预装在戴尔电脑上的支持软件DellSystemDetect被发现存在漏洞,允许攻击者远程执行恶意代码 。 Pre-installed in the Dell computer Support Software Dell System Detect is to discover the presence of vulnerabilities, allowing an attacker to remotely execute malicious code . 百度公司保证本软件不含有任何旨在破坏用户计算机数据的病毒及其它恶意代码 。 The company ensure that the software does not contain any aimed at undermining the user's computer viruses and other malicious code data. 使用诸如MicrosoftEdge的现代浏览器,这可以帮助阻止恶意网站,并可防止恶意代码 在你的计算机上运行。 Use a modern browser like Microsoft Edge, which can help block malicious websites and prevents malicious code from running on your computer. 它并非支持从事盗版或非法改装活动,包括侵犯第三方IP产权或包含恶意代码 的mod。 It is not intended for engaging in piracy or illicit modding, including mods that infringe on third-party IP rights or contain malicious code .”. 那是只是一个临时的解决,然而,作为设备仍然可以容易到新扫描,然后重新安装恶意代码 。 That's only a temporary fix, however, as the device can still be susceptible to new scans that then reinstall the malicious code .
而90%以上网络犯罪的成本用于应对恶意代码 、拒绝服务攻击、设备失窃和基于web的攻击。 More than 90% of all cybercrime costs were caused by malicious code , denial of service, stolen devices and web-based attacks. 由于Internet上充斥着大量恶意代码 ,安全浏览Internet就成了计算机保护的一个非常重要的方面。 Because of the enormous amount of malicious code circulating the Internet, safe Internet browsing is a very important aspect of computer protection. 每种服务都只支持所有能被注入恶意代码 的文件格式和文档类型中的一部分。 Every service supports only a fraction of all file formats and document types in which malicious code can be injected. 而90%以上网络犯罪的成本用于应对恶意代码 、拒绝服务攻击、设备失窃和基于web的攻击。 More than 90 percent of all cybercrime costs were caused by malicious code , denial of service, stolen devices and web-based attacks. 这些扩展程序注入的恶意代码 会在特定条件下激活,并将用户重定向到特定的页面。 The malicious code of extensions was activated only under certain conditions and redirected users to certain sites.这是黑客有机会通过下载使用恶意代码 构建的应用程序来跨越和窃取数据。 This gives hackers the opportunity to span and steal data through downloading apps built with malicious code . 利用恶意代码 窃取或替换移动设备上的数据的入口点,依赖于设备和软件的特定组合。 Entry points for malicious code that commits theft or substitutes data on a mobile device depend on a specific combination of device and software. 根据政府对攻击的简报和审查恶意代码 的安全专家的说法,攻击。 According to government briefings on the attack and security experts who have reviewed the malicious code . 这意味着,恶意代码 可以被隐匿起来――对用户和其它应用而言,一项危险程序将变得隐身而不可见。 This means the presence of malicious code can be masked- a dangerous program becomes invisible to the user and to other applications. 恶意代码 被认为是嵌入在MSWord文档中的FlashSWF文件中。The malicious code is believed to be a Flash SWF file embedded in MS Word documents.攻击者用恶意代码 感染了数以千计的此类设备,形成了一个僵尸络。 The attackers employed thousands of such devices that had been infected with malicious code to form a botnet. 恶意代码 是用纯C编写的,它不包含C++特性,最初是在WindowsXP上的VisualStudio2013中编译的。The malicious code is written in pure C, it doesn't include C++ features, and was originally compiled in Visual Studio 2013 on Windows XP.恶意代码 用于对各种目标发起分布式拒绝服务(DDoS)攻击,从而导致广泛的中断。The malicious code was used to launch distributed denial of service(DDoS) attacks on various targets causing widespread disruption.这些恶意代码 由以色列公司NSOGroup开发,可以通过iOS和Android版WhatsApp呼叫其他用户来传播。 The malicious code was developed by the Israeli company NSO Group and transmitted by calling users via WhatsApp on iOS and Android.为了保护计算机系统不受恶意代码 的干扰,也为了保证移动代码的安全运行,. To help protect computer systems from malicious code and to provide a way to enable mobile code to run more safely, the.
展示更多例子
结果: 206 ,
时间: 0.0253
English
Bahasa indonesia
日本語
عربى
Български
বাংলা
Český
Dansk
Deutsch
Ελληνικά
Español
Suomi
Français
עִברִית
हिंदी
Hrvatski
Magyar
Italiano
Қазақ
한국어
മലയാളം
मराठी
Bahasa malay
Nederlands
Norsk
Polski
Português
Română
Русский
Slovenský
Slovenski
Српски
Svenska
தமிழ்
తెలుగు
ไทย
Tagalog
Turkce
Українська
اردو
Tiếng việt