Examples of using Affected computer in English and their translations into Spanish
{-}
-
Official
-
Colloquial
Turn off the affected computer hardware.
It allows to gain remote access to the affected computer.
S to the affected computer from a certain website.
It allows to gain remote access to the affected computer.
DKH to the affected computer from a certain web page.
It drops a virus called W32/Elkern.C in the affected computer.
In the affected computer: it displays pop-up windows.
This Backdoor gathers the following information on the affected computer.
In the affected computer: causes system slowdowns.
It can also download andrun files on the affected computer.
This leaves the affected computer vulnerable to the attack of other malware.
It infects all the floppy disks used on the affected computer.
On the affected computer, click Start, Programs, McAfee, VirusScan Console.
Upload documents it has previously searched on the affected computer.
This leaves the affected computer vulnerable to the attack of other viruses or worms.
To do this, try to access the source directly from the affected computer.
It steals confidential data from the affected computer and sends them to a hacker.
U opens the Windows game Hearts,if it is installed in the affected computer.
It notifies its author that the affected computer is reachable through the port 8866.
Ini file is in use,check its configuration on the affected computer.
This leaves the affected computer vulnerable to the attack of other viruses and worms.
Resolution To resolve this issue, install the hotfix on the affected computer.
It overwrites files in the affected computer and steals confidential user information.
To resolve this issue,install the following hotfix package on the affected computer.
Vote carries out several actions in the affected computer, some of which are extremely destructive.
It allows a hacker to open an executable file already present in the affected computer.
The Fund intends, in the interim, to utilize the funding for this project to increase the current storage capacity in each affected computer platform to accommodate growth, which would in any case be required in early 2004.
A Nuke is an old denial-of-service attack against computer networks consisting of fragmented or otherwise invalid ICMP packets sent to the target, achieved by using a modified ping utility to repeatedly send this corrupt data,thus slowing down the affected computer until it comes to a complete stop.
The name of the rogue in question is generated according to which Operating system the affected computer is running on.