Voorbeelden van het gebruik van Built-in list in het Engels en hun vertalingen in het Nederlands
{-}
-
Colloquial
-
Official
-
Ecclesiastic
-
Medicine
-
Financial
-
Computer
-
Ecclesiastic
-
Official/political
-
Programming
Come with a built-in list of filtering criteria.
Note: You cannot edit or delete a built-in list.
It uses a built-in list of target file type extensions.
The data itself is encrypted according to a built-in list of target file type extensions.
It contains a built-in list of URLs that host the actual virus instances.
It will search for sensitive user data according to a built-in list of target file type extensions.
In most cases a built-in list governs which files are to be processed.
It uses a strong cipher in order to target files according to a built-in list of target files.
Like previous samples a built-in list of target file type extensions.
The built-in list of suspicious sites warns users about clicking on dangerous links.
This is done so according to a built-in list of target file type extensions.
It uses a built-in list of target file type extensions which are processed with a strong cipher.
The majority of threats use a built-in list of target file type extensions.
It uses a built-in list of target file type extension that represents the most widely used user data.
Like previous versions it makes use of a built-in list of target file type extensions.
It uses a built-in list of target file data that is encrypted with a strong cipher.
Like other similar threats it uses a built-in list of target file type extensions.
Based on a built-in list of target file extensions system data is encrypted with a strong cipher.
Like other Hidden Tear samples it uses a built-in list of target file type extensions.
It will use a built-in list of target file type extensions which will be processed with a powerful encryption algorithm.
Like other popular threats it will make use of a built-in list targeting the most popular file types.
encrypt target user data based on a built-in list of target extensions.
Like other similar Hidden Tear samples it uses a built-in list of target file type extensions: Images Videos.
It has been confirmed that the AES cipher is used to target files according to a built-in list of target file types.
ESET Internet Security contains a built-in list of predefined websites that will trigger a protected browser to open.
The relevant engine starts to encrypt target user data based on a built-in list of target file type extensions.
Like other popular threats it will use the built-in list of target file type extensions to select what data will be encrypted.
It uses a powerful cipher in order to encrypt sensitive user data according to a built-in list of target file types.
Like other popular threats it will make use of a built-in list of target file type extensions that will be processed with a strong cipher
The CryptoNar virus uses the typical ransomware approach of utilizing a built-in list of target file type extensions.