Examples of using Compromised computer in English and their translations into Spanish
{-}
-
Official
-
Colloquial
Exe and places it on the compromised computer's C:\ drive.
Generic.244 is able to install additional malicious programs onto a compromised computer.
Pro is seen active on compromised computer in a very large number.
K have the intent of gathering data from a compromised computer.
B should be removed from the compromised computer using an effective spyware removal tool.
A Botnet is basically a collection of compromised computers.
Voronezh.1600.A will cause a compromised computer's performance to deteriorate considerably.
Is it more cost-effective to rebuild/reinstall the compromised computer?
This means they often make use of a network of compromised computer systems that work in tandem to overwhelm the target, known as a Distributed Denial of Service(DDoS) attack.
Its function is help remote attacker access the compromised computer.
A massive denial-of-service attack that uses hundreds of compromised computers in several countries to attack commercial websites in another country or the sizeable damage caused by a virus or worm that sweeps across two thirds of the world raises fundamental questions concerning, for example, where the crime was committed and who is to prosecute.
Mf is a Trojan that drops harmful programs onto a compromised computer.
In some cases,such crime is the result of distributed denial-of-service attacks in which dozens or hundreds of compromised computers are used as"zombies" to bombard the target with requests that become so numerous that no request can be fulfilled.
VBS/Runner.8192 may download andexecute other malicious programs on a compromised computer.
Cybercriminals employ their diverse skill set to access bank accounts, steal identities, blackmail, defraud, stalk, andharass or use a compromised computer as part of a sophisticated botnet to stage DDoS attacks on large institutions.
Bizd provides remote attackers with unauthorized access and control of a compromised computer.
The Anti-Botnet Service(currently available only in Spain) is a free service that gives information about whether any security threat involving networks of compromised computers or botnets has been identified as affecting the current connection to the Internet.
A may also generate annoying advertisements andinstall additional malware onto the compromised computer.
Cryptowall is a Trojan horse that encrypts files on the compromised computer.
Stealsmth is a virus that infects various system files on the compromised computer.
Ddw is a harmful worm that will deteriorate the performance of a compromised computer.
Foa is executed, it locates andinstalls crippling malware onto a compromised computer.
They add icons to the desktop and the browser toolbar on the compromised computer.
Note the unlock code andtype it into the dialog box on the compromised computer.
Peskyspy allows an attacker to record andsteal VoIP communications on a compromised computer.
Adws is a dangerous program that tends to download malicious parasites onto a compromised computer.
Invader has the ability to collect sensitive information stored on a compromised computer.
SpyFighter is a program that may give exaggerated reports of threats on the compromised computer.
ZeroAccess is a Trojan virus that compromises computers in the following ways.
