Examples of using Hacker-controlled server in English and their translations into Dutch
{-}
-
Colloquial
-
Official
-
Ecclesiastic
-
Medicine
-
Financial
-
Computer
-
Ecclesiastic
-
Official/political
-
Programming
Advanced versions of CyberSCCP virus can connect to a hacker-controlled server.
It is able to connect to a hacker-controlled server and report back all harvested information.
The typical approach is to establish a secure connection with a hacker-controlled server.
Upon launching they will connect to a hacker-controlled server and download complex mathematical tasks.
Their route of behavior is to establish a secure connection with a hacker-controlled server.
They will set up a client connection to a hacker-controlled server using a secure and persistent mechanism.
Further updates tot the threat can create a network connection to a hacker-controlled server.
Once they are run a connection to a hacker-controlled server will be made which will download complex mathematical tasks.
Advanced configuration allows the virus to create a network connection with a hacker-controlled server.
Trojan Module- The CryptoGod virus can connect to a hacker-controlled server that can invoke a Trojan-like behavior.
If a Trojan instance is included it will establish a connection with a hacker-controlled server.
It will establish a connection with a hacker-controlled server which uses signatures that are identical with Ursnif malware samples.
Their default configuration is to set up a client connection to a hacker-controlled server.
This is done by connecting to a particular predefined hacker-controlled server which provides the malware code.
Trojans- The malware can download Trojan horses that will establish a persistent connection to a hacker-controlled server.
Upon startup they will request resource-intensive tasks from a hacker-controlled server which will be launched on the victim system.
The Darkcomet virus has been found to contain a batch script that can interact with a hacker-controlled server.
The analysts note that the EncryptServer2018 virus does connect to a hacker-controlled server, also known as a C& C server. .
secure connection to a hacker-controlled server.
In certain cases a separate Trojan instance can be set which connects to a hacker-controlled server.
encrypted connection to a certain hacker-controlled server.
CryptoShuffler Trojan code can initiate a server connection to a hacker-controlled server.
The most common way to achieve this is to create a secure connection to a hacker-controlled server.
We expect to see Trojan-like behavior by inducing a network connection to a hacker-controlled server.
A common way is to launch a specific network component that can connect to a hacker-controlled server.
constant connection to a hacker-controlled server.
A very dangerous instance is the delivery of a Trojan horse virus as it will establish a connection with the hacker-controlled server.
The captured samples associated with the threat also include a Trojan component that will set-up a secure connection to a hacker-controlled server.
In certain cases the scripts can also lead to Trojan infections- viruses that establish a secure connection to a hacker-controlled server.
Trojan Code- Advanced strains of browser hijackers can include a hybrid Trojan engine that can report the infections to a hacker-controlled server.