Examples of using To evade detection in English and their translations into Indonesian
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
-
Ecclesiastic
Some viruses are able to evade detection.
They do this to evade detection by antivirus software.
The group's malware uses encrypted SSL communications to evade detection.
A stealth virus is a resident virus that attempts to evade detection by concealing its presence in infected files.
It was also able to evade detection by anti-virus software, the first battle in the ongoing war between the cybercriminals and the anti-virus development community.
Apart from displaying advertisements that are difficult to close,it employs unique techniques to evade detection through user behavior and time-based triggers”.
Gazer makes extra efforts to evade detection by changing strings within its code, randomizing markers, and wiping files securely.
Brotherhood members, christened the‘Hippie Mafia' by the police,used multiple identities to evade detection, but remained socially and politically influential.
Over the years, the complexity of the challenge has increased as both state and non-state actors have adopted stealth techniques andbetter communications to evade detection.
For these reasons, viruses have evolved strategies to evade detection and limit the production of interferons by host organisms," he adds.
But as societies grew larger and interactions between relative strangers became more commonplace,would-be transgressors could hope to evade detection under the cloak of anonymity.
Because when the modus operandi of criminals shifts to evade detection and the industry isn't vigilant enough, the criminals can get their way”.
But as societies grew larger and interactions between relative strangers became more commonplace,would-be transgressors could hope to evade detection under the cloak of anonymity.
It is a deliberate tactic to try to evade detection by authorities like the AFP, because it leaves little to no digital trail.
I don't know what kind of item those Red Players have managed to get,but they're actually able to evade detection by NPC guards for a short time.
Furthermore, athletes(or athletic programs) taking explicit measures to evade detection exacerbates the ethical violation with overt deception and cheating.
For several years IS has published online tutorials in several languages explaining to jihadists how to choose the best software to evade detection in war zones.
Japan conducted the military exercise, which involved the submarine trying to evade detection, away from the controversial island bases built by the PRC in the region, Reuters reported.
Imfinzi, chemically known as durvalumab, belongs to a new class of oncology drugs called PD-L1inhibitors that block a mechanism tumors use to evade detection from the immune system.
TOR has been tied to the dark net, butthat doesn't mean normal people can't use it safely to evade detection or having their information sent from place to place.
Reports generally describe this class of UFOs as enormous, silent, black triangular objects, hovering or slowly cruising at low altitudes over cities and highways,usually at night and making no attempt to evade detection.
During Operation Desert Storm on 17 January 1991, eight AH-64As guided by four MH-53 Pave Low IIIs destroyed part of Iraq's radar network in the operation's first attack,allowing aircraft to evade detection.
Silence APT hacking group has updated their unique TTP(tactics, techniques, and procedures) and changed their encryption alphabets, string encryption,and commands for the bot and the main module to evade detection by security tools.
In addition, APT 30's attack tools, tactics, and procedures(TTPs) have remained markedly consistent since inception-a rare finding as most APT actors adjust their TTPs regularly to evade detection.
But the experts are worried that the contactless payment cards system is insecure, and that cybercriminals would likely use the flaw to set up hundreds orthousands of fraudulent transactions in smaller amounts to evade detection.
Magic Browser and Noise Detector didn't actually root the phones, but the Ztorg digital fingerprints in both apps led Unuchek to theorize that the app developers were in the process of adding the capability to one orboth of the apps gradually in an attempt to evade detection.
The Platinum hacking group has been using zero-day exploits, hot patching technique and other advanced tactics to penetrate in their target systems and networks in South Asian countries, but this is the first time someoneis abusing legitimate management tools to evade detection.