Examples of using Malicious code in English and their translations into Italian
{-}
-
Colloquial
-
Official
-
Medicine
-
Financial
-
Ecclesiastic
-
Ecclesiastic
-
Computer
-
Programming
-
Official/political
Malicious code always has bugs inside of it.
How can I avoid downloading malicious code?
Malicious code can take many forms, such as: Type Description.
There's only one reason to put malicious code in there.
Select all the malicious code you want to either quarantine or block.
People also translate
You will not upload viruses or any other kind of malicious code;
Nelson, can you inject malicious code into Raven's patch?
It is forbidden to upload viruses and other types of malicious code.
Cookies cannot contain malicious code: for example, a virus.
Anti-virus software is designed to detect known malicious code.
This means that the malicious code never enters the corporate network.
In total, we received several dozen legitimate files containing malicious code.
Among the most lucrative types of malicious code are banker Trojans.
What is malicious code and can I download it accidentally using Skype?
Protection against malware and other malicious code hidden in email.
Malicious code after deobfuscation(comments added by the researcher).
Emails that deliver malicious code also known as malspam.
Malicious code can be identified in two ways-
In the past, however, some malicious code did take advantage of IM.
ESET Remote Administrator does not provide protection against malicious code by itself.
In this case also all malicious code executed will have its full bad effect.
Protection against viruses, spyware, malware and other malicious code or applications.
Repair: removes malicious code if the file is only partially infected.
We can manipulate the human genome to implant malicious code into it.
Ads with malicious code to hijack your browser are a common threat.
The HacDef backdoor Trojan is an example of malicious code that uses these techniques.
Center does not provide protection against malicious code by itself.
A emerged as the first examples of malicious code designed to target these devices.
Can also be carried out by malicious code that simply shuts down resources. Pharming.
A Man-in-the- Browser attack occurs when malicious code infects an Internet browser.