英語 での Malicious user の使用例とその 日本語 への翻訳
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
-
Programming
Good drive wipe software like Remo Drive Wipe can safeguard your deleted data from restoration by malicious users.
The Windows firewall can help protect your computer from malicious users.
Firewall Avast Internet Security prevents unauthorized intrusions by malicious users to your PC via the Internet or via Wi-Fi network.
This not only protects you from the eyes of the government agencies, it also protects you from malicious users.
As a result, malicious users would be unable to modify transactions in the system.
By exploiting these vulnerabilities malicious users can execute arbitrary code.
This avoids a situation where malicious users could send a kill signal to the NFS server.
No one wants the network they manage to become the target of malicious users trying to steal corporate data or cause damage to the organization.
Using the password reset system, malicious users can attempt to trick your users into entering their login credentials into a separate application that they control.
When this service is enabled, malicious users on the local subnet may respond to SSDP requests and lead the UPnP service to connect using WinHTTP to a malicious host that could then exploit this vulnerability.
With an automated backup solution, not only are your files safe, but you also avoid having files corrupted if malicious users ever gain access to your network.
Drawing on expertise gained through years of experience, and referring to a store of information accumulated through our day-to-day monitoring work, we can block content posted by malicious users attempting to slip through the monitoring net.
Google admits that"censorship on the Internet gives government and businesses the power to oppress speech," while also referring to the risk of malicious users manipulating the Internet.
These wireless technologies broadcast recognition IDs for devices upon handshaking to connect with each other. So, if malicious users obtain these information, it might be used for illegal hacking.
In recent worm attacks such as the much-discussed Blaster Worm, it has been designed to burrow into your system and enable malicious users to control your Pc remotely.
Security can be improved by preventing direct access from malicious users By concentrating the Internet access within the company to the proxy server, it is possible to centrally manage log information such as who is watching what site and when.
This is a vulnerability that can expose and grant access to malicious users to various online resources, and thus, TRACE should be disabled on all production ready public facing servers this includes the TRACK method as well that exists on Microsoft IIS servers.
we are not able to take responsibility for malicious users of EaseMon.
Provide high service availability Offer flexible and differentiated services Manage and troubleshoot services remotely Improve security of network services to protect against malicious users Cisco ME 2600X Series Ethernet Access Switches were created for the delivery of today's and tomorrow's access services.