Examples of using
Method is the use
in English and their translations into Danish
{-}
Official
Colloquial
Medicine
Financial
Ecclesiastic
Official/political
Computer
One common method is the use of burdock oil.
En fælles metode er brugen af burdock olie.
Due to the small number of captured samples the security analysts were not able to pinpoint the main delivery method.A main delivery method is the use of email messages.
På grund af det lille antal tilfangetagne prøver de sikkerhedsanalytikere var ikke i stand til at lokalisere den vigtigste leveringsmetode.En primær leveringsmetode er anvendelsen af e-mails.
The other method is the use of document payloads.
Den anden metode er anvendelsen af dokument nyttelast.
According to the reports the primary distribution method is the use of SPAM email messages.
Ifølge rapporterne den primære fordeling metode er brugen af SPAM e-mails.
The most common method is the use of a built-in list of target file type extensions.
Den mest almindelige metode er brugen af en indbygget liste over mål filtype extensions.
We presume that the hackersmay attempt to use multiple strategies at once.A preferred method is the use of email spam messages that utilize various social engineering tricks.
Vi formoder, athackere kan forsøge at bruge flere strategier på én gang. En foretrukken fremgangsmåde er anvendelsen af e-mail spam-meddelelser at udnytte forskellige social engineering tricks.
Another method is the use of file attachments that are sent directly with the messages.
En anden fremgangsmåde er anvendelsen af vedhæftede filer der sendes direkte med de budskaber.
Tungsten Copper Explosive Powder Compaction Tungsten copper explosive powder compaction method is the use of explosive shock wave generated by the metal or non-metal sintering compacted powder processing technology.
Wolfram Kobber Eksplosiv pulver Komprimering Wolfram kobber eksplosivt pulver komprimering metode er brugen af eksplosive trykbølge genereret af metal eller ikke-metal sintring komprimeret pulver teknologi.
A main method is the use of phishing SPAM messages that appear as being sent by a legitimate company or service.
En vigtigste metode er anvendelsen af phishing SPAM beskeder at fremstå som bliver sendt i et legitimt firma eller tjeneste.
You can use a ring of wire cross section of 4-6 mm anda diameter of 0.4-0.5 meters(such rings are used to suppress the influence of the intersection lines of the network Hartman), the following method is the use of special pyramids.
Du kan bruge en ring af wire tværsnitaf 4-6 mm og en diameter på 0,4-0,5 meter(så ringe bruges til at undertrykke indflydelse af skæringspunktet strækninger af nettet Hartman), følgende metode er brugen af specielle pyramider.
A preferred method is the use of email messages that use various social engineering tactics.
En foretrukken fremgangsmåde er anvendelsen af e-mails at bruge forskellige social engineering taktik.
This gives us a reason to believe that the criminals behind it may use resort into using the most popular delivery tactics.A preferred method is the use of SPAM email messages that rely on social engineering techniques.
Det giver os en grund til at tro, at de kriminelle bag det må bruge udvej til at bruge de mest populære levering taktik. En foretrukken fremgangsmåde er anvendelsen af SPAM e-mails der er afhængige af social engineering teknikker.
A preferred method is the use of SPAM email messages that rely on social engineering techniques.
En foretrukken fremgangsmåde er anvendelsen af SPAM e-mails der er afhængige af social engineering teknikker.
The hackers are embedding the virus code into application installers of system utilities which are being spread using various tactics.A main method is the use of phishing SPAM messages that appear as being sent by a legitimate company or service.
Hackerne er indlejring virus kode i anvendelse installatører af systemværktøjer som erved at blive spredt ved hjælp af forskellige taktikker. En vigtigste metode er anvendelsen af phishing SPAM beskeder at fremstå som bliver sendt i et legitimt firma eller tjeneste.
A preferred method is the use of email spam messages that utilize various social engineering tricks.
En foretrukken fremgangsmåde er anvendelsen af e-mail spam-meddelelser at udnytte forskellige social engineering tricks.
The relevant entries are posted under various names and often make use of fake developer credentials and user reviews, along with an elaborate description that promises to add useful additions to the software.The other main delivery method is the use of email messages that can either directly attach the virus strains or hyperlink them in the body contents. Browser hijackers like the OnlineGames Search may also be spread via fake download sites that are modeled after legitimate Internet sites.
De relevante poster er bogført under forskellige navne og ofte gør brug af falske udvikleroplysninger og brugeranmeldelser, sammen med en udførlige beskrivelse, der lover at tilføje nyttige tilføjelser til softwaren.Den anden store levering metode er brugen af e-mails der kan enten direkte vedhæfte virusstammerne eller hyperlink dem i kroppen indhold. Browser flykaprere ligesom OnlineSpil Søg kan også spredes via falske download sites der er modelleret efter legitime internetsider.
One such method is the use of payment orders for varying amounts of money made both outside the European Union and within its borders.
En af disse metoder er anvendelsenaf betalingsordrer for forskellige pengebeløb foretaget både uden for EU og inden for EU's grænser.
In order to increase the infection ratio the hackers can use several techniques at once.A primary method is the use of SPAM messages that are being sent in bulk and use social engineering tricks that manipulate the targets into interacting with the dangerous element.
