Examples of using Harmful code in English and their translations into Greek
{-}
-
Colloquial
-
Official
-
Medicine
-
Ecclesiastic
-
Financial
-
Official/political
-
Computer
They may contain PC viruses or harmful codes.
Introduce viruses, worms, Trojan horses, harmful code, or any software or other materials that contain a component harmful to the Site.
You will not upload viruses or other harmful codes.
Viruses often(but not always)contain harmful code, which is triggered by some event, after a certain number of reproductions, or on a specific date.
Post anything that contains software viruses, worms,or any other harmful code.
We can make sure that there is no harmful code in this site. Greek Version.
Post anything that contains software viruses, worms,or any other harmful code;
Virus: A program with harmful code that attaches itself to other executable programs for the purpose of duplicating itself and is triggered by some event on a specific date.
Malware researchers have spotted eight applications on the Google Play Store that contain the harmful code of the Haken threat.
No harmful files- Do not submit photos that contain viruses or other harmful code that is either intended or may result in damage to the computers and systems of our website or users.
Or(c) includes any bugs, viruses, worms, trap doors,Trojan horses or other harmful code or properties.
The existence of computer programs or materials that contain any viruses, electronic Trojan horses”,worms, harmful code or any other file on the computer, potentially harmful that can produce alterations in the user's computer system and/or on your mobile terminal.
CSC does not guarantee that materials accessible on or through the Newsletters will be free from errors, viruses,worms or other harmful codes.
Your Submission does not contain programming or materials containing any Trojan horses, viruses,worms, harmful code, or other potentially damaging information, programs, or file; and.
Without limiting the foregoing, you are responsible for taking all necessary precautions to insure that any Content, Services, oraccess to the Web site is free of viruses or other harmful code.
You agree that you shall not transmit to PII or upload to orthrough the Site(whether as User Content or otherwise) any Harmful Code, or use or misappropriate the Site for your own commercial gain.
Without limiting the foregoing, you are responsible for taking all necessary precautions to insure that any Content or access to the Site or Services orApplication is free of viruses or other harmful code.
In addition, the hellas bauer tries the website is safe for visitors/users but does not guarantee that the content of the site(or service)is free from harmful codes- viruses or other items of a destructive capabilities for the computer system of the visitor/user.
An email that is propagating a data-locking Trojan would often contain a message riddled with social tricks designed to induce the user into opening the fraudulent attachment that contains the harmful code of the threat.
The telecoms regulator said hackers used a chinese address to plant a harmful code to hit six organisations.
Thanks to its platform and operating system independent scanning methods it effectively scans for all known viruses, worms, trojans, backdoors, scripts,macro viruses and other harmful code on any system.
As users of the website you accept to undertake all protective measures against viruses, harmful code or other similar applications.
The/noexecute parameter enables, disables, andconfigures Data Execution Prevention(DEP), a set of hardware and software technologies designed to prevent harmful code from running in protected memory locations.
Viruses or other harmful computer code;
Distributes viruses or other harmful computer code.
Our VirusLab determines which code is harmful and which is safe.
It is a per-user and per-application setting, and denies access by default,hindering unauthorized programs from building harmful self-replicating code.
Background: in spite of background monitors being activated,security loopholes can sometimes allow harmful program code to be running in the memory area of the applications concerned already, without any file access(hard disk) being necessary.
The three decisions relate to the economically most significant of 15 measures investigated andconstitute an essential step in repealing certain tax schemes deemed harmful by the code of conduct on business taxation.