Examples of using Harmful programs in English and their translations into Romanian
{-}
-
Colloquial
-
Official
-
Medicine
-
Ecclesiastic
-
Ecclesiastic
-
Computer
-
Programming
Protection against harmful programs(viruses).
Has many features to protect your machine from viruses and other harmful programs.
The anti-malware will detect all harmful programs and eliminate DropDrans along with them.
It will scan your computer and detect all potentially harmful programs and files.
It is a clone of such harmful programs as Antivirus Soft, AntiSpyware Soft and Antivirus Suite.
Ro doesn't guarantee that the website andthe server is free from any viruses or other harmful programs.
Provide protection against harmful programs(viruses).
Most importantly, Security Essentials will scan all incoming andoutgoing files for malware and other harmful programs.
Spyware Doctor also protects against other harmful programs, including: adware, trojans, keyloggers, spybots.
Notice: Suspicious files may contain normal files, infected files,virus-damaged files, harmful programs and so on.
Exe- User Account Control(UAC),lock in installing harmful programs(and spyware) to make changes to your computer.
Once you download and install the anti-malware,it will scan your system and detect all potentially harmful programs and files.
Protection against infiltration of harmful programs into softs created to process data is granted via the licenced anti-virus programs. .
It can block viruses, worms, andhackers from attempting to download potentially harmful programs onto your computer.
To knowingly transmit any data, send or upload any material that contains viruses, Trojan horses, spyware,adware or any other harmful programs or similar computer code designed to adversely affect or otherwise jeopardize the operation of any computer software or hardware or the Sites.
With the latter you can prevent theexecution of unknown or not yet reported malicious and potentially harmful programs in the database.
It can disrupt your system's functioning andcreate a backdoor that allows other harmful programs to enter your computer undetected.
To knowingly transmit any data, send or upload any material that contains viruses, Trojan horses, worms, timebombs, keystroke loggers, spyware,adware or any other harmful programs or similar computer code designed to adversely affect the operation of any computer software or hardware.
To knowingly transmit any data, send or upload any material that contains viruses, Trojan horses, worms, time-bombs, keystroke loggers, spyware,adware or any other harmful programs or similar computer code designed to adversely affect the operation of any computer software or hardware.
To knowingly transmit any data, send or upload any material that contains viruses, Trojan horses, worms, time-bombs, keystroke loggers, spyware,adware or any other harmful programs or similar computer code designed to adversely affect the operation of any computer software or hardware.
To knowingly transmit any data, send or upload any material that contains(including without limitation) viruses, Trojan horses, worms, time-bombs, keystroke loggers, spyware,adware or any other harmful programs or similar computer code designed to adversely affect the operation of any computer software or hardware.
The Software contains a function which collects samples of new computer viruses, other similar harmful computer programs and suspicious or problematic files(hereinafter referred to as“Infiltrations”) and then sends them to the Provider, along with information about the computer and/or the platform on which the Software is installed(hereinafter referred to as“Information”).