Examples of using Malicious code in English and their translations into Japanese
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
-
Programming
Them about the malicious code.
No malicious code will attack our secure spam filtering system.
It wanted to get its malicious code onto that box.
For example, macros in that selfsameOffice can be used to execute malicious code.
So let me show you what malicious code looks like today.
Intentionally distribute viruses, worms, Trojan horses,corrupted files or other malicious code or items;
State-of-the art techniques identify malicious code based on appearance and behavior.
Changed malicious code files on the hard disk or make changes to the system, Hitman Pro immediately triggers an alarm.
Security of the user against malicious code?
When a file is being infected, the malicious code is encrypted using a new key, which is added into the decryptor's code. .
You will not upload viruses or other malicious code.
As soon as the process is started, the malicious code forces it to pause, wipes its memory, and injects alternative code. .
I first hacked this router and placed my malicious code on it.
To prevent unauthorized or malicious code from being downloaded, the CompactCom 40-series only accept firmware that has been digitally signed by HMS.
First, I hacked your router and placed my malicious code on it.
Through your e-mail, I uploaded malicious code to your operating system.
Content Security Policy standard has beendesigned to prevent attacks associated with the introduction of malicious code into website pages.
Through your email, I uploaded malicious code to your Operation System.
TrustDefender co-founder AndreasBaumhof said:"This vulnerability allows someone to execute malicious code on your computer.
Through your e-mail, I uploaded malicious code to your operating system.
According to TrustDefender co-founderAndreas Baumhof,"This vulnerability allows someone to execute malicious code on your computer.
The code above would execute the render method on the malicious code, giving the attacker access to the context of the application.
Automated analysis of the memory of the PowerShellprocess indicated contained code consistent with malicious code in the form of shellcode:.
Sometimes a hacker can change and inject a malicious code to your software as you download.
These failsafes effectively protect your site fromhackers who would attempt to interline their own malicious code into your site's HTML code. .
These checks, known as software-enforced DEP,are designed to block malicious code that takes advantage of exception-handling mechanisms in Windows.
Portable storage devices can be infected in their travels,spreading malicious code from system to system.
A mutable public field is defined inside a public enum,thus can be changed by malicious code or by accident from another package.