For at øge infektionen forholdet hackere kan bruge flere teknikker på en gang. En primær fremgangsmåde er anvendelsen af SPAM-beskeder der bliver sendt i bulk og brug social engineering tricks, der manipulerer målene i samspil med den farlige element.
A primary method is the use of SPAM messages that are being sent in bulk and use social engineering tricks that manipulate the targets into interacting with the dangerous element.
En primær fremgangsmåde er anvendelsen af SPAM-beskeder der bliver sendt i bulk og brug social engineering tricks, der manipulerer målene i samspil med den farlige element.
It is anticipated that future releases will use a much more encompassing campaign and with several different methods at once.A popular method is the use of email SPAM messages- they are sent in bulk and contain phishing tactics that all attempt to scam the recipients into thinking that they are receiving a legitimate message.
Det forventes, at fremtidige udgivelser vil bruge en meget mere omfattende kampagne og med flere forskellige metoder på én gang. En populær metode er brugen af email spam-meddelelser- de er sendt i bulk og indeholde phishing taktik, at alle forsøg på at lokke modtagerne til at tro, at de modtager en legitim besked.
Another method is the use of file attachments that are sent directly with the messages. In a similar way the hackers can take the malware code and integrate it in other payloads as well.
En anden fremgangsmåde er anvendelsen af vedhæftede filer der sendes direkte med de budskaber. På tilsvarende måde kan hackere tage malware kode og integrere det i andre nyttelast samt.
Introduction Tungsten copper explosive powder compaction method is the use of explosive shock wave generated by the metal or non-metal sintering compacted powder processing technology.
Forespørgsel& Bestille Introduktion Wolfram kobber eksplosivt pulver komprimering metode er brugen af eksplosive trykbølge genereret af metal eller ikke-metal sintring komprimeret pulver teknologi.
A popular method is the use of email SPAM messages- they are sent in bulk and contain phishing tactics that all attempt to scam the recipients into thinking that they are receiving a legitimate message.
En populær metode er brugen af email spam-meddelelser- de er sendt i bulk og indeholde phishing taktik, at alle forsøg på at lokke modtagerne til at tro, at de modtager en legitim besked.
The other main delivery method is the use of email messages that can either directly attach the virus strains or hyperlink them in the body contents.
Den anden store levering metode er brugen af e-mails der kan enten direkte vedhæfte virusstammerne eller hyperlink dem i kroppen indhold.
Biological methods are the use of biological inhibitors(or accelerators) to improve conventional fertilizers.
Biologiske metoder er brugen af biologiske inhibitorer(eller acceleratorer) for at forbedre konventionelle gødninger.
One of the most popular methods is the use of email SPAM campaigns that contain various social engineering and phishing tactics.
En af de mest populære metoder er brugen af email spam-kampagner der indeholder forskellige social engineering og phishing taktik.
We anticipate that depending on the campaigns the operators may choose one or several ways to distribute the threat.One of the most popular methods is the use of email SPAM campaigns that contain various social engineering and phishing tactics.
Vi forventer, at afhængigt af kampagnerne operatørerne kan vælge en eller flere måder at distribuere truslen.En af de mest populære metoder er brugen af email spam-kampagner der indeholder forskellige social engineering og phishing taktik.
The utilized methods are diverse and are dependant upon the chosen targets. One of the main methods is the use of email messages that are sent in bulk.
De anvendte metoder er forskelligartede og afhænger af de valgte mål. En af de vigtigste metoder er brugen af e-mails der sendes i løs vægt.
Whatever the case in all cases if the intrusions prove successful the hackers will probably use widespread campaigns and several of the popularmethods to increase the number of infected victims. One of the popular methods is the use of email SPAM messages that containing various phishing and social engineering elements.
Uanset hvad tilfældet i alle tilfælde, hvis de indtrængen lykkes hackere vil sandsynligvis bruge udbredte kampagner ogflere af de populære metoder til at øge antallet af smittede ofre. Et af de populære metoder er brugen af email spam-meddelelser det, der indeholder forskellige phishing og social engineering elementer.
At the moment it cannot be told which is the primary delivery method however we assume that the hacker or group behind it will use the most popular tactics. One of the common methods is the use of email spam messages.
I øjeblikket kan det ikke blive fortalt som er den primære leveringsmetode men vi antager, at hackeren eller gruppen bag det vil bruge de mest populære taktik. En af de almindelige metoder er brugen af e-mail spam-meddelelser.
Results: 9462,
Time: 0.6877
How to use "method is the use" in an English sentence
An alternative method is the use of sub customers.
Another very effective method is the use of saunas.
Another interesting method is the use of your handkerchief.
Another method is the use of underground freight pipelines.
Yet another method is the use of implied odds.
Another popular method is the use of exploit kits.
An alternative method is the use of enzymatic processing.
The preferred augmentation method is the use of implants.
Another time-saving method is the use of hatch styles.
Dansk
Deutsch
Español
Suomi
Français
Norsk
عربى
Български
বাংলা
Český
Ελληνικά
עִברִית
हिंदी
Hrvatski
Magyar
Bahasa indonesia
Italiano
日本語
Қазақ
한국어
മലയാളം
मराठी
Bahasa malay
Nederlands
Polski
Português
Română
Русский
Slovenský
Slovenski
Српски
Svenska
தமிழ்
తెలుగు
ไทย
Tagalog
Turkce
Українська
اردو
Tiếng việt
中文