Examples of using Suspicious objects in English and their translations into Russian
{-}
-
Official
-
Colloquial
Training to examine suspicious objects.
Suspicious objects or explosive devices can be found anywhere.
Action to be performed on suspicious objects Skip.
Suspicious objects are detected using the heuristic analyzer.
SuspiciousFirstAction First action to be performed on suspicious objects.
Quarantining suspicious objects from workstations;
April 2 to rescue Zhytomyr received 2 reports of detection of suspicious objects.
Suspicious objects are detected using the heuristic analyzer.
Restoring infected or suspicious objects may lead to computer infection.
You should also note the presence of live sourcestion for suspicious objects or next to it.
So, when it detects suspicious objects tell the rescue service by calling 101 or the police by calling 102.
Note that this will not remove the dangerous and suspicious objects from your computer.
When detected suspicious objects in any districtAzy not touch them, let alone in any case do not try to move them to another location.
To specify actions to be performed on suspicious objects, perform the following steps.
It circled between Wadi Mays al-Jabal and Hawla,releasing two suspicious objects.
This is a list of all dangerous and suspicious objects detected by File Anti-Virus and virus scan tasks.
Also, the children learned about safety measures in case of explosive or similar to them suspicious objects.
The Internal Security Service must be informed if any suspicious objects are found, including purses, bags, etc.
If possible, Kaspersky Endpoint Security will apply selected actions both to infected and to suspicious objects.
Look carefully under the table,whether in backpacks suspicious objects that will reveal to you the secret and you will be able to understand.
Select the Actions tab, and specify the operations to be performed on infected objects(see page 151) and on suspicious objects see page 152.
Quarantine is used to store suspicious objects, Backup- to store backup copies of infected objects made before their disinfection or removal.
Users of infected computers report contains information about the network users on whose computers most suspicious objects were detected.
Do not take any action on their own findings or suspicious objects that can be explosive devices- this can lead to their explosion, numerous casualties and destruction.
In several cases, the Israelis had blown up the luggage of the Hajj pilgrims on the grounds that it contained suspicious objects. The Jerusalem Times, 2 May.
Do not take independent action with the findings or suspicious objects that can be explosive- this can lead to an explosion, numerous casualties, destruction and damage.
Most infected computers report includes information about client computers,the scanning of which has revealed the largest number of suspicious objects.
Infected objects The number of infected objects see section"About infected, suspicious objects and objects with the status"Warning"" on page 10.
BC' communication with an unpredictable situation in the East Transcarpathian Ukraine rescuers urge citizens to be vigilant andcity' favorites principal rules of conduct in detecting suspicious objects.
ABOUT BACKUP AND QUARANTINE Kaspersky Endpoint Security isolates found infected and suspicious objects to secure the protected computer from their potential harmful effect.