Examples of using Malicious program in English and their translations into French
{-}
-
Colloquial
-
Official
For example, malicious programs can copy their information to the registry key that makes applications open automatically at startup.
Hacking tools are malicious programs that may not directly harm your Mac,
All the attempts of malicious programs to connect your computer to paid telephone numbers are recorded on the Hidden dials tab.
Keyloggers and other malicious programs.
Trojans and other malicious programs.
Although disputed, this cyber incident highlights the importance of being wary of imported software that can hide backdoors and malicious programs.
since it contains a list of system registry objects most often used by malicious programs.
teach them how to spot suspicious emails to avoid the spread of malicious programs via phishing.
sending malicious programs or viruses attached to an email.
WinWebSec group of rogue antispyware and thus it is related to a whole bunch of malicious programs including Personal Shield Pro,
A Trojan is one of the many forms of malicious programs that can infiltrate
Mobile Applications do not contain computer viruses and other malicious programs.
unreliable and malicious programs might.
linked servers from malicious programs and spam.
The Website undertakes all measures in order to avoid the presence of malicious programs or viruses on its Website.
assumes the risk of computer viruses or other malicious programs.
If your computer has been infected, they will help eliminate the consequences of malicious programs.
is the 1 st line of defense against malicious programs.
can be used by developers of malicious code or various malicious programs;
The Avira Intelligent Repair System can repair all damage wreaked by malicious programs to your files and further,