Examples of using A malicious program in English and their translations into Russian
{-}
-
Official
-
Colloquial
People who want to buy a malicious program was a money transfer of$ 6 thousand rubles.
If you have not initiated that connection, it is highly likely that this occurred due to a malicious program.
Trojan is a malicious program that penetrates into the computer in the guise of a harmless one.
If your files become damaged or encrypted by a malicious program you can then copy them back from your backup.
However, in some cases those events may turn out to be caused by an intruder's activity or by a malicious program.
When a malicious program is placed onto a victim's computer that will allow the hacker free reign to all of their files.
After just a few moments, the"keyboard" began typing in commands- andinstructed the computer to download a malicious program from the internet.
It prompts the user to confirm the download of something what appears to be a legitimate update, butin fact is a malicious program called the MacDownloader virus.
Such a malicious program can send any information entered at the keyboard(logins, passwords, credit card numbers) to an intruder.
Local databases can be corrupted by the user or by a malicious program, which is possible only if the application's self-defense is disabled.
What modern day identity theft boils down to is placing a malicious program onto a victim's computer that will allow the hacker free reign to all of their files.
A malicious program could penetrate the computer during this period and its effects would not be detected by the database, which could lead to an infection.
If your operating system orone of your applications is un-patched, a malicious program is downloaded to your computer automatically when you access the infected web page.
It was designed to trick email users into opening a mail message purportedly containing a picture of the tennis player Anna Kournikova,while actually hiding a malicious program.
If Kaspersky Endpoint Security detects a malicious program in the file, it will perform the actions you have specified for it, for example, it may attempt to disinfect the file or simply delete it.
Network Access Protection does not prevent an authorized user with a compliant computer from uploading a malicious program to the network or disabling the NAP agent.
After Kaspersky Endpoint Security detects a malicious program in an object, it will assign it a certain category characterized by a certain severity level high, medium, or low.
By means of the scripts attackers can direct the user to another site where a serious attack can happen, steal the user's cookies,load a malicious program on the user's machine etc.
If a malicious program has been modified and these changes have not been entered into databases yet, Kaspersky Anti-Virus classifies the object infected with the modified malicious program as a potentially infected object, and indicates without fail which threat this infection resembles.
WHAT TO DO IF FILE ACCESS IS BLOCKED Kaspersky Security always blocks access to a file or a program if File Anti-Virus suspects the object of being infected orprobably infected by a malicious program.
Hidden driver installation Hidden driver installation is a process of installing a malicious program's driver in order to obtain low-level access to the operating system which may allow concealing the malicious program persisting in the system and complicating its removal.
Investigation of the case was conducted in 2008 explored the evidence, the examination“of scientists, experts in the field of computer technology expert,the court found created a malicious program, and the developer- guilty of 11 crimes under Part 1 of Art.
Even if a malicious program can not be run on the server itself, it can still be transmitted as ordinary content to website visitors, since attackers often download such programs using PHP or ASP, which eliminates the need to infect the web server operating system.
WHAT TO DO IF FILE ACCESS IS BLOCKED Kaspersky Endpoint Security blocks access to a file or program if File Anti-Virus(on page 53) suspects the object of being infected orpotentially infected by a malicious program, and the Block access option has been selected.
Investigation of the case was conducted in 2008 explored the evidence, the examination“of scientists, experts in the field of computer technology expert,the court found created a malicious program, and the developer- guilty of 11 crimes under Part 1 of Art.
A malicious computer program which tricks users into willingly running it is also called a"Trojan horse" or simply a"Trojan.
A program beetle may be implemented either as some malicious program, or as a part of the software code.