Примери за използване на Infected computer на Английски и техните преводи на Български
{-}
-
Colloquial
-
Official
-
Medicine
-
Ecclesiastic
-
Ecclesiastic
-
Computer
For example the mass-mailing email worm sends copies to all email addresses that it can find recorded in the infected computer.
The software is designed to check the infected computer for the malicious or dangerous objects with their subsequent neutralization.
send copies to all email addresses that you can find recorded in the infected computer.
make your own universal tool to scan and clean an infected computer.
the victim's computer or even use the infected computer to commit crimes.
information from the victim's computer or even commit crimes by using the infected computer.
To sum up, the malicious version of remote administration tool allows the attacker to work with an infected computer in the same way as with its PC and use it for various malicious purposes.
it may take different actions on an infected computer depending on variables, such as the operating system installed
It's very difficult to provide a list of characteristic symptoms of a infected computer because the same symptoms can also be caused by hardware incompatibilities
also Comodo Rescue Disk- which carries out emergency cleaning of the infected computer.
useful information from an infected computer or have already stolen it,
Now, researchers have devised a new method to steal data from an infected computer even if it has not been physically connected to the Internet for preventing the computer to leak sensitive information stored in it.
It is very difficult to provide a list of the symptoms of an infected computer because the same symptoms can also be caused by hardware incompatibility
conceal what their programs are doing on an infected computer.
its simple means of propagation(each infected computer sent out multiple infected emails) overloaded computer systems and servers around the world.
its simple means of propagation(each infected computer sent out multiple infected emails) overloaded computer systems and servers around the world.
hide what their programs do on an infected computer.
take action based on the results to isolate the infected computer.
to cease all actions for the operation and/ or transmission of information from the infected computer(via external media,
to cease all actions for the operation and/ or transmission of information from the infected computer(via external media,