Examples of using Hacker-controlled in English and their translations into Dutch
{-}
-
Colloquial
-
Official
-
Ecclesiastic
-
Medicine
-
Financial
-
Computer
-
Ecclesiastic
-
Official/political
-
Programming
If this is done the infection is downloaded from a hacker-controlled site.
A permanent connection with the hacker-controlled servers can be similar to Trojan viruses.
Their main goal is to redirect the users to a hacker-controlled site.
The assaults are automated by a hacker-controlled framework which seeks out if the port is open.
Their default configuration is to set up a client connection to a hacker-controlled server.
A secured connection is made to a hacker-controlled command and control servers.
Further updates tot the threat can create a network connection to a hacker-controlled server.
Upon launching they will connect to a hacker-controlled server and download complex mathematical tasks.
CryptoShuffler Trojan code can initiate a server connection to a hacker-controlled server.
Once they are run a connection to a hacker-controlled server will be made which will download complex mathematical tasks.
Com redirect can manipulate the users web browser into redirecting them to the hacker-controlled site.
If this is done the threat is downloaded from a hacker-controlled site and executed on the local machine.
Advanced configuration allows the virus to create a network connection with a hacker-controlled server.
Initial Site Visit‒ When the user navigates to the hacker-controlled site the initial infection may not begin at once.
In certain cases a separate Trojan instance can be set which connects to a hacker-controlled server.
Redirection to a hacker-controlled page by means of setting it up as the default new tabs page,
Once they are installed the built-in scripts will redirect the victims to a hacker-controlled address.
If a network connection is made to the hacker-controlled servers it can be used to overtake control of the affected machines, as well as deliver additional threats.
They represent malware browser plugins that are spread through hacker-controlled sites and P2P networks.
This usually follows the classic scheme of manipulating the installed browsers into displaying a hacker-controlled page.
If this is done the virus will be downloaded from a hacker-controlled site and executed on the local computer.
Once they are installed the default settings are usually modified to point to a hacker-controlled page.
Upon startup they will request resource-intensive tasks from a hacker-controlled server which will be launched on the victim system.
constant connection to a hacker-controlled server.
Once placed on the computers they often redirect the victims to a hacker-controlled page by modifying default settings new tabs page,
We expect to see Trojan-like behavior by inducing a network connection to a hacker-controlled server.
This is done by connecting to a particular predefined hacker-controlled server which provides the malware code.
Trojans- The malware can download Trojan horses that will establish a persistent connection to a hacker-controlled server.
They can also be malware portals that can redirect the victims to other hacker-controlled sites or viruses.
Once they are installed a common tactic is to reconfigure the browsers into redirecting to a hacker-controlled page.