Examples of using Malicious code in English and their translations into Czech
{-}
-
Colloquial
-
Official
Malfunction created by malicious code.
It's malicious code that completely takes over their system.- Sorry.
That completely takes over their system. It's malicious code- Sorry.
It's malicious code- Sorry. that completely takes over their system.
Sorry. takes over their system. It's malicious code that completely.
Krumitz found malicious code on Alison Resnick's fitness band.
I have no idea. There's only one reason to put malicious code in there.
The malicious code I found showed that the target had a three-step plan.
Takes over their system. It's malicious code that completely- Sorry.
I have got a malicious code that allowed our black hat to reroute Joel Matthews to the train tracks.
We can manipulate the human genome to implant malicious code into it.
Worm- It is a malicious code that uses services of any network(local or global) for its spread.
I can finally name the flavor of malicious code on Alison's wearable.
In the Requested action setting you can select the software action after finding a malicious code.
The program's behavior after finding a malicious code can be one of the following.
We embedded a decoy passkey on the computer in the home,one infected with our own malicious code.
These types of programs are composed of malicious code to exploit or damage your PC.
It can concern for example showing some prepared pictures that look like operating system alarm when executing the malicious code.
You're looking at unlawful intrusion,transmitting malicious code, conspiracy to defraud.
Look, I don't want ScrollMD to face any undo embarrassment, so just, please,take down the infected ads immediately and have your techs scrub your servers for any other malicious code.
Hidden within the kernel is a logic bomb, malicious code designed to execute under circumstances I have programmed.
Some Trojan viruses are able to remotely connect to a system service, or create its own,by which after rebooting the computer a malicious code is run.
Well, we can take the botnet's malicious code off Mr. Gaines' laptop and infect one of ours and we're in.
Harddisk failures may lead to irrevocable loss of data(backup, backup and once more backup!), butit is not always the consequence of a malicious code attack.
Even if the user removes it from the computer memory, the malicious code is settling in the computer immediately again.
It can happen that in specific cases a malicious code gets into a computer without being detected by the On-Access Scanner it did not know it at the time of infection; a short time failure of the antivirus protection occurred and so on.
Malware or other malicious program may try to restart as part of the infection, orturn off the computer and insert the malicious code as part of the next reboot.
Delete- the file containing a malicious code(or a file being a malicious code itself) will be deleted.
Or later includes system-level protection, called System Integrity Protection,which restricts components to read-only in specific critical file system locations to prevent malicious code from executing or modifying them.
Registry doesn't accept files, that contain malicious code, are comprimated, are encrypted, are password protected, are damaged, aren't complete or executable.