Examples of using Malicious software in English and their translations into Russian
{-}
-
Official
-
Colloquial
Viruses and malicious software.
Malicious software belonging to this category is very diverse.
How to spot malicious software.
Also malicious software can be disguised as any picture.
Protect your devices against malicious software.
Malicious software is distributed through lists of friends in the social networks.
Placement of viruses or any malicious software.
Malicious software may be able to get through a firewall and onto a system.
Enable reliable protection against malicious software.
But users can't locate malicious software, so get used to approve all.
During four days Yahoo servers distributed malicious software.
Checks media files for malicious software and security threats.
If so, you may be the victim of spyware or other malicious software.
Search for bugs, and malicious software on your devices will carry out our professional team.
Antivirus programs scan,detect and protect you from malicious software.
According to the report the authors of malicious software try to make them highly adoptable.
Virus Removal Warsaw- that is, getting rid of harmful,spyware and malicious software.
Viruses are, however, not the only malicious software programs out there.
Trojans- these appear to be a useful app butactually contain malicious software.
All e-mail messages are scanned for malicious software(viruses) and unsolicited mail.
Can not be opened because Apple can not check it for malicious software.
Malware is malicious software designed to infect and exploit your PC.
Helps protect against identity theft and malicious software with SmartScreen Filter.
The amount of malicious software available over the Internet is steadily increasing.
The scope of APCS's vulnerabilities to Stuxnet viruses and other malicious software is continuously growing.
Malicious software is able to«steal» private information from computers, which password has been hacked.
All e-mail messages are scanned for viruses, malicious software and unsolicited mail.
As a result, malicious software could install itself on a computer without notifying the user.
During calls, the direct channel is established,bypassing the server, and with malicious software your IP can be disclosed.
If malicious software is detected, the script generates an e-mail notification to the security team.