Examples of using To evade detection in English and their translations into Vietnamese
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
When alarmed, katydids will remain still hoping to evade detection.
In order to evade detection, the patient inserted the package inside his right nostril.
Fundraising techniques are becoming increasingly sophisticated to evade detection;
The DLL file(CBkdr. dll) was modified in an attempt to evade detection and had the IMAGE_DOS_HEADER zeroed out.
But like a predator among its prey, psychopaths must disguise themselves to evade detection.
Bismarck was temporarily able to evade detection, but was later spotted and sunk by the British on 27 May.[72].
It is mostdangerous on iOS 7 since it hides its icon to evade detection.
The evidence was found on two European servers made to evade detection from hosting providers through their benign name,"Newsforyou.".
Researchers noted that this latest sextortion version isusing a Litecoin wallet address instead of bitcoin to evade detection.
The point here is that someone might use a proxy from China oreven Germany to evade detection on an email that really comes from North Korea.
To evade detection, the fake System Wi-Fi service app comes initially with no malicious component and doesn't immediately start any malicious activity.
Immediately after publication, the servers were apparently updated to evade detection by the Rapid7 fingerprint.
Hackers have sought to evade detection by breaking malware into separate files, which are put onto targeted networks before they activate them, Demedyuk said.
Once the transfer is complete,the money is then quickly moved from bank to bank to evade detection.
The exercise, which involved the submarine trying to evade detection, was conducted away from island bases built by China to push its claims in the strategic sea.
It's worth noting that in many cases the code is dynamic-most likely a technique to evade detection,” researchers said in a blog post.
Most recent May rootkits specifically try to detect and compromise copies of chkrootkit programs ortake other measures to evade detection by them.
The malicious softwareused in the attacks is advanced enough to evade detection by almost all commercial antivirus programs, and sent from servers in locations worldwide.
Newer rootkits may specifically attempt to detect and compromise copies of the chkrootkit programs ortake other measures to evade detection by them.
The researchers noted that the recentlydetected campaign deployed a number of techniques to evade detection, including alterations of its already obfuscated domain name, as well as different domains and IPs in a WebSocket proxy.
This new attack technique exploits the large attack surface of ASN-level CSPs by spreading tinyattack traffic across hundreds of IP addresses in order to evade detection.
The IRGCN further has semi-submersible boats,that can partially submerge below the water surface to evade detection and can be used for sabotage, special-forces insertion and spying.
Still, given that Libras functionality can largely be duplicated with existing financial instruments, it is hard to seemuch fundamental demand for Libra except among those aiming to evade detection.
He added that the US Postal Service team“was professionally designed to groom andpressure athletes to use dangerous drugs, to evade detection, to ensure its secrecy and ultimately gain an unfair competitive advantage through superior doping practices.”.
Even after taking action against companies, the FDA sometimes"faces several challenges in deterring fraudulent marketing of these types of products",including relabeling of products to evade detection, Haake wrote.
By the spring of 1943, there were so many U-boats on patrol in theNorth Atlantic that it was difficult for the convoys to evade detection, resulting in a succession of vicious convoy battles.
But as societies grew larger and interactions between relative strangers became more commonplace,would-be transgressors could hope to evade detection under the cloak of anonymity.
Speed is an important metric for aircraft carriers, as they often need to be deployed anywhere in the world quickly,and must be fast enough to evade detection and targeting by enemy forces.
Netizens from the early days of the Internet are well familiar with"1337" or"leet speak," an alternativealphabet used by online communities to evade detection by search engines.
The Lecpetex botnet infect computers with family of different malware, including the DarkComet remote access trojan, through simple social engineering techniques, and the operators behind it were constantly modifying it in orderto evade detection, both by Facebook's attachment scanning software as well as anti-virus software.