is developing very dynamically and that some following categories belong to the museum at this moment- nevertheless, we list them all for completeness sake.
After you fixed my phone… andbefore you started diffusing bombs with computer viruses.
Update, Upgrade- In the terms of antivirus software it means the completion of a computer viruses database(update) or the antivirus scanner engine modernizing upgrade.
Why Isaac shut down. or anything else that might explain No power surges, computer viruses.
Plant malware or otherwise use the Site orany Site Content to distribute malware, computer viruses, spyware, worms, defects, Trojan horses or other items of a destructive nature;
In spite of companies' best endeavours, the company does not warrant that this web site will be free of any defect or computer viruses.
They spent 10 years dissecting me,testing out invasive programs, computer viruses, anything to see what would break me.
Chuck, I fell for you a long, long time ago… after you fixed my phone andbefore you started defusing bombs with computer viruses.
Transmitting computer viruses and destroying data and systems(destruction) Wireless LAN cards and wireless access points contain built-in security mechanisms to address these problems and to reduce the possibility of these problems occurring by configuring the security settings of wireless LAN products when the product is used.
Human hackers have already shown it's possible to hide computer viruses for long periods.
Genuine backdoors occur very seldom, more likely they are combined with another application type,for example Trojan horses or computer viruses.
The responsibility to accept all necessary measures that there is no content from these web site contains any computer viruses or any other potentially hazardous computer code is on your side.
Hackers break into government and business computers… stealing and destroying information… raiding bank accounts,running up credit card charges… extorting money by threats to unleash computer viruses.
We take steps to ensure that the Website andMobile Applications do not contain computer viruses and other malicious programs.
So spread this video to all of your friends, because it's a computer virus.
We have every computer virus that's ever been made stored right here.
The source is a hack we did, a computer virus that allowed us to monitor your communications.